The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The majority of business activity of our integrated and connected world takes place in networks based on cloud computing infrastructure that cross national, geographic and jurisdictional boundaries. Such an efficient entity interconnection is made possible through an emerging networking paradigm, Software Defined Networking (SDN) that intends to vastly simplify policy enforcement and network reconfiguration...
The methodological aspects of building standardized profiles describing the development of a security system that is an integral part of a distributed information system are considered. Functional standardization instruments and the theory of open systems are used.
Ontologies play a key role in semanticinteroperability projects, capturing the conceptualizationunderlying the various systems to be integrated. In the case oflarge information systems landscapes, a single monolithicontology often becomes hard to design and maintain. In thissetting, it is common to divide the ontological model inconsistently interlinked modular ontologies, forming anontology network...
The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people's lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial...
In this talk, I'll argue that we need to change our way of thinking drastically and Europe needs to catch up urgently those in the world who have already started to do their homework outside Europe in order to preserve employment and the standard of living in Europe. We have already missed the absolute leadership in the nano-electronics world. It is in the hands of US and Far East owned/based companies...
With the current trend of introducing networking capabilities into traditional industries, Cyber-Physical Production Systems (CPPS) are increasingly targeted by cyber-attacks. Especially with the progression of introducing the industry 4.0 paradigm to sectors that until now worked with strictly sealed environments, new attack surfaces are brought to the attention of cyber-criminals that already possess...
There are a few network environment used for institutions of higher learning for eLearning application. The world financial crises cause institution of higher learning struggling to maintain and update the technologies and infrastructures and try to provide the sufficient budget allocation for the network infrastructure. Cloud Services Data Centre network environment is one of the solution where they...
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
Internet of ETC is a problem that current technology development and users needs to be solved urgently. Furthermore, the risk of Internet access to traditional industry is the main direction currently being explored and studied across all trades. This paper will propose a set of Internet service security system.
In the recent times, software security has gained a great deal of attention in the Software Development Life Cycle due to increased cases of reported cyber threats and incidents. A considerable number of cyber-attacks targeting financial systems has made security be the most critical feature in banking systems. However, establishing security requirements for these applications can be a challenging...
Among the most important and distinctive actionable knowledge are actionable behavioral rules (ABRs). To make ABRM a promising technique for security informatics, we develop new methodologies for it. We also conduct an experiment to validate our approach. The experimental results strongly suggest the validity of our approach.
This paper addresses emerging liability concerns in new data analytic and IoT solutions. It reviews recent examples in which related technology industries have suffered major liability exposures or failed to fulfill expected service agreements and proposes ways to mitigate this. It also identifies each of the different components of new analytics solutions and explore these for potential risk and...
AI, Robotics, and loT are attracting wide attention, expected as technologies to change society in the future. These innovative technologies have potentials to build (1) a borderless communication society, (2) a symbiotic society between humans and robots, and (3) a safe and secure networked society. This paper describes some specific solutions by Panasonic: (1) automatic translation solution, (2)...
This paper presents a case study from a project in Arusha region (north Tanzania), aiming at improving access to electricity in secondary schools through the establishment of a social enterprise, in charge of promoting rural electrification by applying the “4As Framework” with an innovative way and business structure. The work highlights benefits and challenges from the field, in order to drawn some...
It is estimated that in the near future vehicles will be equipped with electronic devices allowing communication among vehicles. This communication should enable the exchange of traffic data, such as accidents, traffic jams or the approaching of emergency vehicles. This exchange, however, cannot be done through simple messages. It is necessary to perform it as safe and efficient as possible, avoiding...
Web-based or hybrid mobile applications (apps) are widely used and supported by various modern hybrid app development frameworks. In this architecture, any JavaScript code, local or remote, can access available APIs, including JavaScript bridges provided by the hybrid framework, to access device resources. This JavaScript inclusion capability is dangerous, since there is no mechanism to determine...
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the face of potential failures, accidents, and malicious...
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
Software startups can be subject to extreme money and time constraints while hoping for delivering reliable software. In a harsh startup environment, software may face quality downgrade either by improper process management or incapable human resources. Among the many, security is a fragile software quality characteristic responsible for severe negative consequences such as jeopardizing a startup's...
The ability for IBM researchers and development teams to take an idea or business opportunity and quickly solution it by requesting resources from a self-service cloud portal or an application-programming interface, API, has drastically changed how IBM Research procures information technology resources. In this poster, we'll present a brief history, the current IBM Research Hybrid cloud and our analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.