The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hydroelectric generation currently constitutes 53% of the total generation capacity in New Zealand. The majority of this generation is located in the South Island and is exported to the North Island via an HVDC link. At times the amount of generation that can be transferred is limited by the thermal capacity of 220 kV transmission system. This paper details a proposed system protection scheme (SPS)...
Content delivery network interconnection (CDNi) as a new interactive network which inherits all of the advantages of single CDN. Moreover, CDNs supported by different network operators can communicate with each other directly through the interfaces between them. Meanwhile, the interactivity also brings some security issues. In this paper, we propose a new CDNi communication architecture which combined...
Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud...
The deployment of the components of distributed systems is now often very dynamic - server-side components are virtualised so they can be dynamically deployed on a range of platforms including public and private clouds, while users expect to be able to install clients on devices from phones to tablets. This can introduce security problems that place data at risk. This paper describes a new method...
Self-checking algorithms are used to ensure a software executes as intended. This guarantee is important not only to protect software against piracy, but also in order to avoid third parties to illegally modify it and introduce malicious code with the purpose of infecting users. In this paper, we present the implementation aspects of a self-checking algorithm for Adobe Flash Applications.
Network Coding has significantly improved the achievable throughput and robustness compared to traditional store-and-forward transmission paradigm. However, network coding-enabled networks are susceptible to pollution attack where a small number of polluted messages will propagate in recoding and corrupt bunches of legitimate messages. Recently, several light weight Homomorphic Message Authentication...
Cloud Adoption Risk Assessment Model is designed for cloud customers to assess the risks that they face by selecting a specific cloud service provider. It is an expert system to evaluate various background information obtained from cloud customers, cloud service providers and other public external sources, and to analyze various risk scenarios. This would facilitate cloud customers in making informed...
The security of software-based systems is one of the most difficult issues when accessing the suitability of systems to most application scenarios. However, security is very hard to evaluate and quantify, and there are no standard methods to benchmark the security of software systems. This work proposes a novel methodology for benchmarking the security of software-based systems. This methodology uses...
First, the paper gives the definition of the strongly row (column) full rank matrix, the quasi-upper triangular matrix and the quasi-lower triangular matrix of the m × n matrix. Then the triangular factorization is generalized to the m × n matrix, and some factorization theorems are obtained. By using the triangular factorization, the linear equations with strongly row (column) full rank coefficient...
Network security risk assessment and mitigation are two processes in the risk management framework which need to be done accurately to improve the overall security level of a network. In this paper, in order to increase the accuracy of vulnerability exploitation probability estimation in the risk assessment phase, in addition to inherent characteristics of vulnerabilities, their temporal characteristics...
This study focuses on the application of security metrics to a computer network. Mean Time-to-Compromise (MTTC) metric and VEA-bility metric are selected for this study. MTTC is calculated using a set of equations based on the known vulnerabilities of the system. VEA-bility is selected because it uses CVSS that has a wide coverage of security aspects. The input data for both metrics are obtained from...
Network Security is always a major concern in any organizations. To ensure that the organization network is well prevented from attackers, vulnerability assessment and penetration testing are implemented regularly. However, it is a highly time-consuming procedure to audit and analysis these testing results depending on administrator's expertise. Thus, security professionals prefer proactive-automatic...
With increased power demand and the complexity of power systems, the Australian electricity market needs to undertake a series of changes and updates, including power system deregulation, allowing independent power producers (IPPs) to enter the market. One of the current systems that needs to be updated is the spot pricing system, which involves the application of slack bus independent distribution...
Railway track security is prime concern of railways. Very few approaches have been implemented concerning the track breakage detection. In this paper we are proposing an algorithm for deployment of vibration sensors on the track and simulating communication among the sensors in real time. We also suggest a method to regularly update train engine about the track's status and exact location of the track...
In service computing, a system is integrated by using the services of many service providers. The security of the services that constitutes the system affects the security of the integrated system. This paper studied the issues relating to security requirements of an integrated system using a game theoretical approach. It modeled a class of service computing applications as a security game. Using...
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper (illegitimate destination) to interpret the intercepted information. Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without encryption...
This paper proposes and subsequently delineates quantification of network security metrics using software defined networking approach in real time using a progressive testbed. This comprehensive testbed implements computation of trust values which lend sentient decision making qualities to the participant nodes in a network and fortify it against threats like blackhole and flooding attacks. AODV and...
This paper formulates a probabilistic security-constraint optimal power flow considering a combination of an AC system and a multi-terminal HVDC grid that can depict the future power systems. The probabilistic formulation is discussed considering uncertainty in the generation infeed (e.g. wind power). To achieve a tractable problem we use a linearized version of the power flow equations of the combined...
Identity Proofing - providing a digital identifier bound to a real-world entity - is effective against identity theft, which is a serious problem for cyber security. In-person interaction with an applicant is the basis of identity proofing, but that is only effective when all applicants are located near a registration authority (RA) which is responsible for verifying some or all of the applicant's...
Computing a prioritized set of vulnerabilities to patch is important for system administrators to determine the order of vulnerabilities to be patched that are more critical to the network security. One way to assess and analyze security to find vulnerabilities to be patched is to use attack representation models (ARMs). However, security solutions using ARMs are optimized for only the current state...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.