The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The service-oriented computing paradigm and its application to support e-Infrastructures offers, at least in principle, the opportunity to realise platforms for multi- and inter-disciplinary research. Augmenting the service-oriented model for e-Research are mechanisms for services to be coupled and enacted in a coordinated manner through workflow environments. Typically workflows capture a research...
With the growth of modern systems and infrastructures, automated and intelligent response systems become the holy grail of the security community. An interesting approach proposes to use dynamic access control policies to specify response policies for such systems. These policies should been forced when an ongoing attack, that threatens the monitored system, is detected. However, existing work do...
Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new developments in multifactor authentication, advances in malware protection and many more. During a similar period of time the industry has seen the need for network infrastructure which...
With the requirements of mobility, flexibility, and rapid response, public safety Mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. This special field communication brings new security challenges. In this paper, we propose a key agreement scheme with voting receiver...
In [1], Benenson, Gedicke and Raivio propose a user authentication scheme for sensor networks. The scheme considers how to organize access control to a wireless sensor network for authorized users and rejection of unauthorized adversaries. In the first part of this paper we analyze and optimize the proposed authentication scheme. The second part deals with distribution of public keys to sensor nodes...
The portable storage market environment is rapidly changing due to the emergence of USB memory. USB memory is used as a portable storage device by many users. However, due to the high portability of USB memory, USB sticks are frequently lost and stolen. In this Paper we suggest a secure user authentication method in which it is hard to guess the password and bypass authentication. In addition, security...
Existing security models for RDF use RDF patterns for defining the security policy. This approach leads to a number of security rules which rapidly tends to be unmanageable. In this paper we define a new security model which follows the traditional approach of creating security views, which has long been used by SQL database administrators. Our model first logically distributes RDF data into SPARQL...
Wireless sensor network (WSN, Wireless Sensor Network) is a kind of autonomous network with sensor nodes. It is different from traditional RFID system that the WSN is through the distribution of sensor nodes in different locations to monitor environmental conditions. The collected data from sensor nodes were sent back to the base station for further analysis and processing to compensate the shortage...
Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortunately, whilst the popularity of mobile devices has increased, a corresponding increase can also be identified in the threats being targeted towards these devices. Security countermeasures such as AV and firewalls are being deployed, however, the increasing sophistication of the attacks requires additional...
To resolve the question: penetrate firewall and accurately identify the remote host operating system, research deeply on the ARP protocol and the TCP/IP protocol stack, provide a mothed about host detection through firewall, describes the TCP port scanning process, design a fingerprint storehouse, TCP bag first part and operating system detecting process, develop the network security assessment system...
Magnetic stripe cards are widely used by many different organizations to provide both convenience and security. These types of cards are often relied on identification and personal authentication. However, they are not designed to withstand attacks that use the sophisticated technologies available today. For instance, skimming takes advantages of the fact that the digital content of a magnetic stripe...
Development of theory and technology of wireless sensor network (WSN) has made it possible to satisfy the new demand for location-based services such as location based access control. However, most of existing techniques do not take into account the security of location estimate of some access node whose goal would be to try to confuse the localization system by amplifiers and high gain antennas....
Many sensor network applications require sensor's location information. Despite the great advances, most of the existing localization algorithms for sensor networks are vulnerable in hostile environments. Almost all the localization algorithms need the location information of reference nodes to locate the unknown nodes. When the location information is tampered by the attacks, the accuracy of these...
A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other by forming a multi-hop radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Design of an efficient and...
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness...
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public security issues. The most common attacking methods take advantage of the weakness of operating systems, the bugs found in certain applications such as Internet Explorer or Adobe Reader, or...
In the present day, the requirements of security in modern information systems are increasing significantly. Among secure requirements, the personal identification plays an important role for authentications and access control. However, traditional id/password pairs could be disabled by modern hacking techniques and social engineering easily. In order to provide stronger access control for organizations,...
Online social networks with millions of users are very popular nowadays. They provide a platform for the users to present themselves and to interact with each other. In this paper, we present a totally distributed platform for social online networks based on the p2p paradigm, called LifeSocial.KOM. It provides the same functionality as common online social networks, while distributing the operational...
Despite the security policies, standards, awareness strategies and tools currently in place, employees are still involving in risky behaviors that put business at risk. The growth and proliferation of Social Networks Services (SNS), among other threats, have made possible new leakage avenues for sensitive data, and malware spread. To address these security issues, network and security managers often...
The ever increasing diversity and mobility of devices have originated a marked rise in ubiquitous resources; a great number of collaborative applications could be exploited just by employing an efficient ubiquitous resource management mechanism. The CARM (Composable-Adaptive Resource Management) middleware-based architecture provides a flexible infrastructure where personal devices create seamlessly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.