Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
Third-party libraries (3PLs) are widely introduced into Android apps and they typically request permissions for their own functionalities. Current Android systems manage permissions in process (app) granularity. Hence, the host app and the 3PLs share the same permission set. 3PL-apps may therefore introduce security risks. Separating the permission sets of the 3PLs and those of the host app are critical...
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health...
It is expected that there are a variety of energy resources to be jointly operated by the power system in the future. Through jointly operating all types of energy resources via the Internet, Energy Internet is a promising solution to increase energy efficiency. However, the increasing integration of energy resources inevitably imposes challenges in secure communication in the Energy Internet. Resourceful...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
The growth of electronic devices connected to the Internet brings new concerns. These include security, privacy, user rights, data generation, spectrum management, and liability. Countries and organizations are developing policies to accommodate the Internet of Things (IoT). In this paper, we identified IoT indicators useful for policy makers. We considered four categories of indicators. These were:...
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source,...
Conflicts between non-functional requirements (NFRs) mean that achieving one requirement can impact another one. This can happen if a particular procedure (called "operationalizing softgoal" in the literature) favors the first characteristic but creates difficulty for the second one. Currently, the conflict identification uses catalogs to indicate conflicting NFRs. They focus on NFRs that...
This paper provides the challenges in the design and investigation of E-commerce and M-commerce systems, besides providing various factors for success. Modeling of e-Commerce is necessary as it measures the success and helps in improving the site to achieve the same. The success of an E-Commerce site depends on different parameters and their relative weightage. Hence a systematic mathematical model...
The Internet disruption has resulted in an exponential increase in the growth of new technologies [1] and resultant technology disruptions within the workplace [2]. With the rapid changes in the technology landscape, Chief Information Officers (CIO's) and key decision makers need to learn to maneuver though the plethora of emerging technologies that can result in business model innovation [3] and...
This paper is an extension of my earlier paper [1]. It examines the continuing growth of this problem, and the likelihood that it will continue to get worse. Since the previous paper, the author was contacted by a lawyer involved in litigating a dispute related to TLDs. As noted in the previous paper, misdirected communication has obvious security and privacy ramifications and is an age old problem...
In this paper, two different packet timing and IP ID based network steganography approaches have been proposed to provide confidential transmission of information. In the proposed packet timing approach, it is seen that the bandwidth is higher than the previous methods. The proposed IP ID field based approach has been found to be more effective than previous methods in ensuring the uniqueness of the...
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people's lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial...
This paper describes the implementative aspects, the main challenges and the adopted solutions for an Internet voting system designed by LepidaSpA and dedicated for specific elections a Land Reclamation Authority in Italian Emilia-Romagna region. Besides the description of the voting system, we also present an efficient and simple administration tool for the management of all the election phases,...
Online banking is a substantial service in the enlargement strategy of the modern bank sector. Nevertheless, this service has not been widely used, because of users are still scared of the risks of online transactions. Thus, the in-depth and distinct works of risks in risk awareness are an essential and meaningful assignment for the banking sector. This study investigates the role of perceived risk...
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The private data of individuals and large companies, including health-related data, user bank accounts, and military and manufacturing data, are increasingly accessible via the Internet. Because almost all data is now accessible through the Internet, protecting these valuable assets has become a major...
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.