The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are a variety of ways to ensure the security of data in the cloud depending on the set of anticipated concerns. Many cloud storage secure data either by encrypting data on transfer, or by encrypting data at rest. These security protections seem very different, and currently there are no common goalbased security components for comparing them. In this paper we investigate the security components...
Cloud storage is becoming an option for users in keeping their data online, but it comes with the security threats and challenges of protecting their data from threats. Many security frameworks have been suggested by existing studies, governing bodies, industry standards etc. as guidelines to be implemented by cloud service providers (CSPs) but the complete set of controls cannot be fully implemented...
In his recent memoir, William Waldegrave wrote that no country run by John Major and Robin Butler was likely to be in much danger of systemic corruption. The fact remains that a quarter of a century ago, John Major, with the guidance and support of his cabinet secretary, decided to establish the Committee on Standards in Public Life under the chairmanship of Lord Nolan. The apparent prevalence of...
Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions and although a wealth of law and regulation has emerged, the technical basis for enforcing and demonstrating compliance lags behind. Our Cloud Safety Net project aims to show that Information Flow Control (IFC) can augment existing security mechanisms and provide continuous enforcement of extended. Finer-grained...
Background modeling plays a key role of event detection in intelligent surveillance systems. Gaussian Mixture Model (GMM) is a popular background modeling method in latest surveillance systems. However, the model will result in object fragmentation if the objects' color is likely to its background. In our paper, we present a different mechanism which compares the area of original pictures with background...
To meet future challenges of energy grids, secure communication between involved control systems is necessary. Therefore the German Federal Office for Information Security (BSI) has published security standards concerning a central communication unit for energy grids called Smart Meter Gateway (SMGW). The present security concept of the SPIDER project takes these standards into consideration but extends...
After analyzing and quantifying the network information security elements: confidentiality, integrity and availability, this paper defines the network security confidentiality vector, the network security integrity vector and the network security availability vector, and also builds the hierarchical indicator system of network security evaluation. Based on the positive and negative ideal comparison...
An integrity level defines a required level of confidence that a system satisfies critical properties related to relevant risk criteria. However, integrity level terms and definitions differ across industry sectors, and this hampers a common understanding and application of integrity levels.
Pipeline (Asset) Integrity management is now a major focus for most pipeline operators and asset holders. The reason for this renewed interest may be attributed to a couple of factors, which include new legislation, technical advancements, strict penalties for accidental release and ageing of vast networks of pipelines across the world. Integrity management is now mandatory for all asset holders....
This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements. Then, we analyze the cloud security requirements in terms of the fundamental issues, i.e., confidentiality, integrity, availability,...
Precise Point Positioning (PPP) has been one of the major research interests in the Global Navigation Satellite System (GNSS) research field in recent years. PPP is a promising method because it can provide centimeter level positioning accuracy by using only one GNSS receiver, without using local reference networks. It is clear that this can provide cost savings compared to the traditional Real Time...
Recently, the number of remote systems using the Internet has been increased and the services provided by such systems get various. They are required to have high dependability. The existing evaluations have some problems. For example, the evaluations based on RASIS are vague and those provided by Japanese government are very complicated. The existing evaluations are not uniformed, not understandable,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.