The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business...
Software Defined Networking (SDN) is a rapidly emerging technology that brings new flexibility to networking through the separation of the control and data plane. This paper presents one SDN based framework, among several potential valid approaches, for addressing the mobility of operational nodes within a coalition environment. The operational nodes require mobility to enable roaming, multi-homing,...
Cyber-physical systems represent an engineering challenge due to their safety and security concerns, particularly those systems involved in critical infrastructure which require some of the highest standards of safety, availability, integrity and security. The complexity of these systems makes the identification and analysis of safety and security requirements challenging. In this paper, we present...
Traditional electronic voting systems are designed with national elections in mind. However, there are other types of institutions, such as Universities, that are required by law to conduct mid- to large-scale elections. The nature of these institutions and the different regulations that govern their election process made impractical the use of traditional voting systems for their elections. This...
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart lighting, and door locks that can be remotely accessed and controlled. User mobility makes static security mechanisms, such as usernames and passwords, tedious to use. In this paper, we introduce a context-aware authentication...
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based detection methods. We measure the success of this potential attack against Hotmail, Gmail and Yahoo mail. While the attack is bothersome both in terms of...
We explore a reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and authenticity of every access to every system object. Access decisions are administered by a security logic server implemented as an extension of the peripheral bus. Initial results show a minimal increase in resource...
This study empirically tests the model of the Technology Threats Avoidance Theory (TTAT) in a healthcare context to investigate health information technology (HIT) avoidance behaviors when used in unsecure environment. Testing the model in this new context explained avoidance behaviors towards HIT in a holistic way. It is found that the HIT avoidance is predicted by levels of perceived threat, avoidance...
Among other knowledge, software architecture de-sign decision-making relies on the relation between architecturalpatterns and quality attributes (QAs). However, this relation isoften implicit, or in the best case informally and partially defined. This leads to sub-optimal understanding of the impact of thearchitecture design on the desired level of quality. In this work, we aim to shed light on the...
We present a novel approach for detecting malicious user activity in databases. Specifically, we propose a new machine learning algorithm for detecting attacks such as a stolen user account or illegal use by a user. Our algorithm relies on two main components that examine the consistency of a user's activity and compare it with activity patterns learned from past access. The first component tests...
The design and development of major products, systems or infrastructures entail conceptualisation, elicitation and articulation of a large body of requirements that is often captured as a narrative and presented in wordy documents and spreadsheets. Whilst the requirements are generally classified in terms of behavioural, functional and non-functional categories, the current methods in vogue in infrastructure...
Machine Learning and Big Data Analysis are seen as the silver bullet to detect and counteract attacks on critical communication infrastructure. Every message is analysed and is to some degree under suspicion. The principle of innocent until proven guilty does not seem to apply to modern communication usage. On the other hand, criminals would gain easily upper hand in communication networks that are...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
Cloud computing is an emerging economic modelthat provides a broad network access to services with manybenefits to many tenants at the same time. Although it createsa large potential to develop new online services the evolution ofcloud computing has been accompanied by the proliferation ofvarious attacks against the services on the cloud infrastructures. The importance of risk management in cloud...
While the use of reconfigurable computing for tasks such as packet header processing or deep packet-inspection in high-speed networks has been widely studied, efforts to extend the technology to application-level processing have only recently been made. One issue that has prevented wider use of reconfigurable platforms in that context is the unfamiliar programming environment: Such systems commonly...
While the domain of big data is anticipated to affect many aspects of human endeavour, there are numerous challenges in building big data applications among which is how to address big data characteristics in quality requirements. In this paper, we propose a novel, unified, approach for specifying big data characteristics (e.g., velocity of data arrival) in quality requirements (i.e., those requirements...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
In recent years, the development of Service Function Chaining (SFC) has been increasing dramatically alongside the transformation from physical machines to virtual devices in service provider networks. With the combination of Software-defined Networking and Network Function Virtualization, SFC enables deploying and managing network services rapidly and flexibly, which allows service providers to offer...
Usability is considered as one of the most important quality factors for commercial Web interfaces, along with others such as performance and security. However, most of usability evaluation methods for these Web applications do not support automatic measures. This paper addresses these issues through the presentation of an automatic evaluation model based on a systematic qualitative technique to validate...
Cloud environment consists of many components playing different roles which need to interact with each other. Based on the context the nature of interaction may vary. Trust is an essential facet for confidence-based interactions among the various entities in cloud environment. This paper presents the taxonomy of trust models and classification of information sources for trust assessment in cloud paradigm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.