The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to its computing power and storage capacity, the Cloud has been integrated with Cyber-physical systems, thus creating complex and powerful Cyber-physical Cloud platforms. It is important that these systems have proper security and clear specifications in order to be trustworthy and reliable. To address these requirements and issues we propose a semantic, ontology-based architecture for Cyber-physical...
The European VPH-Share project develops an integrated modular and generic framework for understanding physiological processes in the human body in terms of anatomical structure and biophysical mechanisms. One of the major challenges besides managing and sharing a wide variety of heterogeneous bio-medical data sources relevant to the VPH community is facilitating the search and exploration of these...
With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the...
An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose a solution for anonymous yet reliable access control and accountability based on ring and group signatures.
Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this paper, we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.