The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security and privacy of patient information is one of the biggest hindrances to the wide adoption of eHealth systems. For eHealth systems to be successful they must provide protection for patients' privacy while ensuring healthcare professionals are able to access the information necessary to provide appropriate care. Accountable-eHealth systems are a proposed solution to these potentially competing...
We address the problem of efficient coordination protocols in the contexts where mobile and ad-hoc devices which harbor the selfish agents must achieve a set of dynamic tasks. This work assumes that, due to the dynamic behaviors of the agents induced by the unpredictable availability of these devices and the dynamic of the tasks, it is not possible to devise an efficient coordination which uses prior...
Online social networks (OSN) have attracted millions of users worldwide. This enormous success is not without problems; the centralized architectures of OSNs, storing the users' personal data, provides ample opportunity for privacy violation — a fact that has raised the demand for open, decentralized alternatives. We tackle the research question: is it possible to build a decentralized OSN over a...
This paper describes the design, implementation, and evaluation of DLNA Probe, a system for logging the operation histories of Digital Living Network Alliance (DLNA) devices. This paper first describes the combined use of Address Resolution Protocol (ARP) spoofing and the Simple Service Discovery Protocol (SSDP), which obtains the operation histories of DLNA devices without changing any DLNA specifications...
Lamport's happened-before relation provides a starting point for an enquiry into causal relations in synchronous systems. We define the ordered response problem, a natural coordination task. By analyzing solutions to this task we arrive at the Centipede Theorem, that gives a concise characterization of synchronous causality.
In a multiagent system, coalition formation is a coordination method for agents aiming to form groups of interest. In this paper, we focus on the particular context of hedonic games. In hedonic games, the objective of the agents is to form coalitions, which are groups of agents. The satisfaction of an agent depends on other members of its coalition. In this context, autonomous agents need strategical...
One of the major interest perceived by research in digital forensic investigation is the development of theoretical and scientifically proven methods of incident analysis. However, two main problems, which remain unsolved by the literature, could lead the formal incident analysis to be inconclusive. The former is related to the absence of techniques to cope with anti-forensic attacks and reconstruction...
The Web offers autonomous and frequently useful resources in growing manner. User Generated Content (UGC) like Wikis, Weblogs or Webfeeds often do not have one responsible authorship or declared experts who checked the created content for e.g. accuracy, availability, objectivity or reputation. The user is not able easily, to control the quality of the content he receives. If we want to utilize the...
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP services, an inter-domain authentication mechanism is defined in RFC 4474. However, this mechanism introduces another vulnerability: a timing attack which can be used for effectively revealing the calling history of a group...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.