The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent days, the areas of internet and network computing recognize a fast development, especially with distributed computing and efficient storage technologies that make sharing and diffusion of system resources more easier. However, if the information system didn't adopt a security policy it may undergo serious damages. In this paper, we will propose a logical security scheme based on an access control...
In this paper, we propose a security framework, looking at different policies for data access control in the mobile environments. We have started with extending the Platform for Privacy Preferences (P3P) policy for controlling the data access. The aim is to modify the P3P policy and to use it in the security capsule of a mobile handset. The service provider can publish the P3P policy in the WebServices...
In these days, there are many attempts for convergence with several types of networks. Jang proposed a new initial setup in SNMPv3 to enhance the secure network operation suitable for sensor networks. This model requires more time at initial step than previous models. For mobile ad-hoc networks where connections are established dynamically, simplification of initial step is needed. Therefore, we propose...
Pervasive computing environment is viewed as an incorporated space comprised of mobile users, system services, system resources, and sensors embedded in physical environment. Users can access resources and obtain services anytime, anywhere. Trust is crucial to secure interaction among previously unknown principals. Traditional trust solutions normally depend on centralized trust certification authorities,...
In order to encapsulate data and to convey information more efficiently and more security, a draft frame based on active block ciphers for application layer of Internet which could transmit orange data into semantic security and semantic integrity was designed according to scalable purpose. To different network environment, there were different intelligent choices about block cipher algorithms to...
The paper describes a revised version of Crypto-fraglets, and an enhancement of the framework with access control mechanisms. Fraglets is an interesting computing model that has connections with communication protocols, formal rewriting systems and biological systems. Indeed, fraglets basic mechanisms resemble bio-chemical reactions.
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.