The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Integration of hospital information systems (HIS) is an important area and one the basic requirements of hospitals since it increases quality of care and at the same time reduces costs of creating, upgrading, updating and keeping up with technology and healthcare industry standards and information technology. Cloud computing with features like multitenancy, massive scalability, elasticity, pay as...
This paper examines service migration in a new computing paradigm, the cloud computing environment (CCE), by examining security and integration issues associated with service implementation. We postulate that a cloud architecture will evolve to be both more flexible and heterogeneous in resources because of the services complexity demanded by organizations. This introduces additional, but tractable,...
As Cloud Computing begins to move beyond the pure hype stage and into the beginning of mainstream adoption, adopting cloud-based services or moving application services to the cloud brings a number of new risks, including: Cloud availability, Cloud security, Erosion of data integrity, and so on. However, for enterprise which require visibility, trust and control over cloud-based services. To maximize...
Security in virtualized environments has become a serious concern, as it gained acceptance in corporate data centers. The importance of the operational, organizational and economic context has been placed into the background, while much of the focus remained on the virtualization technology itself. The security of a virtualized environment requires a multi-faceted approach, where technical as well...
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust...
With increasing development of Internet, grid as a new structure of distributed network will be discussed more and more, while its security is facing the heavy challenge and restricts application of grid. The international research shows that grid security is on the way to trustworthy grid. Apart from current trust model, the future trust model in grid should add users' behaviors reflecting users'...
Acknowledged as important factors for business environments operating as virtual organizations (VOs), trust and reputation are receiving attention also in Grids devoted to scientific applications where problems of finding suitable models and architectures for flexible security management of heterogeneous resources arise. Being these resources highly heterogeneous (from individual users to whole organizations...
Computer network cyber-security is a very serious concern in many commercial, industrial, and military environments. This paper proposes a new computer network security approach defined by self organized agent swarms (SOMAS) which provides a novel computer network security management framework based upon desired overall system behaviors. The SOMAS structure evolves based upon the partially observable...
Attack model is the foundation for organizing and implementing attacks against the target system in Attack Resistance Test. By redefining the node of the attack tree model and redescribing the relation of the attack tree nodes, we build a penetration attack tree model which can describe, organize, classify, manage and schedule the attacks for Attack Resistance Test. The organization method of the...
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting...
Today's Web applications and their respective business processes reside under the control of different organizations. Establishing federations between these organizations, i.e. bringing these business processes together by transcending organizational and security borders, raises a new class of security questions concerning the management of trust relationships between the autonomous bodies that wish...
We propose a systems analysis framework based on goal modelling and transactions for improved decision-making about security solution architectures - with a specific focus on layered security of physical spaces and assets. The framework assists in defining more complete security strategies as well as analyzing tradeoffs between security and other factors such as cost and privacy. Using the conceptual...
Confidentiality is one of the most important topics in computer security research. In order to check and ensure confidentiality, information flow models are widely used. These models support the specification of valid flows of information. Furthermore, they provide means to formally check whether a given system fulfills a certain security property within this model. In this paper, we propose an information...
We present a new approach for mutation analysis of security policies test cases. We propose a metamodel that provides a generic representation of security policies access control models and define a set of mutation operators at this generic level. We use Kermeta to build the metamodel and implement the mutation operators. We also illustrate our approach with two successful instantiation of this metamodel:...
The Fiat-Shamir paradigm for transforming identification schemes into signature schemes has been popular since its introduction because it yields efficient signature schemes, and has been receiving renewed interest of late as the main tool in deriving forward-secure signature schemes. In this paper, minimal (meaning necessary and sufficient) conditions on the identification scheme to ensure security...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.