The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The transition from system-to information-based security has continued steadily over the last 30 years. Correspondingly, it is increasingly not the computer that is at risk, but the information in it. The human operator is ultimately the cornerstone of information security, an integral part of the information infrastructure. We are therefore forced to use techniques and methods that help us understand...
Business-process-management (BPM) systems are increasingly used in service-oriented architectures (SOA), coordinating activities of web services and of human actors. The openness and flexibility of SOA causes new challenges regarding security of business processes. This is because they have to deal with unexpected situations at run time. Respective solutions must be inherent to a BPM system (BPMS)...
The security of railway and mass-transit systems is increasingly dependant on the effectiveness of integrated Security Management Systems (SMS), which are meant to detect threats and to provide operators with information required for alarm verification purposes. In order to lower the false alarm rate and improve the detection reliability of threat scenarios, event correlation capabilities need to...
Today video surveillance systems are widely used in public spaces, such as train stations or airports, to enhance security. In order to observe large and complex facilities a huge amount of cameras is required. These create a massive amount of data to be analyzed. It is therefore crucial to support human security staff with automatic surveillance applications, which will create an alert if security...
There are currently few public studies about the usefulness of linguistic steganography in Spanish language. This article analyzes the usefulness of synonym substitution techniques in Spanish, aiming at a first approximation to their capacity of concealment in Spanish. A synonym substitution tool based in a huge synonym dictionary, a verb inflection dictionary and a noun-adj inflection dictionary(singular/plural...
Network connectivity in coalition environments has increased markedly in recent times. This has coincided with a shift in military thinking toward Network Enabled Capability (NEC). Together, these have produced the concept of the NEC System of Systems (NEC SoS), where many systems are interconnected to produce a military capability. This paper takes a holistic view of the NEC SoS to include Un-Manned...
In this paper, we describe how a semiotic ladder, together with a supportive trust agent, can be used to address “soft” trust issues in the context of collaborative Virtual Organisations (VO). The intention is to offer all parties better support for trust (as reputation) management including the reduction of risk and improved reliability of VO e-services. The semiotic ladder is intended to support...
Telecommunication and Internet services are constantly subject to changes, seeking the customers full satisfaction. Enriching these services with innovative approaches such as context-aware, social, mobile, adaptable and interactive mechanisms, enables users to experience a variety of personalized services seamlessly across different platforms and technologies. In this sense, it is expected that next...
In this paper, software system, design theories and human immune system (HIS) features are used to introduce a novel algorithm for the problem of preventing intrusions and healing the damage which they cause. The HIS features are analyzed and modelled to monitor network systems as to whether the inline activities are behaving abnormally or being attacked. The abnormal activities are prevented and...
Previous research has suggested that there is a trust ‘gap’. Whilst tangible security aspects of such services are relatively well understood, intangible aspects of trust, particularly with respect to trust formation and validation amongst e-partners is a much less well developed area. The contribution offered is largely conceptual at present. The semiotic ladder is used to support the VO service...
Cyber-Individual, with a short term 'Cyber-I', is a real individual's counterpart in cyberspace. It is closely related to human-centric computing ideology which focuses on placing human in the center of computing. The study on Cyber-I tries to re-examine and analyze human essence in the digital era. Cyber-I's vision is to create a unique, digital, comprehensive description for every real person being...
Being motivated by the need for usable Web security systems, we present in this paper new image-based CAPTCHA systems that overcome the weaknesses of commercial CAPTCHAs. We describe Tree and Shape CAPTCHAs in addition to handwritten CAPTCHAs that feature visual objects transformed according to specific principles of cognitive psychology. These transformations, in addition to other security measures...
This paper builds on the authors' work on security challenges in the more general pervasive domain and considers what demands the adaptive paradigm will make of the information assurance community, and conversely, what information-assurance concerns should inform the realisation of pervasive adaptation. We propose a set of concepts which would enable these concerns to be addressed should they be adopted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.