Search results for "Computer security"
showing 10 items of 433 documents
American Options Based Service Pricing For Virtual Operators
2008
In the recent years, the role of service provider has split into two broad categories: Network Operators, offering services over their networks, and Virtual Operators, providing services over leased resources. What differentiates these players is to a minor extent a matter of enhanced service offer, and primarily a matter of economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for hiring the network. Correspondingly, the objectives of these players may differ profoundly: on one hand…
Case study for 3G/UMTS services and billing methods
2001
The 3G/UMTS-networks and services will provide a wide range of telecommunication services. To achieve, this, we need a new view to networks, network services and service abilities. The amount of service providers in the 3G networks will be at least the same than in the present Internet. The amount of users in the 3G networks will overgrow the user amount of Internet forming a global worldwide communication society. This paper discusses customer billing in the 3G world. There are some main issues that are not very, clear to all 3G service and network providers, which however, should be settled before, 3G networks are operational. One of the most important matters is the QoS (Quality of Servi…
MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios
2021
Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…
A framework for IoT service experiment platforms in smart-city environments
2016
Cities provide an excellent platform for gathering and detection of massive amount of data from cities and citizens. Emergence of new digital technologies inspires not only city governments but also city residents, researchers, companies and other stakeholders in discovering and creating new innovative solutions to solve urban challenges and improve peoples´ everyday life. Developing novel Internet of Things (IoT) solutions for cities and citizens requires facilities where IoT applications and services can be tested and experimented. The challenge for many smart-city test and experimentation platforms (TEPs), like living labs, has been the lack of sustainable value creation model. This has …
An RF Wireless Power Transfer system to power battery-free devices for asset tracking
2019
Internet of Things (IoT) and Wireless Sensor Networks (WSN) infrastructures are becoming more and more available and diffused. One major outcome is the development of new services that help to make everyday life easier and better. One of those to which this paper reserves special attention is asset tracking which refers to the method of tracking physical assets. This service is very well based on IoT infrastructure and, due to the enormous number of objects to be traced, desperately needs the availability of inexpensive tags with sensing capabilities, that can be conveniently monitored from a long distance and require no maintenance. For this, engineers are called to face very challenging i…
Privacy-preserving data allocation in decentralized online social networks
2016
International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…
Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions
2014
[EN] The advances in wireless communication techniques, mobile cloud computing, and context-aware technologies boost a growing interest in the design, development, and deployment of vehicular networks for emerging applications. This leads to an increasing evolutionary tendency to change from vehicular networks toward cloud-assisted context-aware vehicular cyber-physical systems. In this article, we first propose a multi-layered context-aware architecture and introduce two crucial service components, vehicular social networks and context-aware vehicular security. Then we propose an application scenario regarding the context-aware dynamic parking services by illuminating the cloud-assisted ar…
Improvement of a Service Level Negotiation Protocol using Formal Verification
2013
International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…
Inter-provider AAA and Billing of VoIP Users with Token-based Method
2007
With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …
Trust enhancement of P2PSIP communication systems
2011
Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…