The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Phishing is the criminal activity of enticing people into visiting websites that impersonate the real thing, to dupe them into revealing passwords and other credentials to carry out financial fraud. This less suspected and high profile attack lays a deceit trap to the unwitting and gullible customers to part with their sensitive credentials to unauthorized entities. The inherent suave and subtle vulnerabilities...
In home network environment, security is one of the most important issues that need to be addressed because the services provided by all kinds of household appliances are likely related with the privacy information of the residents. Although several access control mechanisms have been proposed in the last few years, these existing models always preserve all the access control policies in the home...
This paper targets deep packet classification (Layer 4-7) for applications within Firewalls and Intrusion Detection/prevention systems (IDS/IPS). Specifically targeting string matching applications, this paper will focus on processing of web-content, HTTP, at high speed (>;10 Gigabit). The main contribution of this work is in the field of combined payload search and HTTP decompression. In general,...
Service Oriented Infrastructures including Grid and Cloud Computing are technologies in a critical transition to wider adoption by business. Their use may enable enterprises to achieve optimal IT utilization, including sharing re-sources and services across-enterprises and on-demand utilization of those made available by business partners over the network. This paper presents a selection of common...
Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of loosely coupled information systems, of web services, and of human actors. This often requires exchanging and processing sensitive, personally-identifiable information, e.g., in e-employability and e-health applications. Supporting security in such a service-oriented environment...
Multimodal biometric face recognition using speech signal has engrossed much attention and has been applied in various domains primarily for surveillance, security & access control and law enforcement. In recent years much advancement have been made in face recognition techniques to cater to the challenges such as pose, expression, illumination, aging and disguise. However, due to advances in...
Biometrics based personal identification techniques have intrinsic advantages over traditional personal identification techniques but the security of biometric data is a major issue. The biometric based verification system works properly only if the verification system can guarantee that the biometric data has come from the genuine person at the time of enrollment. We introduced application in which...
Modern business goals are often fulfilled with workflows that may cross many organisations and utilise services on a variety of devices and/or supported by different platforms. Current workflows are inherently context-aware. Each context is governed and constrained by its own policies and rules to prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing...
In the latest years firewalls have seen some impressive technological advances (e.g. statefull inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security management technology is lacking. The paper proposes a secure model for firewall policy management. Our secure MVC model can be used as a framework for managing the firewall policy. We believe that...
Security problems arise in software systems are very challenging. Using program analysis techniques and some language based security rules can help in enforcing application-level security through control access to program resources and verification of control flow of the information inside the program based on some security properties. This paper presents a new job analyzer component for an intrusion...
As the Semantic Web has been applied in the Web Services to integrate data across different applications with the increasing development of the Semantic Web technologies, it is essential to maintain the security of the organizations involved in the Semantic Web Services. Security is a crucial concern for commercial and mission critical applications in Web-based environments. To guarantee the security...
The emergence of XML-based web services as a new software development paradigm increases the expectations of getting better software that address the various collaboration demands over Internet between organizations, or what's termed virtual Organization (VO). The development of appropriate identity management systems between these heterogeneous security domains will be the key enabler for such collaboration...
In this paper, we describe how security and privacy can be increased in user-centric Identity Management (IdM) by the introduction of a so-called IdM card. This IdM card securely stores and processes identity data of the card owner, an end user. The card represents a trusted device that supports the user in managing its digital identities and also in performing secure and privacy-enhanced service...
Research teams collaborating across institutional, geographical and cultural boundaries are increasingly common. Funding agencies including the National Science Foundation (NSF) and National Institutes of Health (NIH) strongly encourage virtual organization building and collaboration across institutions and disciplines. A set of software tools that enables scientists to efficiently share information...
The design of an efficient collaborative multi-robot framework that ensures the autonomy and the individual requirements of the involved robots is a very challenging task. This requires designing an efficient platform for inter-robot communication. P2P is a good approach to achieve this goal. P2P aims at making the communication ubiquitous thereby crossing the communication boundary and has many attractive...
This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious...
Grid portal is a secure web environment where user can monitor and execute grid applications, access grid resources, services, and collaborate with other users. A grid portal allows an organization to have a single URL that enables users to gain browser-based access to applications and any customized information in a virtualized, unified and secure way. The main requirement for this grid portal is...
Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers...
Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called firewall policy. Firewall policy is designed under the instruction of security policy. A network security policy is a generic document that outlines the needs for computer network access permissions. And it determines how firewall filters are designed. If inconsistencies, such as redundant...
Authentication in the document context refers to the ability to trace the origins of a document to a given person or device used to produce it or to a given time or place it was produced. The general approach typically involves comparing physical, visual and/or linguistic properties of a questioned source to reproducible properties of a known or genuine source. The challenges lie in defining acceptable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.