The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Verification is a costly task, sometimes burdensome and tedious, requiring strong formal background. To reduce the effort and cost invested in verification, we developed a modeldriven approach for automatic verification of service properties, done in the early service design phase. Our approach is based on SEAM, a service modeling method, and it incorporates a verification system called Leon. With...
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
Most companies currently carry out security countermeasures against maximum-security risks based on countermeasure cost. However, maximum security is costly and low availability. If we can evaluate and recognize risk dynamically, we can change the security level according to that risk. Therefore, it is possible to lower the security level than maximum security. As a result, availability increases...
The use of Bluetooth Low Energy (BLE) recently became famous in crowd localization services. In this article we show that such service induces significant threats and we propose a scheme that achieves privacy preserving crowd localization. Crowd localization applications leverage all their users to perform periodic BLE scan and detect the nearby tracked devices. The users run a smartphone application...
Threats to information security can have great impact on business finances and company's reputation. Traditional methodologies for evaluating the maturity of data centers investigate security parameters to determine the compliance of data centers and international security norms. This paper proposes two innovative evaluation procedures to capture other security perspectives on data center environments:...
Companies willing to survive the numeric economy are forced to collaborate with each other in order to maximize their co-creation of value. This co-creation exists for many reasons: to sell and acquire information, goods and services, to optimize the quality of procedures, to improve security and privacy, etc. In this paper, we analyze and model value co-creation through three dimensions: the value's...
Companies are obliged to have privacy policies in place to notify the users about their privacy practices. However, privacy policies are not generally efficient and they fail to help users make informed decisions. The privacy policy challenges get worse when dealing with Internet of Things (IoT) as these devices have access to very sensitive data about users. Much research have addressed these problems...
This paper provides the challenges in the design and investigation of E-commerce and M-commerce systems, besides providing various factors for success. Modeling of e-Commerce is necessary as it measures the success and helps in improving the site to achieve the same. The success of an E-Commerce site depends on different parameters and their relative weightage. Hence a systematic mathematical model...
The purpose of this paper is to develop a framework to use Assurance Case methodology for Industrial IoT systems (IIoT). To achieve a general goal we discuss the three following issues. Firstly, a brief analysis of state-of-the-art researches and resources in area of Assurance Case is done. Secondly, we discuss specific components for IIoT Assurance Case with focus on Security Assurance. Thirdly,...
In the last decades, the explosion of the volume of digital document images, and the development of consumer tools to modify these images, has lead to a huge increase on reported fraudulent document cases. This situation has promoted the development of automatic methods for both preventing forgeries in modified documents and detecting them. However, document forensics is a sensitive topic. Data is...
The article presents an overview of major problems of integrated management systems implementation, provides a discussion on various integration problems of target management systems, both in terms of integration among systems, as well as in terms of integration into overall organizational structure of the company. Problems recognition process provides means for proper practical ways to resolve them...
With the evolution of digital services, data protection & security have become cruical areas and companies that offer digital services must have defined processes for these. These companies face pressures from: (i) people who are concerned about data being held about them, (ii) risk of cyber attacks that allows unauthorized data access, (iii) regulatory requirements from governments and (iii)...
This paper describes the implementative aspects, the main challenges and the adopted solutions for an Internet voting system designed by LepidaSpA and dedicated for specific elections a Land Reclamation Authority in Italian Emilia-Romagna region. Besides the description of the voting system, we also present an efficient and simple administration tool for the management of all the election phases,...
Online business marketing applied to expand market shares is inextricably connected with availability and reliability of IT governance. This model of marketing covers activities and transactions with a digital mechanism. This research included the sample of 30 MSME (Micro, Small, and Medium Enterprises) businesses of traditional and finished clothes originated in Pontianak City. Stratified sampling...
Online professional social networks such as LinkedIn have enhanced the ability of job seekers to discover and assess career opportunities, and the ability of job providers to discover and assess potential candidates. For most job seekers, salary (or broadly compensation) is a crucial consideration in choosing a new job. At the same time, job seekers face challenges in learning the compensation associated...
Delivering software for the Cloud represents a challenge for both micro teams and Small Medium Enterprises (SMEs), in part due to the rapid release methods adopted and the numerous ways in which software defects can be detected. We study field defect detection rates in a framework where these rates are used to refocus in-house test resources. Using an enterprise dataset, we address the question of...
Password advice is constantly circulated by standards agencies, companies, websites and specialists. But there appears to be great diversity in terms of the advice that is given. Users have noticed that different websites are enforcing different restrictions. For example, requiring different combinations of uppercase and lowercase letters, numbers and special characters. We collected password advice...
Modern supply chain is a complex system and plays an important role for different sectors under the globalization economic integration background. Supply chain management system is proposed to handle the increasing complexity and improve the efficiency of flows of goods. It is also useful to prevent potential frauds and guarantee trade compliance. Currently, most companies maintain their own IT system...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.