The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's modern homes are becoming complex live systems in which virtually all functionality, from lighting and heating control to security and occupancy simulation, is mediated by computerized controllers leading to IoT future. The smart nature of these homes raises obvious security concerns and history has shown that a vulnerability in only one component may provide the means to compromise the system...
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism, in conjunction with the Kerberos V5 protocol as a means of authenticating users on Linux based environments. Some known incompatibilities and Security problems are exposed for which, today, native Single Sign On in Kerberos is not a standard in Linux. Finally, the future...
The Smart Grids requires distributed components to control the demand side. These components have to fulfill various requirements from communication issues to graphical user interfaces for monitoring and controlling. In this paper, we define high level requirements to software architectures for Customer Energy Management Systems and evaluate some existing solutions based on Java and OSGi. The conclusion...
This document examines the OData protocol as a new service oriented approach for distributed IT architectures. The main features of OData were compared with properties of well-established solutions like: REST, DCOM and Java RMI. OData's protocol is presented in the context of its application in Service-Oriented Architectures.
One of the core properties of Software Defined Networking (SDN) is the ability for third parties to develop network applications. This introduces increased potential for innovation in networking from performance-enhanced to energy-efficient designs. In SDN, the application connects with the network via the SDN controller. A specific concern relating to this communication channel is whether an application...
Managing large volume of devices in machine-to-machine systems and large scale cyber-physical systems with least effort is a challenging and critical issue. In this work, we design and implement an out-of-box device management to automatically add and remove devices from the system, based on the connectivity. While the devices can be managed automatically, the security and privacy issues are both...
JXTA is an open peer-to-peer (P2P) protocols specification that, in its about 10 years of history, has slowly evolved to appeal to a broad set of applications. As part of this process, some long awaited security improvements have been included in the latest versions. However, under some contexts, even more advanced security requirements should be met, such as anonymity. Several approaches exist to...
In this paper, we present the design and implementation of an active storage framework for object storage devices. The framework is based on the use of virtual machines/execution engines to execute function code downloaded from client applications. We investigate the issues involved in supporting multiple execution engines. Allowing user-downloadable code fragments introduces potential safety and...
Object Oriented (OO) system development using middleware such as DCOM and CORBA has been utilised by online businesses to implement e-commerce systems. Recent studies indicate that online businesses are increasingly adopting and implementing e-commerce systems using Service Oriented Architecture (SOA) technologies. Limited research has been conducted in comparing these two architectures at development,...
Mobile devices have become ubiquitous, allowing the integration of new information from a big range of objects. But the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA protocols implementation for mobile devices using J2ME. The main value of JXME is its simplicity when creating peer-to-peer (P2P) applications on limited devices. However,...
This paper presents JavaSPI, a "model-driven" development framework that allows the user to reliably develop security protocol implementations in Java, starting from abstract models that can be verified formally. The main novelty of this approach stands in the use of Java as both a modeling language and the implementation language. By using the SSL handshake protocol as a reference example,...
JXTA is a set of open protocols that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner. Being a generic P2P middleware, it has slowly evolved in order to appeal a broad set of different applications. Part of this evolution includes providing basic security capabilities in its protocols in order to achieve some degree of message...
Linear permissions have been proposed as a lightweight way to specify how an object may be aliased, and whether those aliases allow mutation. Prior work has demonstrated the value of permissions for addressing many software engineering concerns, including information hiding, protocol checking, concurrency, security, and memory management. We propose the concept of a permission-based programming language...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
We developed the first open source Path Computation Element (PCE) emulator, which includes a complete PCEP protocol implementation, network I/O support and support for concurrent path computations. We share the lessons learned in its implementation.
HTTPS is designed to protect a connection against eavesdropping and man-in-the-middle attacks. HTTPS is however often compromised and voided when users are to embrace invalid certificates or disregard if HTTPS is being used. The current HTTPS deployment relies on unsophisticated users to safeguard themselves by performing legitimacy judgment. We propose HTTPS Lock, a simple and immediate approach...
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
Rigorously trusted services depend on reliable evidences to describe and check service behaviors. In this paper, we propose the pi-SOA framework, which delivers mutually trusted services in a rigorous way. The framework allows clients to verify service behaviors remotely according to their trust policies and uniquely identify the verified service at all times during its executions. On the other hand,...
Integration technologies between heterogeneous systems are hot and difficult points. Architecture framework of enterprise application integration platform based on the JCA(J2EE Connector Architecture) was built, the detailed function s and working mechanism of each module platform works were analyzed in the paper. Some key technologies of achieving system integration between MES (manufacturing execution...
In 1995, DARPA initiated a work on a programmable concept of computer networking that would overcome shortcomings of the Internet Protocol. In this concept, each packet is associated with a program code that defines packet's behavior. The code defines available network services and protocols. The concept has been called Active Networks. The research of Active Networks nearly stopped as DARPA ceased...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.