The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
One of the popular concepts nowadays is the Internet of Things (IoT). IoT will convert our daily life objects into smart objects. In order to become a part of the IoT network, these smart devices will require some technologies and protocols. In this paper, we will study the different te chnologies that enable the smart objects to be come a part of the IoT network. Furthermore, we will have a look...
A good and robust integration system cannot be separated from how the initial design of the system is selected and implemented. Therefore, integrating existing systems to become a large system that meets the needs of other connected systems requires full assessment and verification so that when the system is implemented, the necessary changes required in the future will be able to be accommodated...
The concept of Internet of Things (IoT) which lately was perceived as emerging paradigm is now becoming an important field for innovation-based companies who are developing and deploying solutions tailored to their clients' needs. Despite the fact that there were numerous IoT models which were proposed in research papers, many of them were lacking practical architecture examples and empirical studies...
Delay tolerant networks have already evolved as a pragmatic solution to various requirements such as delayed routing in wireless networks. They can also be used in place of traditional wireless networks in the border areas or highly sensitive areas, thus contributing to the data security in such places. In this paper, a border security architecture has been proposed where DTN is used for transferring...
This article looks at some of the challenges related to the deployment of the Internet Of Things (IoT), specifically to ascertain that security becomes an integral part of the technology rather than a bolted-on wrapper of limited efficacy. IoT security (IoTSec) is needed at all ‘layers’ of the IoT environment and may be specific to the IoT ‘layer’ in question.
Currently the SDN research community considers in-line dynamic network functions too complex for SDN, leading to calls to purge them from the forwarding plane. This paper introduces a comprehensive framework that tames this complexity and allows network administrators to deploy complex network functions into the SDN forwarding plane to provide enhanced and provable network properties. We first illustrate...
Critical Infrastructures (CIs) are among the main targets of activists, cyber terrorists and state sponsored attacks. To protect itself, a CI needs to build and keep updated a domestic knowledge base of cyber threats. It cannot indeed completely rely on external service providers because information on incidents can be so sensible to impact national security. In this paper, we propose an architecture...
For many cyber-physical systems, there is a strong trend towards open systems, which can be extended during operation by instantly adding functionalities on demand. We discuss this trend in the context of automotive and medical systems. The goal of this paper is to elaborate the research challenges of new platforms for such open systems. A main problem is that such CPS apps shall be able to access...
This research analyzes cloud computing systems from a design perspective. Specifically, the research investigates the impact of distributed and centralized cloud architectures on security and performance. It begins by establishing a generic terminology for comparing cloud computing systems. Next, four architectural components of clouds are compared. The components are: compute, storage, networking,...
The Internet of Things (IoT) is a rapidly growing technology in recent years. It represents an extension of the Internet into the physical world embracing everyday objects. In consequence, users' privacy and security are becoming a great challenge. To cope with this issue, sophisticated approaches are needed to guarantee these services and hence ensure a large-scale adoption of IoT. In our work we...
Significant progress has been made recently in emerging nonvolatile memories (NVMs). This paper will discuss advantages and challenges of several promising NVM devices, as well as their potential applications. Changing market trends toward mobile, IoT, and data-centric applications create new opportunities for NVMs. High-performance NVMs may enable novel architectures and designs, e.g., more uniform...
Addressing security and privacy requirements for Mobile and Cloud platforms is always made in isolation. This lack of coherence has impacts when data are permanently travelling between such platforms. In this paper we propose a symmetric architecture that takes into account the privacy and security requirements of the two platforms and offers a straightforward instantiation pattern for realizing an...
Cloud Computing has emerged as a new paradigm in the field of network-based services within many industrial and application domains. The major benefits that it provides in terms of IT efficiency and business agility represent a huge competitive advantage for an organization. However, building new services in the cloud or designing cloud-based solutions into existing business context in general is...
The US Department of Transportation's (USDOT) Southeast Michigan Connected Vehicle Test Bed originally hosted USDOT Proof of Concept Testing (POC), starting in 2007. Following the success of the POC, the USDOT initiated the development of a Connected Vehicle Reference Implementation Architecture (CVRIA), and in 2013 began the final design and trial implementation of the CVRIA at the USDOT's Southeast...
Surveillance systems are evolving and analog cameras give way to IP cameras, wireless sensors are used in home surveillance, remote mobile phones access to video surveillance is current practice, but the concept itself, of “surveillance systems”, has not evolved accordingly. Control rooms are still the heart of operations, where several security guards spread their attention over an array of monitors,...
Internet of Things (IoT) domain has attracted a lot of interest over the last few years, to a large extent due to its applicability across a plethora of application domains. This variety of application domains resulted in a variety of requirements that IoT systems should comply with. Due to the heterogeneity of the domains, the requirements varied significantly, and demanding more or less complex...
Systems of systems (SoS) are large-scale systems composed of complex systems with difficult to predict emergent properties. One of the most significant challenges in the engineering of such systems is how to predict their Non-functional Properties (NFP) such as performance and security, and more specifically, how to model NFP when the overall system functionality is not available. In this paper, we...
The architecture of a Web system affects many of its quality attributes, such as testability, security, and accessibility. The architecture itself is influenced by factors such as system requirements, infrastructure constraints, and interoperability needs. This session is the fifth in a series of special events held at WSE focused on selected aspects of research directions in Web systems evolution,...
Cloud computing architecture is used as a guideline to understand the whole process including actor roles inside a cloud computing environment. Currently, there is only a few cloud computing architecture that can be used as a reference for building a cloud computing infrastructure. As cloud computing technology is being used to minimize the usage cost of computing resources, many enterprises gained...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.