The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the most important issues in traditional and modern networks architecture is security. Data integrity and authenticity are the most critical points that a network security model should protect and ensure. Authentication, Authorization and Accounting model (AAA Protocol) is one of the most portable security concepts. Authentication acts providing proof of authenticity for stored data and verifying...
With the expansion and the convergence of computing and communication, the dynamic provisioning of customized processing and networking infrastructures as well as resource virtualization are appealing concepts and technologies. Therefore, new models and tools are needed to allow users to create, trust and exploit such on-demand virtual infrastructures within wide area distributed environments. This...
Secure media broadcast over the Internet poses unique security challenges. One important problem for public broadcast location-based services (LBS) is to enforce access control on a large number of subscribers. In such a system, a user typically subscribes to an LBS for a time interval (a, b) and a spatial region (xbi, ybi, xtr,ytr) according to a 3-dimensional spatial-temporal authorization model...
The paper analyzed the security threats and system flaws of present proxy authorization signatures, and a forward secure proxy authorization signature scheme with conditionally anonymity based on ECC (elliptic curves cryptosystem) was presented. The identity blinding and probabilistic encryption algorithm of the scheme enable the proxy signer to be conditionally anonymous for secrecy protection, and...
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security...
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often to...
In modern manufacturing grid, different security mechanisms of systems bring usage complexities and security risks. Single sign-on (SSO) can enhance the enterprise applications security and improve the overall efficiency. A security infrastructure is proposed by the token based authentication protocol in intranet. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos and SPNEGO...
IPsec is a security architecture for Internet, which is directly positioned on the top of the IP layer. The major part of IPsec consists of the Internet Key Exchange protocol, now in its version 2. IKEv2 offers authentication, authorization and key agreement services. One of the possible authentication mechanisms in this protocol is based on X509 certificates and the PKI infrastructure. As we are...
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by network service providers if multicast data distribution is used. However, accounting for the resources consumed by subscribers becomes essential. Using an e-commerce (payment recovery) operational environment, in turn, requires support for security properties such as authentication,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.