The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a framework for ensuring software suppliers provide the necessary information about their software in order to support an overall platform safety case. The framework has been developed particularly for use on defence projects utilising a range of both bespoke and previously developed software. The framework aims to provide detailed guidance on what is expected from the software...
Researchers involved directly with the security of information-processing systems know that many such systems do not have the levels of integrity and sustainability that are much more prevalent for safety-critical systems. Safety-critical systems, many of which are industrial process control systems, are generally built and tested to much higher standards for handling system failure or aberrant behavior...
Today's fast developing modern information technology not only has a great impact on the social and economic activities but also more importantly has caused the innovation of modern auditing technology. In order to keep pace with the development of modern audit, the author adopted the method of computer data mining to analyze large quantities of data collected from the audited corporate, and work...
Trust and security are key enablers of the information society. Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy. It addresses issues on who is authorised to perform actions as well as the techniques needed to manage and implement security in the applications. Trust relates to belief in honesty, truthfulness,...
Network Finance brings great changes and conveniences to enterprise at network economy age, at the same time, but security issues have been the biggest constraint to their development, so how to build the control system of network financial security is an important issue which is urgently in-depth studied. In this paper, the control system of network financial security is constructed systematically...
The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of the database research community, which, surprisingly, has by and large overlooked this problem. We begin by pointing out the causes and consequences of data corruption. We then describe the Proactive Checking Framework (PCF),...
The following topics are dealt with: antennas and propagation; localization; sensors; circuits, devices & interrogators; security and privacy; and software.
This paper proposes a methodology and a tool to evaluate the security risk presented when using software components or systems. The risk is estimated based on known vulnerabilities existing on the software components. An automated tool is used to extract and aggregate information on vulnerabilities reported by users and available on public databases (e.g., OSVDB and NVD). This tool generates comprehensive...
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing "from being device-centric to information-centric", which create a bridge between operating system-based computing and the more service-oriented approach...
The paper aims at defining the agent based threat modelling from the viewpoint of security agents. Agent causal to threat creates insecure gateways and paths which lead to vulnerabilities in the system. Any system built on to a vulnerable foundation of a vulnerable language or architecture shall forever remain risk bound. Security agents or “POLICE” agents as we term them come dexterous. The modelling...
The Mars Exploration Rover Mission (MER) includes the twin rovers, Spirit and Opportunity, which have been performing geological research and surface exploration since early 2004. The rovers' durability well beyond their original prime mission (90 sols or Martian days) has allowed them to be a valuable platform for scientific research for well over 2000 sols, but as a by-product it has produced new...
Autonomous Decentralized System (ADS) has been proposed for providing on-line expansion and maintenance and also fault-tolerance. The associated architecture is composed by a Data Field (DF - on this element, the information is flowing among all the elements connected to it) and Autonomous Control Processors (ACP - part of an entity where the information coming from the DF is preprocessed and manages...
Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there...
Development organizations often do not have time to perform security fortification on every file in a product before release. One way of prioritizing security efforts is to use metrics to identify core business logic that could contain vulnerabilities, such as database interaction code. Database code is a source of SQL injection vulnerabilities, but importantly may be home to unrelated vulnerabilities...
Ambient intelligence is an emerging discipline that brings intelligence to our everyday environments and makes those environments sensitive to us. Ambient Intelligence technologies are more and more frequently adopted in scenarios, like healthcare, crisis management, remote monitoring and control, which are critical for human safety. This requires that such a kind of applications be designed taking...
Secure components are subject to physical attacks whose aim is to recover the secret information that they store. Most of works which aim to protect these components generally consist in developing protections (or countermeasures) taken one by one. But this "countermeasure-centered" approach drastically decreases the performances of the whole chip in terms of power and speed. Our work is...
Cyber attacks committed against networks and software assets (operating systems, applications, and data repositories) have profound impact both on ongoing and future missions that use IT services offered by the networks. The attacks by exploiting the vulnerabilities of the software assets can push their impact through the cyber terrain - the cyber dependency network of structural, spatial, functional...
The needs for safety-critical 3D graphics features are rapidly increasing. OpenGL SC is the safety critical profile of the famous OpenGL API. We present a cost-effective way of providing OpenGL SC emulation over the OpenGL 1.1 pipeline with the multi-texture extension.
An unanticipated consequence of the Internet age is a pervasive loss of context. Users and organizations receive information in incredible volumes from both internal processes and far-flung, untrusted, and sometimes unknown sources.
This research study stress upon the qualified or comparative analysis between commercial and non-commercial Enterprise Service Buses (ESB) for large-scale organizations. We have used Multi Criteria Decision Analysis (MCDA) method known as Analytical Hierarchy Process (AHP) based on three criteria i.e. Information Security, Interoperability & High availability. Many comparative analysis reports...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.