The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper suggests an adaptive access algorithm to decide the access control to the resources using an improved RBAC technique to solve more complex and difficult problems in the cloud computing environment. And the proposed model determines dynamically security level and access control for the common resources. Therefore, it is supposed to provide appropriate security services according to the dynamic...
This paper proposes a method to detect the Internet Key Exchange (IKE) phase 1 messages in IPSec VPN, which is called Context-based Deep Packet Inspection (CDPI). In conventional IPSec VPN detection methods, the packet filter firewall only detects the heads of the IP packets and other protocols. Therefore, if the attackers impersonate messages of the same heads as the actual IPSec messages, the conventional...
Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented...
In our previous work, a hybrid architectural scheme was proposed to migrate Web sessions between PCs. Only the client-side of the work was however achieved. The work included developing a Web browser extension and creating a new service, namely content sharing and session handoff. This further research explores the proxy-side of the architecture. It entails creating new services that prevent abuse...
In this paper, we review the currently proposed, and most potential, host-centric multihoming solutions by the Internet Engineering Task Force. The concerns, related to the scalability and performance of the global routing system in current and in the IPv6 Internet, resulted in the selection of host-centric approaches to multihoming. It strengthens the end-to-end nature of the Internet, which proved...
As the Internet continues to shape and reshape our lives, there is a parallel phenomenon taking place in wireless communication which is equally influential. Mobile communication has proved to be a major paradigm in the history of human communication. As both the Internet and mobile telephony continue their dramatic advances, there is a lot of requirement that should be available such as valid IP...
Web 2.0 users need usable mechanisms for sharing their content with each other in a controlled manner across boundaries of content-hosting or application-service providers (CSPs). In this paper, we describe the architecture, design, and implementation of a proposed system for Web 2.0 content sharing across CSPs. With our approach, users use their existing email account to login to CSPs, and content...
Recently, small base stations such as femtocell and picocell are drawing attention as new components of wireless access networks. These small base stations are used not only to expand the wireless area within a large building, but also to increase bandwidth capacity and reduce the load on the core network. If multiple femtocells are deployed in an office building to expand the communication area,...
The reconfiguration router unit (RRU) is one of the most effective solutions to improve router function extend. It can satisfy the urgent need of multi-network and multi-business. Component composition and compositional reasoning are the core technologies and frontier research areas in RRU. In the process of component composition, resource-control of router is the most important factor. How to detect...
This paper presents an on-going work, which aims to build a generic framework for the conception and the development of ubiquitous applications. This work is based on a model driven engineering approach and pays attention to possible failures and to the use of virtual reality to improve the quality of the experience for the user.
Open, decentralized networks such as Internet are increasingly heterogeneous and dynamic. Applications running over such networks must be able to cope with resource restrictions and operate under the most diverse conditions. Providing multiple services over the same network has enormous effect on scalability, performances and cost of this network. Selecting a proper concept of network for mass market...
Efficiency and fairness are main objectives in any system design and many choices in life are made based on their tradeoffs. In this paper we introduce a framework for the evaluation of efficiency-fairness tradeoffs that would provide a sound basis for network providers and social planners to provide or plan for an equitable access to the Internet to a diversity of users with different needs and financial...
Today users are getting used to have many heterogeneous devices available in their surroundings. This opens great opportunities to build pervasive communication environments. Pervasive communications are usually user-centric in nature, as they should target sessions to users rather than their specific devices. Mobility is a key issue in such context: users often move and that implies different devices...
As communication systems and technology become more advanced and complex, it will be increasingly important to focus on users' individual needs. Personalization can range from simple cosmetic factors such as customised ring tones to the complex tailoring of the presentation of a shopping Web site to a user's personal interests, or highly personalized eHealth systems including sensor networks. Personalization...
Context-aware applications and services require ubiquitous access to context information about the users or sensors such as preferences, spatial & environmental data, available connectivity, and device capabilities. Systems for the brokering or the provisioning of context data via wireless networks do so with centralized servers or by employing protocols that do not scale well with real-time distribution...
The goal of the ubiquitous connectivity is to enable mobile users to be permanently and transparently connected to the Internet, with the desired quality of service. In such an environment, it becomes very difficult for service providers to satisfy the needs of users. A solution is to assign a profile to each user in order to optimize and automate the dynamic service level negotiation. These mobile...
Mobile telecommunication is evolving rapidly. People no longer only communicate with each other regardless of time and place, but also share other information that is important for tasks with which they are involved. In response to this growing trend the MediaSense framework addresses the intelligent delivery of any information to any host, anywhere, based on context-aware information regarding personal...
A proliferation of mobile devices with several bundled network access technologies is taking place, which when combined with the wide deployment of more wireless networks, creates an unprecedented multiaccess environment. At the same time, though, communications become far more complex, if one wants to fully take advantage of the opportunities unveiled in this new setting. In recent years there has...
Digital ecosystems are not "created", they form and evolve wherever their users guide them. Moreover, usage patterns within digital ecosystems are not bound to one particular technology. A computational neurologist, for instance, may move back and forth between laboratory experiments, grid infrastructure for simulation and analysis, collaborative environments and publication platforms. This...
In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.