The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IP Multimedia Subsystem (IMS) known for its prominent service delivery is paving way for applications like Video Voice over IP (VVOIP) on handheld devices too. Android, a software platform from Google, pioneering in middleware and applications domain of handheld devices does not offer support for IMS services by design. Motivated by these observations, we present novel scalable architecture to cater...
Wireless sensor networks (WSNs) have many applications in home and industrial automation, and the management and integration of WSNs into Internet and IP-based networks is still getting tremendous interesting. This paper presents a micro SOA-model as part of a 4-layered, SOA-based architecture targeting resource-constrained devices with 48 KB of ROM and 10 KB of RAM. The key idea in this model is...
Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented...
Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurring or attempted intrusions and highly improve security expert's work efficiency. Traditional alert correlation system adopts a centralized architecture which can be easily over flooded...
This paper discusses the network security scanning and some scanning methods which contain port scanning, vulnerability scanning and remote operating system detection are studied. In order to reduce the complexity and get high performance, the architecture of a common network security scanning system based on Libnet and Libpcap is provided and the every module of system is designed and implemented...
In theory, IT professionals use network diagrams throughout the information security lifecycle. When building a new system, we build diagrams that describe the overall architecture, how servers communicate, and wide-area-network (WAN) connectivity. When we assess systems, we use network diagrams to quickly understand the network design and to locate critical assets. And when an incident occurs, a...
This article presents a middleware architecture to support multimedia services across intertechnology radio access networks in a secure and seamless manner. The proposed architecture uses the media-independent handover framework, where the handover decision function is based on triggering/collecting statistics from the physical, network, and application layers so that an ongoing multimedia session...
Security has become a critical requirement of MIPv6 which will play an important role in next generation mobile network. Although some effective solutions have been proposed, but there is still a serious problem existed which concerns about security compatibility between MIPv6 node (MN) and the access network (AN). A policy-based distributed security management method is presented to solve this problem...
Smartphones are widely used nowadays and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security. In this paper, we provide an overview of security issues for smartphones and give a...
Secure knowledge management refers to the management of knowledge while sharing among members of virtual communities in distributed computer networks adhering to the principles of security and privacy. Security of the knowledge management over the network is critical, since one cannot restrict the knowledge sharing geographically and moreover the intellectual asset has to be protected. This paper...
In this paper, an approach to create virtual cluster environments is presented which enables fine grained service-oriented applications to be executed side by side to traditional batch job oriented Grid applications. Secure execution environments which can be staged into an existing batch job environment are created. A grid enabled workflow engine to build complex application workflows which are executed...
Digital identity management intra and inter information systems, and, service oriented architectures, are the roots of identity federation. This kind of security architectures aims at enabling information system interoperability. Existing architectures, however, do not consider interoperability of heterogeneous federation architectures, which rely on different federation protocols. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.