Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The most critical requirements for the lifetime value of a system are its nonfunctional requirements (NFRs) such as reliability, security, maintainability, changeability, etc. These are collectively known as the “ilities,” and they are typically not addressed in system design until the functional architecture has been completed. In this paper, we propose the use of quality-based design that modifies...
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
The Wireless Sensor Networks (WSNs) are widely being used for monitoring different environments and are very effective for monitoring those areas where human presence can be critical. Meanwhile, Cloud Computing (CC) has emerged as a very large scale computational and storage service with pay-as-you-go usage model which has taken the WSN to entirely a new paradigm. This integration of WSN with CC provides...
Cloud data provenance is metadata that records the history of the creation and operations performed on a cloud data object. Secure data provenance is crucial for data accountability, forensics and privacy. In this paper, we propose a decentralized and trusted cloud data provenance architecture using blockchain technology. Blockchain-based data provenance can provide tamper-proof records, enable the...
The continuous discovery of exploitable vulnerabilitiesin popular applications (e.g., web browsers and documentviewers), along with their heightening protections againstcontrol flow hijacking, has opened the door to an oftenneglected attack strategy—namely, data-only attacks. In thispaper, we demonstrate the practicality of the threat posedby data-only attacks that harness the power of memorydisclosure...
Security and reliability are the major concern of our daily life usage of any network. But with the swift advancements in network technology, attacks are becoming more sophisticated than defenses. Although firewalls and router-based packet filtering are essential elements of an overall network security topology, they are not enough on their own. So, to brace the network from unauthorized access the...
Most architectures are designed to mitigate the usually undesirable phenomenon of device wearout. We take a contrarian view and harness this phenomenon to create hardware security mechanisms that resist attacks by statistically enforcing an upper bound on hardware uses, and consequently attacks. For example, let us assume that a user may log into a smartphone a maximum of 50 times a day for 5 years,...
The rapid increase in the number and diversity of smart devices connected to the Internet has raised the issues of flexibility, efficiency, availability, security, and scalability within the current IoT network. These issues are caused by key mechanisms being distributed to the IoT network on a large scale, which is why a distributed secure SDN architecture for IoT using the blockchain technique (DistBlockNet)...
The expanding applications of cloud computing has urged the researchers with strong requirements for developing trust management models. It is essential to create trust management system that is adoptable for improving the privacy of the consumers, enabling the service availability, providing security to both cloud service providers and consumers of cloud services. Due to the dynamic cloud environment...
The memory system is a fundamental performance and energy bottleneck in almost all computing systems. Recent system design, application, and technology trends that require more capacity, bandwidth, efficiency, and predictability out of the memory system make it an even more important system bottleneck [103, 110]. At the same time, DRAM technology is experiencing difficult technology scaling challenges...
The OpenFlow paradigm embraces third-party development efforts, and therefore suffers from potential attacks that usurp the excessive privileges of control plane applications (apps). Such privilege abuse could lead to various attacks impacting the entire administrative domain. In this paper, we present SDNShield, a permission control system that helps network administrators to express and enforce...
Integrated Modular Avionics (IMA) in existing deployments is a collection of inter-connected avionics equipment supported by wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secured so that a malicious user cannot access them directly, then this simplifies the security management of the network. However, substituting the wired network...
Cloud Computing is a Service Delivery Mechanism. Computing resources are delivered as a service over the network. These services are Scalable, Autonomous, and Cost effective in nature. Cloud Computing is responsible for the exponential growth of IT Industry. In spite of having so many advantages it has various security challenges that cannot be ignored. In order to make the Cloud Computing all the...
Digital forensics is used to help investigate cybercrime. Because of its characteristics and rapid adoption, the cloud requires its own form of forensics, which must be reliable. The authors have developed the Open Cloud Forensics (OCF) model and FECloud architecture, which would enable effective cloud forensics.
Wireless Sensor Networks (WSNs) are constrained by a limited energy sources. Trust in a WSN is defined as the amount of confidence obtained from the individual node with respect to its data collecting, composing and communication (C3) probability with other peered nodes. Trustworthiness and energy optimization of Wireless Sensor Networks (WSNs) is an active research topic. Trustworthiness of a WSN...
The diversity, continuous expansion and the large number of smart grid resources increase the complexity of such systems and arise the need to find a new way to manage these resources and, at the same time, reduce the complexity in the control and monitoring operations. Moreover, smart grid Systems are considered critical systems requiring reliable and real time data delivery and an efficient, flexible,...
This paper has discussed about smart transportation services in cloud (Cloud-STS) for safety and convenience. STS provide driver centric board services in the cloud networks. STS composed of Vehicle to WiFi networks (VtoWiFi), Vehicle to Cloud Network (VtoCN), Vehicle to Vehicle (VtoV), and Cloud Network to service provider (CNtoSP). The idea is to utilize the (WiFi enabled) Smart Highways and 3Dcamera...
Information transmission in the marine scenario utilizing wireless communications is unique method that empowering the technology for the evolution of imminent marine-surveillance systems and sensory networks. Under-water wireless sensor network (UWSN) in one of the auspicious technology for marine observation. The applications of underwater sensing has several domain that range from oil industry...
Although critical for delivering resilient, secure, efficient, and easily changed IT systems, cross-technology, cross layer quality defect detection in IT systems still faces hurdles. Two hurdles involve the absence of an absolute target architecture and the difficulty of apprehending multi-component anti-patterns. However, Static analysis and measurement technologies are now able to both consume...
Cloud service certifications attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt the reliability of such certifications. We argue that continuous auditing of selected certification criteria is required to assure continuously reliable and secure cloud services and thereby...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.