The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The need to maximise the number of innovative trust and security (T&S) research project outputs impacting the marketplace is an important priority in the EU ICT Security Research Domain. This paper highlights supporting key activities and the CSP Forum initiative that strives to promote and encourage collaboration amongst the relevant security research actors and the wider community. Effective...
Near Field Communication (NFC) enables a mobile phone to emulate a contactless smart card. This has reinvigorated the multiapplication smart card initiative. Trusted Service Manager (TSM) is an entity that is trusted by all stakeholders in the proposed and trialled NFC-based smart card ecosystem. However, TSM-based models have the potential to create market segregation that might lead to limited or...
Due to an increasingly connected society and industry, our modern societal world and all industry sectors now increasingly depend on large-scale complex Systems of Systems (SoS). The emerging interdisciplinary area of SoS and Systems of Systems Engineering (SoSE) is largely driven by societal needs including public services such as health, transport, water, energy, food security, etc. The scale, complexities...
This paper synthesises existing research on the involvement of retail sector employees in identity theft (ID) related crimes. In particular, the literature review considers the conceptualisation of internal identity theft and related crimes within retail industries, prevention methods used to combat internal identity theft related crimes, and to synthesise lessons learnt so far in reducing internal...
During the common services invoking and integration, there are three aspects of relationship to describe composition of the services which are between the designers of the composite common services and the common service composition systems, between the common service composition systems and the common service delivery systems and between the common service user systems and the common service composition...
Organizations around the world are experiencing a shortage of qualified candidates to fill the growing number of networking positions in almost every industry. Cisco Networking Academy is an innovative global education initiative that delivers information and communication technology skills to help meet this growing demand while improving career and educational opportunities for students around the...
This paper provides a compact insight into legal issues leading to collaboration frameworks for use with Distributed and High Performance Computing resources in the geosciences and exploration disciplines, building integrated public/commercial information system components within the e-Society. Focus is on a new framework for the use of computing resources, interfaces for data and application interchange,...
The mission of the joint network enabled operations (NEO) program is to promote interagency communication and collaboration through the use of modern network enabled tools, technologies, and operational procedures for the next generation air transportation system (NextGen). The NEO environment features a modern service bus based enterprise architecture. To evaluate the utility of this architecture...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.