The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a case study of an application prototype for shipbuilding industry using RESTful web service. Majority of database applications for traditional enterprises are based on the two-tier with simple client-server or the three-tier with additional RPC middleware. Because the outdated old configuration is not extensible, an alternative is required to link the database to the Web or mobile...
Modern solid state drives (SSDs) unnecessarily confine host programs to the conventional block I/O interface, leading to suboptimal performance and resource under-utilization. Recent attempts to replace or extend this interface with a key-value-oriented interface and/or built-in support for transactions offer some improvements, but the details of their implementations make them a poor match for many...
Password authentication systems can be used anywhere and at anytime where passwords are maintained in the central database. Systems are prone to attacks by intruders compromising the authentication. Password based authentication and key exchange protocols using a single server stores the sensitive user password where large user passwords are exposed. The proposed system is used to secure the system...
We present a set of protocols for creating a secure processing tree used for completing a task without divulging critical information. We analyze the information that is exchanged during the protocols and the effect of compromising participants.
The paper deals with the increase of protection systems' efficiency by means of the Honeypot technology. The design principles of this technology are described. We propose several ways of the file storages effective organization. Plans of collecting statistical information on malefactor's actions are discussed. Also the efficiency of the suggested approach is estimated.
To reduce the amount of CO2 produced from the personal cars in the world, the parking lot guidance systems are considered to be the solution in shopping malls or department stores in many countries. However, most of the current parking lot systems are located in the parking area of each shopping mall and they cannot show the parking lots information for the driver that are driving on the road. So,...
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
At present, the sharing of open data in any city is importance. The shared data, e.g., flood monitoring data, earthquake data, or traffic data, can be used to improve the way of human life. MQTT, the lightweight messaging protocol based on the publish-subscribe concept, is the most popular protocols used to share these data. There are two elements of MQTT messaging for sharing of any data; topic and...
Honey encryption (HE) is a novel password-based encryption scheme which is secure against brute-force attack even if users' passwords have min-entropy. However, because decryption under a wrong key produces fake but valid-looking messages to everyone, typos in password may confuse even legitimate users in HE. This has been one of the most challenging problems in HE. In this paper, we propose two types...
In order to realize the real-time collection of network information, to achieve energy saving and fault monitoring, it puts forward a method of monitoring the power consumption information based on the network data analysis. The method can use SNMP and MIB to collect the power information of the power equipment in different networks, including the CPU occupancy rate, physical and virtual memory usage...
We propose two secure protocols namely private equality test (PET) for single comparison and private batch equality test (PriBET) for batch comparisons of l-bit integers. We ensure the security of these secure protocols using somewhat homomorphic encryption (SwHE) based on ring learning with errors (ring-LWE) problem in the semi-honest model. In the PET protocol, we take two private integers input...
Address Resolution Protocol (ARP) traffic typically makes up a very significant amount of broadcast traffic in a wide range of networks. A common approach to reduce the network overhead of ARP in the context of Software Defined Networks (SDN) is via Proxy ARP, where the SDN controller answers ARP requests on behalf of the hosts. In this paper, we present a significant improvement of this approach,...
As the cyber-attack trends are shifted from the volumetric attacks to the multi-layered attacks, it is more difficult for the IT administrators to find those attack attempts within their system and networks. However, vulnerability assessment is not easy due to the complex connections between multi-layered applications, servers, and networks. There are many security functionalities, but it is hard...
Middleware in Internet of Things ecosystem plays an important role. Its role is to hide the complexity of connected devices and to provide services to domain-oriented applications that ease the development and support of these applications. Middleware should be able to work with the devices using different protocols, data models and terms. In this paper we describe a middleware, called SemIoT Platform,...
This paper presents a distributed architecture for asynchronously implementing a class of nonlinear signal processing systems as web services, which in turn can be used to solve a broad class of optimization problems. As opposed to requiring specialized servers, the presented architecture requires only the use of commodity database backends as a central resource, as might typically be used to serve...
The growth of the Internet of Things (IoT) creates the possibility of decentralized systems of sensing and actuation, potentially on a global scale. IoT devices connected to cloud networks can offer sensing and actuation as a service enabling networks of sensors to grow to a global scale. But extremely large sensor networks can violate privacy, especially in the case where IoT devices are mobile and...
Forensic Voice Comparison (FVC) is increasingly using the likelihood ratio (LR) in order to indicate whether the evidence supports the prosecution (same-speaker) or defender (different-speakers) hypotheses. In addition to support one hypothesis, the LR provides a theoretically founded estimate of the relative strength of its support. Despite this nice theoretical aspect, the LR accepts some practical...
This paper describes a new spoken dialog portal that connects systems produced by the spoken dialog academic research community and gives them access to real users. We introduce a distributed, multi-modal, multi-agent prototype dialog framework that affords easy integration with various remote resources, ranging from end-to-end dialog systems to external knowledge APIs. The portal provides seamless...
Privacy-preserving string search is a crucial task for analyzing genomics-driven big data. In this work, we propose a cryptographic protocol that uses Fully Homomorphic Encryption (FHE) to enable a client to search on a genome sequence database without leaking his/her query to the server. Though FHE supports both addition and multiplication over encrypted data, random noise inside ciphertexts grows...
Although it is possible to design and manufacture MPSoCs with hundreds of processors, there is still a gap in the ability to debug hardware, software, and applications for such chips. Current state-of-the-art works related to MPSoC debugging suffer from poor integration, scalability in data storage, and simple graphical data representation. This work proposes a modular debugging framework to aid the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.