The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
In the recent years, we have observed the development of several connected and mobile devices intended for daily use. This development has come with many risks that might not be perceived by the users. These threats are compromising when an unauthorized entity has access to private big data generated through the user objects in the Internet of Things. In the literature, many solutions have been proposed...
Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based...
The Personal Healthcare Record (PHR) enables the patients or other authorized persons to manage their own medical records in a centralized way, and it (PHR) emerges as a patient-centric model which helps in the health information exchange. The PHRs can be stored in the server maintained by the hospital/clinic or other trusted third party including cloud provider. However, the data must be secure in...
Nowadays cloud servers become the primary choice to store and share data with multiple recipients. The storage of personal information on cloud servers may result in the exposure of confidential information to unauthorized individuals or organizations. Several solutions employing attribute-based encryption schemes have been proposed for secure sharing of data using cloud servers. However, most of...
The advent of cloud computing motivates business organizations to migrate their complex data management systems from local servers to cloud servers for scalable and durable resources on pay per use basis. Considering enormous users and large amount of documents at cloud servers, there is a requirement of an access control scheme, which supports fine-grained cum flexible access control along with "Query-Response"...
Through the simplifying assumption that a Thing has a single use or a small number of intended uses, it is possible to reduce the threat surface of the device by constraining the communication paths needed for those uses. This is accomplished using a small number of extensions to IEEE 802.1AR, a YANG model, DHCP, and IEEE 802.1AB, where a manufacturer maintains an online presence that is used inter...
Cloud computing is a newfound service which has a rapid growth in IT industry recent years. Despite it has a huge contribution to the development of the technology and society, the cloud still exists some security deficiencies to block its development such as data leakage, illegal access and privacy risks. Hence, access control and user authentication is very important in cloud environment. Some related...
The current security models on mobile devices do not provide the level of protection required to handle sensitive data, such as protected healthcare information. In this paper, we introduce a Distributed Android Security Framework (DASF). DASF is a custom security framework for Android-based mobile devices that allows the enforcement of dynamic security policies on an application's privileges and...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
Voice over IP (VoIP) has attracted the attention of secure networks for its convenient deployment, easy management and multi-service carrying capability. However, security is a big problem that must be considered if VoIP is introduced into secure networks. Traditional methods to deal with security problems in VoIP are usually adopting encryption algorithms, enhancing authentication mechanisms, introducing...
Cloud computing is being a potential role in providing services for utilizing a huge data in various application, as it is ubiquitous. In emerging growth of Cloud services been focused on security issues and optimal data storage used by consumers. Eventually, the Cloud storage is the best way to keep essential business data secure and accessible. Along with that, there are few important feature been...
In this paper, we survey access control models, protocols and frameworks in IoT. We briefly provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over the recent years (2011–2015). We stress the main challenges that would affect access control in IoT. Finally, based on our evaluation, we give hints of future research directions.
The paper presents a new component for conventional video monitoring and security systems in air transportation, aiming at improving the overall system performance, eliminate nuisance alarms, optimize network bandwidth and systems storage occupation. Innovative analysis technologies were employed for the development of the new system. The proposed solution relies on a server application referred to...
A frequently denominated use case of Industrie 4.0 is plug-and-work. This use case not only requires the technical base to determine how and what information has to be exchanged during the startup of software and hardware components in the production environment, but also deals with very sensitive information which results in a high demand to secure these. In consequence, plug-and-work mechanisms...
This poster presents new perspectives for open and trusted mobile applications. The Near Field Communication (NFC) radio interface is widely available for smartphones. It is usually involved in payments, access control, and transport services. We describe an open experimental platform, developed by the MOBISIM project. The prototype provides contactless payments in legacy frameworks. It comprises...
Resource discovery in special operations has been recognized as a challenging research issue. This is due to the dynamic nature of emergency intervention with its normally limited resources. We believe that the security of communications among involved parties in special operations such as military intervention missions is crucial for the success of such operations. In this paper, we develop a solution...
In service oriented computing, authentication factors have their vulnerabilities when considered exclusively. Cross-platform and service composition architectures require a complex integration procedure and limit adoptability of newer authentication models. Authentication is generally based on a binary success or failure and relies on credentials proffered at the present moment without considering...
Cloud computing is a newfound service that has a rapid growth in IT industry during recent years. Despite the several advantages of this technology there are some issues such as security and privacy that affect the reliability of cloud computing models. Access control and user authentication are the most important security issues in cloud computing. Therefore, the research has been prepared to provide...
Cloud computing a distributed network for sharing data over internet, serves as an online data backup with scalability. The paper describes various categories of clouds depending on the usage of cloud and also on the services provided by the cloud. Data security is one of the major challenges faced by cloud providers and cloud users. Cryptography is suggested as the appropriate solution for securing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.