The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has emerged in recent years as a popular method of deploying information technology (IT) solutions within organisations. Cloud computing provides scalable, on-demand IT resources, which can be rapidly provisioned and utilised over the Internet. Cloud computing solutions can provide an excellent alternative for educational institutions where budget cuts have been incurred and cloud...
Complexity of business process in higher education, make it very reasonable for university to adopt cloud computing for a better quality services and education. Many researches showed that cloud computing does a great job in educational environment. Despite many advantages existing, cloud computing has not separated from security incidents. So that, an organized management, security awareness, and...
Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. In this paper, we present a new paradigm that leverages software attack graph for dynamic remote attestation. The major contributions of this paper are two-folds: (1) From the angle of attack, we propose a method to reduce the number of objects...
Since the phenomenon of cloud computing was proposed, there is an unceasing interest for research across the globe. Cloud computing has been seen as unitary of the technology that poses the next-generation computing revolution and rapidly becomes the hottest topic in the field of IT. This fast move towards Cloud computing has fuelled concerns on a fundamental point for the success of information systems,...
Today IT is faced with the challenge of trying to respond to rapidly changing business environments on limited budgets, needing to support legacy applications as well as new modern software applications. Cloud computing offers substantial benefits in terms of agility and cost-effectiveness but cloud platforms are not commodities, with one easily substituted for another. Today, most companies want...
It is crucial to guarantee content integrity in Named Data Networking(NDN), where copies of the contents are distributed over the network. NDN adopts digital signatures, and contents are verified whenever they are stored in caches. However, the current scheme is not practical in practice since its operations incur too much overhead. In this paper, we suggest a simple but effective solution for content...
Using a field portable, smartphone fluorometer for assessing water quality, a pH map of drinking water around Sydney is obtained. The work demonstrates a new security concept — network forensics — based on a novel smartgrid approach for the potential detection of water quality disruption.
In recent years, many countries have used e-government to provide high quality services to their citizens. Thus, a number of studies have investigated user acceptance of e-government through the use of adoption models, such as the Unified Theory of Acceptance and Use of Technology (UTAUT) model. However, these models do not focus sufficiently on security. In order to develop a more security-focused...
In this paper, we study a downlink multiuser network in which one base station sends its message to one of multiple users, assisted by one of multiple intermediate decode-and-forward (DF) relays. Multiple eavesdroppers exist at the receiver side, and they can overhear the message from the base station, which brings out the issue of information security. We consider moderate shadowing environments...
The significant increase in the use of cloud computing, has led to an interest in partitioning applications over a set of public and private clouds in order to meet a range of non-functional requirements including performance (for example where private cloud resources alone are insufficient), dependability (e.g. To allow the application to continue to operate even if one cloud fails) and security...
In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors developed and implemented a Profile Based Authentication Framework (PBAF) with the aim to integrate learning and examination processes for secure online examinations. The PBAF approach...
Distributed data stream processing has been gaining increasing research attention in recent years. Data continuity and massiveness has made it is critical and challenging to design a scalable and efficient dissemination system. Thus, a system that enables changes in database to copy or duplicate from one physical location or system to another (typically from a master to a slave system) is pertinent...
In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio...
Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the data of other potentially conflicting tenants' by means of inter-VM attacks. This paper discusses an innovative solution to overcome this data leakage problem by proposing the requirements for a so-called Conflict-Based Allocation...
Cloud computing is paradigm that has emerged to deliver IT services to consumers as a utility service over the Internet. In developing countries, particularly Saudi Arabia, cloud computing is still not widely adopted. As a result, this study seeks to investigate the most influential factors that can encourage an organisation to use the cloud or which might impede them from moving to it. This research...
XML databases are widely used in many different areas. They are multi user systems and can store a huge amount of data. Sensitive and important data need to be protected and stored securely. We have developed a dynamic trust based access control for XML databases to improve the security level and prevent malicious transactions from both internal and external users. Our system tracks user history of...
Cloud computing continues to increase in complexity due to a number of factors: (i) increasing availability of configuration options from public Cloud providers (Amazon, for instance, offers over 4000 different configuration options), and (ii) increasing variability and types of application instances that can be deployed on such platforms, such as tuning options in hyper visors that enable different...
With the rapid growth of the number of papers, the traditional methods of searching papers by scholar search engine are becoming unacceptable. These methods can't meet the needs of users and users still need to take a lot of time to filter the search results. To solve the problem, this paper uses the concepts and methods of community partition and introduces a model to recommend authoritative papers...
Examination system is the pivotal point around which the whole system of education is based. Examination system comprises of number of laborious and error prone tasks, needing immense resources and time. Numerous electronic examination systems have been designed with the intent of improving the efficiency of current examination system. However, the existing e-examination systems are usually designed...
Designing an energy efficient key management scheme to secure Wireless Sensor Networks is a challenging task because sensor nodes in the network are resource constrained. If an initial key is used in the network lifetime, a key stolen by an unauthorized node will results in data compromised that is generated in the network. So a re-keying is necessary after a specified number of rounds to avoid the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.