The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The flexibility and dynamicty of the Cloud and SDN-based network infrastructures raise strong issues for sensitive data which can easily be transferred between different locations and then violate some constraints such as country-based regulations. This paper tackles the critical issue related to the path followed by sensitive data transferred in such virtualized environments and which have specific...
Security of sensitive data in the network is a key issue in a world where such sensitive data can easily be transferred between different servers and locations (e.g., in networked clouds). In this context, there is a particular need to control the path followed by the data when they move across the cloud (e.g., to avoid crossing -even encrypted- un-trusted nodes or areas). In this paper we proposed...
Customer Edge Switching (CES) is a proposed replacement of Network Address Translators (NAT) that overcomes the drawbacks of traditional NAT traversal schemes. CES enabled networks assure policy based reach ability of hosts in private realms, without requiring keep-alive signaling. CES aims at improving security in the Internet by balancing the interests of the receiver with the interests of the sender,...
Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally take into account security requirements together with...
Despite all the current controversies, the success of the email service is still valid. The ease of use of its various features contributed to its widespread adoption. In general, the email system provides for all its users the same set of features controlled by a single monolithic policy. Such solutions are efficient but limited because they grant no place for the concept of usage which denotes a...
In this paper, we propose a trustworthy data management framework for wireless networks in Cyber-Physical System (CPS), in which the trust values of both CPS data and the reporting devices are assessed. In addition, a set of policy rules are declared to accurately describe how we determine the trustworthiness of each reporting device based on the contextual factors. Experimental results on both simulation...
The digital world is changing at a fast pace. These days, web services are becoming the basis of many e-business systems & web users are increasingly sharing their personal information with web service providers. These services are being considered as a promising new generation technology for the effective automated collaboration among heterogeneous autonomous service providers. The utmost...
Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which have...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in these values requires manual intervention of an administrator. In many dynamic environments, however, these values should be auto-adaptive, and auto-tunable according to the usage history of the users. Moreover, occasional exceptions on resource needs, which are common in dynamic environments like healthcare,...
A Cyber-Physical System (CPS) involves a tight coupling between the physical and computational elements. Security is a key challenge for the deployment of CPS. Therefore, it is highly desirable to extract correct information from a large volume of noisy data and properly evaluate the reputation of reporting devices in CPS. In this paper, we propose a Context-Aware tRust Evaluation scheme for wireless...
End-to-end security in collaborative system has two inferences: the secure delivery of service and the `due usage' of it. The fulfillment of this requirement involves re-thinking the security policy model of collaborative systems. This paper analyses the factors that impact security in such systems. Based on this, a general architecture is proposed with a collaboration-based policy model specified...
Rigorously trusted services depend on reliable evidences to describe and check service behaviors. In this paper, we propose the pi-SOA framework, which delivers mutually trusted services in a rigorous way. The framework allows clients to verify service behaviors remotely according to their trust policies and uniquely identify the verified service at all times during its executions. On the other hand,...
Security in decentralised collaborative environments present huge challenges where many entities from different autonomous security domains want to access and share resources. This is largely due to cross-boundary issues where security credentials and policies are heterogeneous, and where yielding control to a centralised authority is not an option. Numerous cross-boundary approaches exist today and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.