The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many of the industries such as manufacturing, F&B, transportation have recently shown a growing interest in Industry Internet of things (IIoT) to gain competitive advantage. The IIoT is technology stack of combining internet of things, machines, computers and people enabling intelligent business transformational through advanced big data analytics. With the growing complexity of IIoT in a large-scale...
During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can be interconnected using wireless ad hoc and disruption-tolerant networking to establish a backup emergency communication system for civilians and emergency services. However, such communication systems entail serious security risks, since adversaries may attempt...
Objective: This article objective is to model authorization process from role-based access control (RBAC) using restrict mode features (separation of duties (SoD) implementation) via Colored Petri Nets (CPN) simulations to map security concerns or limitations of this access control while addressing ISO 14441 requirements for Electronic Health Records (EHR) systems. Method: We have mapped the two separation...
Fog Computing (FC) has extended the services of cloud computing to the edge of the network. It inherits some of the characteristics from cloud computing but FC also have some distinguished features such as geo-distribution, location awareness and low latency. Along with the inherited characteristics, it also inherits the issues and problems of cloud computing like energy efficiency, resource management...
Network-based deployments within the Internet of Things increasingly rely on the cloud-controlled federation of individual networks to configure, authorize, and manage devices across network borders. While this approach allows the convenient and reliable interconnection of networks, it raises severe security and safety concerns. These concerns range from a curious cloud provider accessing confidential...
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
A Software-Defined Wireless Sensor Network (SD-WSN) is a recently developed model which is expected to play a large role not only in the development of the Internet of Things (IoT) paradigm but also as a platform for other applications such as smart water management. This model makes use of a Software-Defined Networking (SDN) approach to manage a Wireless Sensor Network (WSN) in order to solve most...
Security has always been concern when it comes to data sharing in cloud computing. Cloud computing provides high computation power and memory. Cloud computing is convenient way for data sharing. But users may sometime needs to outsourced the shared data to cloud server though it contains valuable and sensitive information. Thus it is necessary to provide cryptographically enhanced access control for...
The task of securing the enterprise network currently involves the use of several specialized devices (i.e. 'middleboxes') to provide specific functions in order to satisfy a set of high-level defined objectives. With only a loose common goal of securing the network, these employed devices could not be more distinct in functionality - from network access-control, vulnerability assessment, to intrusion...
OAuth is an open security standard that enables users to provide specific and time bound rights to an application to access protected user resources, stored on some external resource server, without needing them to share their credentials, with the application. Using OAuth, a client application gets one access token for further use through an HTTP redirect response from the resource server once the...
The requirements of the fifth generation of mobile communications technology (5G) present many challenges. Among others, it aims at improved support of device-to-device communication, lower cost, lower latency than 4G and lower battery consumption, for better implementation of the Internet of things (IoT). However, the connectivity of IoT devices gives rise to additional security and privacy concerns...
Software Defined Networking (SDN) is an emerging paradigm that changes the way networks are managed by separating the control plane from data plane and making networks programmable. The separation brings about flexibility, automation, orchestration and offers savings in both capital and operational expenditure. Despite all the advantages offered by SDN it introduces new threats that did not exist...
The digitalization of our economy, with the spread of smartphones and of electronic commerce, entails a general acceleration of payments. On the one hand, new technologies lead to changes in customer habits, who make Internet purchases anywhere and at any time. Customers also expect to pay for and receive their purchases as fast as possible. Suppliers, on the other hand, wish to have the certainty...
With the recent rapid advancements in the Internetof-Things (IoT), one of the applications being developed is thatof smart door lock (SDL) systems. SDL are intended to offerhigh security, easy access and easy sharing. Unlike existing SDLsolutions that mostly use biometrics or crunched RF spectrum, we uniquely propose to use Infrared (IR) optical wireless signal(OWS) using IR light emitting diode (LED)...
The adoption of an e-Health Cloud has different advantages especially allowing sharing and exchanging information between medical institutions, availability of information, reducing costs, etc. However, preserving identity privacy is a significant challenge of security in all environments, and constitutes particularly a very serious concern in Cloud environments. Indeed, an important barrier to the...
Mobile devices have gained immense popularity, and every day two million people use them both for private and professional reasons. Users turn to them for more and more sophisticated tasks, including financial operations, e-mail or personal and corporate data management. In this paper, we raise the subject of user awareness and education in the area of security for mobile devices. In order to do this,...
This article focuses on the knowledge of the technique Pentesting on web applications, discusses the different phases, most common of these attacks can be victims as well as upgrades software tools to make a penetration test- or Pentesting.
The new emerging technology to handle large number of dataset in an efficient manner is the big data which is used in various different platforms and domain to support several services and improve the system performance in a reliable manner. The main weakness in this domain is the security which can be easily destroyed or surpassed by the user. To enhance it in a protected way this paper provides...
the goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over recent years.
Traditional monolithic services fail to scale efficiently when a certain task within the service is flooded. They also have a long software release cycle due to the system complexity. Microservices, as a new architectural style, are built upon the idea of breaking a large service into a set of single-responsibility (along with other properties) services that are communicating over network. In such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.