The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
We would like to welcome you to Valencia, to attend The 2nd International Conference on Fog and Mobile Edge Computing (FMEC 2017) in Valencia, Spain from May 8 to May 11, 2017. FMEC 2017 is becoming one of the most well-known international technical conferences in the areas of Fog and Mobile Edge Computing. We are much honored to serve this year as general chairs for this conference. We are also very...
We propose ‘VDroid’ a lightweight virtualization architecture based on operating system level virtualization technique for a smartphone. We modify Condroid architecture by addition of a system service called KSMManagerService to the host android framework and KSM daemon to kernel. We define the workflow, running criteria and detail integration of both KSMManagerService and KSM daemon. The results...
The investigation of fraud in the financial domain has been restricted to those who have access to relevant data. However, customer financial records are protected by law and internal policies, therefore they are not available for most of the researchers in the area of fraud detection. This paper aims to present the work of those researchers who have had access to data and present an interesting approach...
In the last decade, companies have become tend virtualized thanks to the use of outsourcing, the workforce has become more distributed, workplaces are increasingly distributed and outsourced and increasingly digital employees, with the philosophy of work anytime and anywhere. This development has, and has had a very big impact on mobile platforms and infrastructure, on the one hand, the adoption of...
Due to increased use of smartphones in enterprise setup several security threats have also been penetrated in it. Threats and risks become increased, especially when these smartphones get connected to enterprise network via GSM, GPRS, Bluetooth or Wi-Fi. Security researchers are also working on offering best security solutions against these threats and attacks. This area is less explored yet; that...
Health checking framework is considered as present progressive methodology in cloud applications. It is useful in enhancing the social insurance administration in today's reality. It additionally represents a genuine danger on both customer's security and protected innovation of observing administration suppliers, which could stop the wide selection of versatile wellbeing innovation. This paper is...
Mobile technologies continue to improve patients' quality of care. Particularly, with the emergence of Cloud-based mobile services and applications, patients can easily communicate with their physicians and receive the care they deserve. However, due to the increased number of privacy threats in mobile and Cloud computing environments, maximizing patients' control over their data becomes a necessity...
Privacy threats are considered as very serious issues in Internet-based applications such as e-services since there are good opportunities to malicious attacks. Protecting the user from being observed when requesting an e-service is a fundamental right that any user should have. The unobservability is among the basic privacy properties. However, most of the existing privacy preserving techniques has...
With the rise of mobile technology, modern organizations are encountering rapidly evolving demands to their communications and data infrastructure. The "Bring Your Own Device" (BYOD) approach places significant new demands on how enterprises approach security, device management, cross-platform support and data distribution. Mobile devices are powerful, lightweight and rapidly supplanting...
An agile, lightweight, but secure extensible hybrid application container and deployment mechanism for mobile devices has the potential to provide improved cross platform support, reduced development lifecycle time and a consistent application security model within large organizations. We demonstrate how such an architecture can provide a set of security and mobile device management interfaces to...
Decentralized systems are systems-of-systems whose services are governed by two or more separate organizations under distinct spheres of authority. Coordinated evolution of the various elements of a decentralized system may be difficult, if not impossible, as individual organizations evolve their service offerings in response to organization- and service-specific pressures, including market demand,...
The present is a report of an exploratory case study about using an Enterprise Architecture method for addressing the business transformation challenges of embedded mobile provisioning in the telecommunications industry. The study focused on the analysis of the provisioning process for gathering transformation requirements, translating them into business objectives and deriving a set of strategic...
We describe a swarming-agent-based, mixed initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level: where they provide system guidance while lower-level agents carry out tasks humans are...
Wireless mobile connectivity is gaining ground in enterprises IT strategy and, in many businesses, it is fast becoming critical for survival. Mobile workers often need wireless Devices and applications to access data at office remotely.
Communications nowadays represent one of the most dynamic fields in the world. In fact, there is no activity sector that can do without communication, either in its classical forms, i.e. telephony, telegraphy, fax, etc., or its modern ones - data transmission, smart mobile communications and the Internet. State communications, regarded as critical infrastructure elements, are meant to facilitate communication...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
Mobile communication has been heavily applied in the current healthcare system for health information exchange. Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare...
This paper introduces the Windmill method for constructing situation sensitive communication support systems for organizations consisting of a network of autonomous professionals involved in standard duties encountering occasional incidents of a time-critical nature for which they have to call for help. The Windmill method is based on statistical data filtering techniques for ranking available resources...
As the world is becoming more and more flowing, networked, and composite organizations will continue to be more mobile than ever by. One part of the challenge for future mobile organizations is how can they communicate and exchange information securely within their clients, employees, and all other stockholders. Wireless communications offer organizations and individuals many benefits such as portability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.