The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electric power grids are undergoing a modernization process. By relying on the ICT infrastructure and on Internet connectivity, these so-called Smart Grids are now able to provide new functionalities and to become more efficient. However, despite the existence of a few standards that aim to specify the secure operation of Smart Grids, utility companies do not have a comprehensive set of metrics and...
Mobile devices are becoming part of modern digital avionics. Mobile devices can be applied to a range of scenarios, from Electronic Flight Bags to maintenance platforms, in order to manage and configure flight information, configure avionics networks or perform maintenance tasks (including offloading flight logs). It can be argued that recent developments show an increased use of personal mobile devices...
Protecting intellectual property and confidential customer details from network based attacks is becoming increasingly difficult in modern times due to a dramatic increase in online based attacks. For companies such as The NPD Group, protecting this confidential information is key in keeping a positive perceived image while also doing its utmost to protect vital I. P. This paper proposes an architecture...
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But...
Crowd-sourcing is an amalgamation of outsourcing to the crowd. Being an extremely well flourishing paradigm crowd sourcing is soon to be the new Cloud computing because it has revolutionized the entire organizational setup. In this paper we not only show the circumstances that led to the modern day crowd-sourcing but also the concerns of security complications and privacy invasions that have arisen...
Smart grids and smart homes improve energy managementby coupling communication capabilities to their devices. Due to computational constraints of these devices, employment ofsimplified communication protocols is necessary. In this paper, weinvestigate the use of communication protocols based on CoAPand 6LoWPAN in smart home environments. Specifically, weanalyze the vulnerabilities a smart home employing...
This system is based on C/S architecture design and development of service-oriented architecture of financial information management system, users can end the system directly through the client-related operations, the user submits a request to the server, the server accesses the database, in order to ensure that the database security, according to the function of the system is divided module testing,...
APT attack has caused chaos in society since 2006. Especially, the vulnerability of the infrastructure is exposed to the outside a lot due to the development of the IT infrastructure in Korea. In addition, APT attacks targeting companies' major confidential information are increasing every year. APT attack causes negative publicity for the company and financial damage. APT is completely different...
The increasing need for physical security in critical environment has led to a widespread of video surveillance systems. Effective video surveillance systems should be able to detect the presence of unauthorized people in the monitored environments while preserving the privacy of authorized ones. To this aim, our paper proposes the adoption of the usage control model in the video surveillance scenario...
The increasing need for physical security in critical environment has led to a widespread of video surveillance systems. Effective video surveillance systems should be able to detect the presence of unauthorized people in the monitored environments while preserving the privacy of authorized ones. To this aim, our paper proposes the adoption of the usage control model in the video surveillance scenario...
Enterprise Resource Planning software have several benefits if implemented successfully. The benefits includes interdepartmental communications, real time data access, improved customers relationship, future forecasting etc. This paper presented includes proposed work. Proposed model tries to throw light on security issues which is generally ignored by the most of the organizations. Some of the identified...
Companies, institutes have numerous employees and it is difficult to have the system which accurately detects people accessing entry to restricted areas in offices. Authentication systems like RFID, biometric attendance records people's attendance, enforcing that only assigned people get access to specific places. People can intrude into a restricted area by simply tailgating, also using biometric/RFID...
Cloud Adoption is associated with a number of risks. Modeling risk management in cloud adoption becomes imperative. Cloud adoption risk analysis model (CARA) is designed to guide companies through the process of cloud adoption. It calculates the potential losses on the basis of various risk scenarios. It also guides through cloud service provider selection.
Cloud computing is the fruit of recent developments in information technology, it provides access to many online services as well as remote computing resources as needed. To be more specific, cloud computing stands today as a satisfactory answer to the problem of storage and computing of data encountered by companies. It provides treatment and accommodation of their digital information via a fully...
Knowledge management includes several aspects, which can sometimes be even contradictory when operationalized in the daily activities of an organization. In this study, we empirically explore the knowledge management activities that large and small and medium sized companies in Finland have. The focus is especially on sharing and securing knowledge. The theoretical background for the paper is in the...
Although cost-benefit analyses are an important aspect of information technology (IT) security (ITS) management, previous research focuses largely on the customer perspective and neglects the supplier side. However, since ensuring a high level of ITS in modern IT products is typically associated with a large investment, customers' willingness to pay is essential for decision making in the context...
In this paper we propose a method and its application to construct the information system for a company that needs the cloud computing services. The points of this method are coupling the advantage of cloud computing service provided by the telecom operators and SaaS vendors. Specifically, we discuss about "SaaS virtualization method". This method is combine together the SaaS base service...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
The solutions of security problems and crisis situations are accompanied by many specific traits. Some of them are typical for all crisis situations, some of them denote the one singular form of crisis only. One common trait of crisis situations is shortage of time and information which places high demands on managers and decision-makers. Contemporary opinions about the solution of crisis situation...
Design automation (DA) is at a historical moment where it has a chance — after mathematics, statistics, and computer science — to establish itself as the fourth universal approach with widespread applications in a variety of scientific, engineering, and economic domains. We start by outlining some of the most important research contributions and industrial applications of the design automation; we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.