The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Depending on the user's attribute, Cipher text-Policy Attribute-based Encryption (CP-ABE) can achieve user's access control which can be widely used in cloud environment. The extended CP-ABE mechanism with multi-authorities (MA-ABE) is de-signed for the practical application. In all existing schemes, the user needs to execute the whole decryption operation. For mobile devices, it is time-consuming...
With the demand for ubiquitous access to the Internet, significant number of users is adopting wireless approaches for accessing the Internet. This drives us to investigate secure access control issue for mobile client. In this paper, we propose a precise access control scheme for identifier locator separation mapping based mobile Internet in order to accurately control whether a mobile client is...
This paper reports on applicability of the Chinese Remainder Theorem (CRT) based Group Key Management (CRTGKM) for cloud environment. The results of our experiments confirm that the cloud environment group key management schemes known as ACV-BGKM and AB-GKM require high computation time for key update and key recovery processes. Therefore, to reduce the computational cost, a CRTGKM algorithm of multimedia...
In network management, when it comes to security breaches, human error constitutes a dominant factor. We present our tool topoS which automatically synthesizes low-level network configurations from high-level security goals. The automation and a feedback loop help to prevent human errors. Except for a last serialization step, topoS is formally verified with Isabelle/HOL, which prevents implementation...
Voice over IP (VoIP) has attracted the attention of secure networks for its convenient deployment, easy management and multi-service carrying capability. However, security is a big problem that must be considered if VoIP is introduced into secure networks. Traditional methods to deal with security problems in VoIP are usually adopting encryption algorithms, enhancing authentication mechanisms, introducing...
We have investigated the design of a secure collaboration platform to support real-time information sharing across professional and organizational boundaries in the context of emergency animal disease response. The platform integrates cross-organisational eAuthentication and eAuthorisation technologies to enable access control of shared data resources between geographically distributed experts in...
In a community cloud, multiple user groups dynamically share a massive number of data blocks. The authors present a new associative data sharing method that uses virtual disks in the MeePo cloud, a research storage cloud built at Tsinghua University. Innovations in the MeePo cloud design include big data metering, associative data sharing, data block prefetching, privileged access control (PAC), and...
Medical treatment sometimes requires a case forwarding to a doctor who has a specific expertise. Typically, an electronic medical record (EMS) of a patient can be passed to another doctor without asking the patient because EMS belongs to the healthcare organization. Personal health record (PHR), however, is different because PHR is owned by an individual (e.g., patient) and all accesses to the PHR...
Cloud computing is being a potential role in providing services for utilizing a huge data in various application, as it is ubiquitous. In emerging growth of Cloud services been focused on security issues and optimal data storage used by consumers. Eventually, the Cloud storage is the best way to keep essential business data secure and accessible. Along with that, there are few important feature been...
In this paper, we survey access control models, protocols and frameworks in IoT. We briefly provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over the recent years (2011–2015). We stress the main challenges that would affect access control in IoT. Finally, based on our evaluation, we give hints of future research directions.
Since IoT devices can cause problems, such as invasion of privacy and threat to our safety, security in IoT is the most important element. IoT is an environment in which various devices to communicate an environment in which various devices communicate with one another without user intervention or with minimal user intervention. Therefore, authentication and access control technology between IoT devices...
The paper presents a new component for conventional video monitoring and security systems in air transportation, aiming at improving the overall system performance, eliminate nuisance alarms, optimize network bandwidth and systems storage occupation. Innovative analysis technologies were employed for the development of the new system. The proposed solution relies on a server application referred to...
The ubiquitous penetration of Machine-to-Machine (M2M) communications challenges the device management. Remote Entity Management is defined as generic functionality that can be shared by different M2M applications. The paper presents an approach to design RESTful Web Services for M2M device fault and performance management. Common Web Services operations are identified and mapped onto HTTP methods...
This paper proposes a framework for security services using Software-Defined Networking (SDN) and Interface to Network Security Functions (I2NSF). It specifies requirements for such a framework for security services based on network virtualization. It describes two representative security systems, such as (i) centralized firewall system and (ii) DDoS-attack mitigation system. For each service, this...
Outsourcing data to the cloud for computation and storage has been on rise in recent years. In this paper we investigate the problem of supporting write operation on the outsourced data for clients using mobile devices. We consider the Attribute-based Encryption (ABE) scheme as it is well suited to support access control in outsourced cloud environment. Currently there is a gap in the literature on...
Database as a service (DaaS) is a new paradigm based on the cloud computing platform. With the growing concerns on privacy, the user shope to have a security manner to store their data in the cloud. In order to improve the privacy protecting method for the sensitive data shared in the cloud, this paper proposes a privacy-preserving access control protocol based on multi-levels access control, Feldman...
A frequently denominated use case of Industrie 4.0 is plug-and-work. This use case not only requires the technical base to determine how and what information has to be exchanged during the startup of software and hardware components in the production environment, but also deals with very sensitive information which results in a high demand to secure these. In consequence, plug-and-work mechanisms...
Multiparty cloud computation can deal with the problem that the traditional homomorphic encryption can't operation on the ciphertexts generated by different users, and the final result is computed by cloud server. The trivial multiparty cloud computation doesn't take the access control to the final result into consideration. In reality, we perhaps do not want all parties to gain the result. In this...
This poster presents new perspectives for open and trusted mobile applications. The Near Field Communication (NFC) radio interface is widely available for smartphones. It is usually involved in payments, access control, and transport services. We describe an open experimental platform, developed by the MOBISIM project. The prototype provides contactless payments in legacy frameworks. It comprises...
An algebra is proposed for constructing and reasoning about anomaly-free firewall policies. Based on the notion of refinement as safe replacement, the algebra provides operators for sequential composition, union and intersection of policies. The algebra is used to provide a uniform way to specify and reason about OpenStack host-based and network access controls, in particular, security group and perimeter...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.