Search results for "Computer Security"

showing 10 items of 433 documents

Information in the aspect of security threats and challenges

2019

INFORMATION IN THE ASPECT OF SECURITY THREATS AND CHALLENGESIn the article, the author describes the driving force behind deliberate informational activities. He pays particular attention to the current security situation in the information dimension. Existing systems in the area of security management should be resistant to disinformation and informational operations. There is no room for the freedom of interpretation of the information acquired since every decision results in the actions of people, therefore it requires accuracy and caution. This issue takes on a special dimension when it concerns the state, because this environment contains specific features such as a changing environmen…

National securitybusiness.industrymedia_common.quotation_subjectInterpretation (philosophy)Information processingComputer securitycomputer.software_genreinformation processingsecurity systeminformationResilience (organizational)ScarcitydisinformationDisinformationSecurity managementBusinessDimension (data warehouse)national securitycomputermedia_commonStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Towards Modelling Information Security with Key-Challenge Petri Nets

2009

Our global information society is based on distributed wide-area networks. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network-accessible resources from unauthorized access, as well as continuous monitoring and measurement of the network security's effectiveness. In this paper, we describe the use of Petri nets in modelling network security. We propose a new hierarchical method for modelling network attacks and evaluating effectiveness of the corresponding defences. Our model is called Key-Challenge Petri Net (KCPN).

Network administratorNetwork securitybusiness.industryComputer scienceDistributed computingInformation securityProcess architectureComputer security modelPetri netComputer securitycomputer.software_genreSecurity serviceNetwork Access Controlbusinesscomputer
researchProduct

Towards a relation oriented service architecture

2010

Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented by adhering to the original design tenets of the Internet. Some of the tenets have been broken, others diluted and new ones are emerging to accommodate new paradigms. Moreover, applications and services have been moving slowly but consistently towards a uniform model based on Service Oriented Appr…

Network architecturecomputer.internet_protocolbusiness.industryComputer scienceQuality of serviceInteroperabilityService-oriented architectureComputer securitycomputer.software_genreBackward compatibilityWorld Wide WebNext-generation networkThe InternetSoftware architecturebusinesscomputer2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)
researchProduct

Two tiered privacy enhanced intrusion detection system architecture

2009

The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.

Network forensicsInformation privacyComputer sciencePrivacy policyLaw enforcementXACMLComputingMilieux_LEGALASPECTSOFCOMPUTINGIntrusion detection systemNetwork monitoringComputer securitycomputer.software_genreHost-based intrusion detection systemcomputercomputer.programming_language2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct

A trust-based security enforcement in disruption-tolerant networks

2017

We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.

Network packetbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreMedical servicesTrustworthiness020204 information systems0202 electrical engineering electronic engineering information engineeringPeer to peer computingComputational trustUnavailabilitySubjective logicbusinessEnforcementcomputerComputer network2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Mobile agents principles of operation

2004

Publisher Summary This chapter discusses the mobile agent technology and summarizes their features, principles of operation and implementation elements. Some development tools are also discussed. The chapter provides general description of mobile agents as an advanced software paradigm, which extends object oriented programming. Then it discusses principles of operation starting from agent intelligent behavior and continuing with mobility, communication, coordination, and fault tolerance. Finally, as for related topics, monitoring, performances, and security issues are discussed in the chapter. Agent monitoring techniques are very useful because they allow users to know which agents are run…

Object-oriented programmingComputer sciencebusiness.industryAccess controlFault toleranceEncryptionInternet securityCommunications securityComputer securitycomputer.software_genreSoftwareMobile agentbusinessHost (network)computer
researchProduct

Autonomous agent system using dispatching rules in the negotiation protocol

2002

In this paper, the most important results obtained by the simulated application of autonomous agent paradigms to a. real factory are presented. The classical rules of dispatching are compared with the autonomous agents approach. In particular, the possibility of redesigning the negotiation rules in terms of currency in order to take into account even non-time-related costs is considered. Finally, a new project on the effective application of the autonomous agent system to a test bed, modelling a simplified firm, is proposed.

Operations researchComputer scienceautonomous agentnegotiation protocolmedia_common.quotation_subjectAutonomous agentnegotiation protocolsScheduling (production processes)Computer securitycomputer.software_genreautonomous agents; negotiation protocols; schedulingNegotiationautonomous agentsschedulingcomputermedia_common
researchProduct

A Rule-Based Multi-agent System for Road Traffic Management

2009

Road Traffic presents a high dynamism which makes necessary the development of traffic management and control strategies to improve traffic flows and more important, road safety. This dynamism makes necessary the use of intelligent systems to support traffic organizations and road operators to cope with incidents. In this paper we introduce a new expert system to support traffic management when weather problems occur in the road network. The system uses multiagent technology to work with the specific characteristics of traffic domain and is able to work in two modes: a) coordinately, where all the agents works to solve problems in large networks and b) locally where due to communications pr…

Operations researchbusiness.industryComputer scienceMulti-agent systemIntelligent decision support systemFloating car dataVehicle Information and Communication Systemcomputer.software_genreComputer securityAdvanced Traffic Management SystemTechnology managementIntelligent agentTraffic engineeringComputerSystemsOrganization_MISCELLANEOUSbusinesscomputerRoad traffic2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology
researchProduct

Multi-party metering: An architecture for privacy-preserving profiling schemes

2013

Several privacy concerns about the massive deploy- ment of smart meters have been arisen recently. Namely, it has been shown that the fine-grained temporal traces generated by these meters can be correlated with different users behaviors. A new architecture, called multi-party metering, for enabling privacy-preserving analysis of high-frequency metering data without requiring additional complexity at the smart meter side is here proposed. The idea is to allow multiple entities to get a share of the high-frequency metering data rather than the real data, where this share does not reveal any information about the real data. By aggregating the shares provided by different users and publishing …

OptimizationInformation privacyEngineeringtatistical analysiSmart meterDistributed computingpattern clusteringC.2 COMPUTER-COMMUNICATION NETWORKSSmart gridelectricity supply industryComputer securitycomputer.software_genreCOMPUTER-COMMUNICATION NETWORKSElectricityClustering algorithmProfiling (information science)Metering modemart meterIndexeArchitectureCluster analysisgas industrydata privacybusiness.industrySettore ING-INF/03 - TelecomunicazioniComplexity theoryreal gas consumption dataVectorsA sharehigh-frequency metering datamultiparty meteringInformation sensitivityynthetic electricity consumption dataCryptographyprivacy-preserving profiling schemeprivacy-preserving analysibusinesscomputeruser profiling clustering mechanismMulti-Party Metering
researchProduct

Conceptual Characterization of Cybersecurity Ontologies

2020

Part 7:Risk and Security Modeling; International audience; Cybersecurity is known as the practice of protecting systems from digital attacks. Organizations are seeking efficient solutions for the management and protection of their assets. It is a complex issue, especially for great enterprises, because it requires an interdisciplinary approach. The kinds of problems enterprises must deal with and this domain complexity induces misinterpretations and misunderstandings about the concepts and relations in question. This article focus on dealing with Cybersecurity from an ontological perspective. The first contribution is a search of previously existing works that have defined Cybersecurity Ont…

OrganizationsCybersecurityOntologyProcess (engineering)Computer scienceEnterprise architectureEnterprise architecture02 engineering and technologyCharacterization (mathematics)Ontology (information science)021001 nanoscience & nanotechnologycomputer.software_genreComputer securityOntology engineeringField (computer science)Focus (linguistics)Domain (software engineering)Knowledge graphs0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]020201 artificial intelligence & image processing0210 nano-technologyLENGUAJES Y SISTEMAS INFORMATICOScomputer
researchProduct