The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) is a rapidly growing technology in recent years. It represents an extension of the Internet into the physical world embracing everyday objects. In consequence, users' privacy and security are becoming a great challenge. To cope with this issue, sophisticated approaches are needed to guarantee these services and hence ensure a large-scale adoption of IoT. In our work we...
In this paper we propose a security policy; based on normative multi-agents systems for complex applications. Our idea, focus on the notion of the norm inside a multi-agents system, permitting to influence and guides the agents community behavior, in order to ensure the security of the whole system. The adoption of the multi-agent paradigm is justified by the fact that the latter fits well with the...
The Mediterranean ports play a crucial role in the long-term economic growth of the local and regional communities providing numerous maritime services. They are situated close to the international trade routes and are the main hubs with the necessary infrastructure for the accommodation of transhipment cargo, connecting with all regional ports. Thus, the protection of the ports' infrastructure may...
We present the practical context, design rationale and application basics of a domain ontology capturing industry standards for defining, controlling and auditing IT Governance.
Enabling cross-organizational cooperation in ubiquitous computing environments poses new security challenges that concern particularly the interoperability of security management systems and the security policies of each organization. In this paper, we present a semantic framework for cooperative security management processes design in a cross-organizational context. Our framework is based on a hybrid...
Recent years witnessed an ever growing impact of trust in the decision-making process within virtual communities. The inherent decentralized and open nature of such environments produced new challenges that received, up to now, little attention. For example, the individual and collective trust co-influence remains an unexplored issue. In this paper we are considering how user-centred and community-centred...
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. To achieve this goal, one of the problems is how to continuously monitor/capture and interpret the...
In present-day military security operations threats are more difficult to reveal than in conventional warfare theatres, since they take place during the course of normal life. These maritime missions often take place in littoral environments, where acts of piracy, drug trafficking and other threatening events become obscured in the crowd of everyday fisheries, cargo traders, ferries and pleasure cruises,...
The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that unobtrusively support to contextual data collecting, information sharing and security privacy controlling. In this paper, we motivate a human-centric design for such an infrastructure to support context-aware applications. A novel peer to peer based semantic...
One of the key motivations of policy-based management is flexibility and adaptability to existing infrastructure and change management. In the context of security, modern policy languages such as XACML are extensible and support natively the expression of new information and manipulation operations. However, policy engines, which evaluate users' requests according to policies, may not support this...
Non Functional Requirements (NFRs) are relative, so are the conflicts among them. In our previously developed catalogue of NFRs conflicts it can be observed that a number of specific pairs of NFRs are claimed to be in conflicts in some cases but they are also claimed not to be in conflict in the other cases. These relative conflicts occur because the positive or negative relationships among NFRs are...
This paper describes how software is able to autonomously adapt its security mechanisms based on knowledge from security ontology. Security adaptation is required because a software's environment changes during run-time. Thus, all security requirements cannot be defined beforehand. To achieve security adaptation, we have combined a security ontology that defines security mechanisms, security objectives,...
End-to-end security in collaborative system has two inferences: the secure delivery of service and the `due usage' of it. The fulfillment of this requirement involves re-thinking the security policy model of collaborative systems. This paper analyses the factors that impact security in such systems. Based on this, a general architecture is proposed with a collaboration-based policy model specified...
Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships,...
The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure...
Pervasive Environments offer new opportunities for users to dynamically access resources and services based on information characterizing their situation (context), generally assuming that this information is correct and trustworthy. In this scenario, the Quality of Context information (QoC) plays an important role for improving context-based adaptation processes and for ensuring the correct behavior...
In the near future, the trend of user-generated content and services currently observable in the Internet domain will also affect the mobile environment: mobile users will become able to easily create content and small services while on the move and offer them to social communities. Mobile users will no longer be pure consumers, they will also become producers and providers of mobile content and services...
Ubiquitous computing environment pursues context-aware in order words personalized service by collecting contexts through sensors located over wide area and presenting the service automatically depending not on the user's request but on the situations that are needed. But in order to provide the personalized service, contexts collected through various sensors are needed and they include private information...
In order to solve the contradiction between information sharing and security privacy in the ubiquitous computing environment, a novel context policy management framework based on ontology is presented. The semantic specification of policy and dynamic policy implementation are described. And the usefulness and flexibility of our proposed framework are demonstrated by a typical ubiquitous computing...
A common challenge for applications requiring information and knowledge fusion is the conversion of data streams into knowledge adapted to the context of usage. In the context of the project Integrated Mobile Security Kit, this paper focuses on the knowledge fusion sub-system. It integrates different fusion aspects based on a common domain model and embedded into a distributed and mobile infrastructure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.