The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a system architecture for trust management inspired by a human model for the evaluation of trust. We focus on large-scale marketplaces for diverse software resources and services. In such marketplaces, user agents (consumer, provider and broker) are largely autonomous with vastly diverse requirements, capabilities, and trust preferences. We hypothesize the need for personalized...
The aim of this work is related to railway sector and particularly with the introduction of the GNSS (Global Navigation Satellite System) into that environment. More in details, our aim is to evaluate system performance in terms of integrity of the navigation data. In the train control system, the integrity is one of the most challenge feature to achieve. Under that assumption, an algorithm that is...
The increasing number of cyber-attacks on industriesdemands immediate attention for providing more securemechanisms to safeguard industries and minimize risks. Cyberphysical systems (CPS) being used in industries such as oil and gas, chemical process plants and the like are termed Industrial Control Systems (ICS). Control system security is aimed at preventing intentional or unintentional interference...
Big data becomes a real opportunity and a serious worry for data managers, data scientists, researchers and even for business managers. An opportunity as a set of powerful technologies and a bunch of interesting concepts that aim resolving business problems of an organization. A worry because big data implies big challenges and big resources that make harder the task of mining value from all the available...
Reliability of a navigation system is one of greatimportance for navigation purposes. Therefore, anintegrity monitoring system is an inseparable part of aviation navigation system. Failures or faults due to malfunctions in the systems should be detected and repaired to keep the integrity of the system intact. In this paper, we present a method based on wavelet analysis for detecting failures. The...
Dynamic database behaviour can be specified by dynamic integrity constraints, which determine admissible sequences of database states, and by transaction specifications, which induce executable sequences. Constraints are expressed by formulae of temporal logic, whereas transactions are defined by pre/postconditions in predicate logic. This paper presents concepts and rules for transforming dynamic...
This paper describes the development of an approach for determining uncertainty and integrity for a vision based, precision relative navigation system. Integrity ultimately relies on the ability to determine rigorous knowledge of the probability density function (pdf) for the estimated relative state or state error; which is based on a known set of models or assumptions and conditioned upon a set...
Many GNSS (Global Navigation Satellites System) applications need high integrity performances. Receiver Autonomous Integrity Monitoring (RAIM), or similar method, is commonly used. Initially developed for aeronautics, RAIM techniques may not be fully adapted for terrestrial navigation, especially in urban environments. Those techniques use basically the pseudoranges to derive an integrity criterion...
Nowadays, in a highly computerized system, people have tendency to have not expect privacy to be maintained and continue in its current form if individual control is required and monitored. Especially, in contemporary campaigns for higher office, the candidates often use mass media to deliver political message or having certain campaign developed by expert in the efficient use of providing personal...
A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes to monitor physical or environmental conditions. When WSNs are deployed in inaccessible areas, the probability of occurring different types of attacks is very high. So the security of WSN becomes extremely important. As sensors have limited processing power, limited storage, low bandwidth, and energy; traditional...
The concept of Trusted Computing offers a hardware platform based on which the integrity of IT systems is verified using a structured file-based signature hierarchy of all executable system components - from BIOS boot up to the execution of any user application. Current implementations detect integrity breaches at firmware and at file level so that suitable counter measures on a Trusted Computing...
To meet future challenges of energy grids, secure communication between involved control systems is necessary. Therefore the German Federal Office for Information Security (BSI) has published security standards concerning a central communication unit for energy grids called Smart Meter Gateway (SMGW). The present security concept of the SPIDER project takes these standards into consideration but extends...
Computer systems invest substantial resources in securing their services. Costs of failure prevention are balanced against those of detection and recovery, both of which typically involve substantial degradations. Most computer users consider degradations of service to be insidious and injurious. Yet, degradations commonly assist in both the prevention and the curtailment of failures. Their toleration...
This paper proposes a local augmentation and integrity monitoring network for railway and shows the obtained performances in terms of accuracy positioning in case of satellite faults. The simulations results show that the system can detect and discard tha faulty satellite, still mantaining the accuracy on positioning accetable. The work is inserted in the scenario of introduction and application of...
The GNSS operative monitoring equipment (GNOME) system is a distributed network of remote sentinels aimed at monitoring integrity, reliability and spoofing/interference-immunity of GNSS signals. The key features of this system directly come from the ICAO recommendations and standards which highly advise continuous control of the GNSS performance and integrity, both in the signal and in the navigation...
Cloud computing is a model that provides ubiquitous, on demand access to a shared pool of computing resources including networks, servers, storage, application and services that can be easily provisioned and released. As Cloud is a shared and distributed environment, the need for ensuring security of its critical infrastructure that includes computing, network and storage is immense. One of the critical...
This article describes a GNSS monitoring station over the L band. The monitoring is performed in two different ways: over the signal's spectrum by means of statistical analysis and in the range domain determining the horizontal protection level. The horizontal protection level ensures that the user's location is within a certain range with a certain probability and is used as input in decision making...
A new algorithm for the GPS satellite User Range Accuracy (URA) integrity monitor that incorporates the satellite ranging measurements taken at ground monitor stations, aided by the crosslink ranging measurements taken between the GPS satellites, is presented. The new algorithm provides improved performance and eliminates the need for a key assumption of a previous algorithm that used ground and crosslink...
Security of Cloud infrastructure and its resources is a recent area of research for computer scientist now days. One of the resource to look after in Cloud environment are the important configuration and system specific files which are accessed by remote entities such as VM users and whose manipulation can lead to compromise in the security of Cloud. We have designed and successfully developed a lightweight...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.