The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) is an emerging paradigm that changes the way networks are managed by separating the control plane from data plane and making networks programmable. The separation brings about flexibility, automation, orchestration and offers savings in both capital and operational expenditure. Despite all the advantages offered by SDN it introduces new threats that did not exist...
Supporting distributed, research collaborations is a fundamental demand of e-Research infrastructures (e-Infrastructures). To be successful, e-Infrastructures must address the needs of all parties involved including end user researchers and associated stakeholders, e.g. organizations that make resources available. These needs often translate into ensuring the security and integrity of systems and...
Service exploration is an essential element in pervasive computing environments to minimize administrative overhead.It enables devices and network services to properly explore,configure, and then communicate with each other.Much research on service exploration has been conducted,but most protocols are not designed with security and privacy support.We proposed a prudent service exploration model for...
Because of the rapid growth in e-commerce, we can buy things walking around. Its not the expensive items, but the small and cheap items such as text files, music files, movies that we buy while walking around. As this kind of e-commerce grows, micro-payment system develop these days. Since its so convenient, and simple, more and more people use it. Despite its merit, it has some problems to be solved...
The current practice of password based security for PLEs in general and the Internet in particular is inadequate. The widespread authentication mechanism of username and password is out-dated, and does not meet current needs. Intruders and hackers have also learnt, and become more tech savvy. Besides, remembering a plethora of long passwords and passphrases, sometimes as many as 15 or 20, is cumbersome...
Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password...
In cloud computing, security is an important issue due to the increasing scale of users. Current approaches to access control on clouds do not scale well to multi-tenancy requirements because they are mostly based on individual user IDs at different granularity levels. However, the number of users can be enormous and causes significant overhead in managing security. RBAC (Role-Based Access Control)...
The secret intranets bring a lot of conveniences for teaching and scientific researching in many universities. However, there are some new challenges towards the information access controlling at the same time. The ferrying mechanism used in policy of the information access controlling. Aiming at the security issues about secret intranet information ferry, this paper focuses on the policy description,...
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and...
Smart Grid Applications interfaces with other Smart Grid and back office applications to solve various business needs. For instance billing systems needs to be interfaced with AMI system to find out the power usage in order to bill the customer. AMI System may be interfaced with DMS system as part of demand response management. Such interfaces could cross logical, physical and organizational boundaries...
Firewalls are no longer just perimeter devices for the data center, but should be weaved into the fabric of the network from edge to edge such as to offer security layered in-depth and ubiquitous. The next evolution of the firewall has to combine dynamic policy-based security with performance, rapid scaling, high availability and application intelligence. Today, increasing attention is paid to network...
Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, Information Technology has made a revolutionary impact in the medical sector too, providing with absolute paperless hospitals. Several emergency facilities are available, and doctors...
Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are becoming increasingly popular in businesses, governments, educations, public and individual. However, when transmissions are broadcast over radio waves, interception and masquerading becomes trivial to anyone with a radio, and so there is a need to employ additional mechanisms to protect the communication. In this paper, we...
In this paper, we investigate applications of access control to Wireless Sensor Networks (WSNs). Although access control was well established for traditional computer systems, it has not been studied thoroughly in WSN environments. We briefly provide the WSN specifications and then stress the constraints of the WSNs that would affect the access control implementation. We also provide a literature...
Mobile IPv6 has been developed for quite a few years now, but it has yet to bring its constant connectivity and global reachability benefits to mobile devices in real world scenarios, mainly due to lack of trouble-free and secure network access and data transmission for devices as they roam. In this paper we propose a Unified Architecture that combines the strengths of Mobile IPv6 and AAA services...
While ubiquitous healthcare applications over the Internet promise increasing efficiency, accuracy, and availability of medical treatment, security has received increasing attentions as one of the critical research challenges. In this paper, we consider security issues due to increasing access sharing of patient information resources in the networked environment. We propose a novel efficient access...
Sensor and earth observation data are becoming more and more available through service networks. In order to provide operational services, reliable and easy to use mechanisms for security, authentication and distributed access control are vital for service providers when offering their services. This paper describes a Service Access Control (SAC) framework which was developed as part of the SANY project,...
Given the proliferation of malware and malicious activities, the integrity of communication systems is an ever growing concern. In this work, we propose StaticTrust, an integrity measurement framework which enables a system to evaluate the integrity and state of a remote client prior to providing trusted communication services. StaticTrust is designed for a specific class of network devices that have...
Right now, password authenticated key exchange which enables communication parties to authenticate each other and establish a session key via easily memorable passwords is widely used because of the advantages of simplicity, convenience, adaptability, mobility, and less hardware requirement. In this paper, we will introduce a verifier-based password authenticated key exchange protocol via elliptic...
Poor usability of IT security present a serious security vulnerability which can be exploited to compromise systems that are otherwise secure. This is of particular concern when considering that the majority of people connecting to the Internet are not experts in IT security. Personal firewalls represent the most important security mechanisms for protecting users against Internet security threats...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.