Search results for "Computer security"

showing 10 items of 433 documents

American Options Based Service Pricing For Virtual Operators

2008

In the recent years, the role of service provider has split into two broad categories: Network Operators, offering services over their networks, and Virtual Operators, providing services over leased resources. What differentiates these players is to a minor extent a matter of enhanced service offer, and primarily a matter of economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for hiring the network. Correspondingly, the objectives of these players may differ profoundly: on one hand…

Service (business)Operations researchComputer scienceQuality of serviceService providerCongestion pricingOperating expenseComputer securitycomputer.software_genreFixed costEnhanced serviceVirtual networkcomputer
researchProduct

Case study for 3G/UMTS services and billing methods

2001

The 3G/UMTS-networks and services will provide a wide range of telecommunication services. To achieve, this, we need a new view to networks, network services and service abilities. The amount of service providers in the 3G networks will be at least the same than in the present Internet. The amount of users in the 3G networks will overgrow the user amount of Internet forming a global worldwide communication society. This paper discusses customer billing in the 3G world. There are some main issues that are not very, clear to all 3G service and network providers, which however, should be settled before, 3G networks are operational. One of the most important matters is the QoS (Quality of Servi…

Service (business)Service systemComputer sciencebusiness.industryService delivery frameworkService designMobile QoSService providerComputer securitycomputer.software_genreThe InternetMulti-frequency networkbusinessTelecommunicationscomputer
researchProduct

MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios

2021

Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…

Service (systems architecture)Biomedical ResearchComputer scienceProcess (engineering)computer.internet_protocolHealth InformaticsReuse03 medical and health sciences0302 clinical medicineHealth Information ManagementComponent (UML)Humans030212 general & internal medicinePseudonymizationComputer SecurityLanguageAdvanced and Specialized NursingClass (computer programming)Application programming interfacebusiness.industry030220 oncology & carcinogenesisSoftware engineeringbusinesscomputerConfidentialitySoftwareXMLMethods of Information in Medicine
researchProduct

A framework for IoT service experiment platforms in smart-city environments

2016

Cities provide an excellent platform for gathering and detection of massive amount of data from cities and citizens. Emergence of new digital technologies inspires not only city governments but also city residents, researchers, companies and other stakeholders in discovering and creating new innovative solutions to solve urban challenges and improve peoples´ everyday life. Developing novel Internet of Things (IoT) solutions for cities and citizens requires facilities where IoT applications and services can be tested and experimented. The challenge for many smart-city test and experimentation platforms (TEPs), like living labs, has been the lack of sustainable value creation model. This has …

Service (systems architecture)Computer science02 engineering and technologyComputer securitycomputer.software_genreIoT experimentation platformsSmart city0502 economics and business0202 electrical engineering electronic engineering information engineeringesineiden internetstakeholderEveryday lifeta113test and experimentation platformSustainable Valuebusiness.industryvalue networks05 social sciencesStakeholder020206 networking & telecommunicationsinternet of thingsData scienceValue networksmart-citysustainable value creationInternet of Thingsbusinesscomputer050203 business & management2016 IEEE International Smart Cities Conference (ISC2)
researchProduct

An RF Wireless Power Transfer system to power battery-free devices for asset tracking

2019

Internet of Things (IoT) and Wireless Sensor Networks (WSN) infrastructures are becoming more and more available and diffused. One major outcome is the development of new services that help to make everyday life easier and better. One of those to which this paper reserves special attention is asset tracking which refers to the method of tracking physical assets. This service is very well based on IoT infrastructure and, due to the enormous number of objects to be traced, desperately needs the availability of inexpensive tags with sensing capabilities, that can be conveniently monitored from a long distance and require no maintenance. For this, engineers are called to face very challenging i…

Service (systems architecture)Computer scienceAsset trackingReal-time computingBattery02 engineering and technologyAsset (computer security)01 natural sciencesWireless Battery ChargerEnergy Harvesting0202 electrical engineering electronic engineering information engineeringSystem on a chipWireless power transferwireless sensor networksRadio Frequency010401 analytical chemistry020206 networking & telecommunicationsinternet of things0104 chemical sciencesWSNsIdentification (information)Lithium IonInternet of ThingEnergy harvestingWireless sensor networkWireless Sensor Network
researchProduct

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions

2014

[EN] The advances in wireless communication techniques, mobile cloud computing, and context-aware technologies boost a growing interest in the design, development, and deployment of vehicular networks for emerging applications. This leads to an increasing evolutionary tendency to change from vehicular networks toward cloud-assisted context-aware vehicular cyber-physical systems. In this article, we first propose a multi-layered context-aware architecture and introduce two crucial service components, vehicular social networks and context-aware vehicular security. Then we propose an application scenario regarding the context-aware dynamic parking services by illuminating the cloud-assisted ar…

Service (systems architecture)Vehicular communication systemsVehicular ad hoc networkSocial networkComputer Networks and Communicationsbusiness.industryComputer scienceCommunicationCyber-physical systemContext (language use)Cloud computingINGENIERIA TELEMATICAComputer securitycomputer.software_genreComputer Science ApplicationsMobile cloud computingWirelessElectrical and Electronic EngineeringNetworksbusinesscomputer
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

Inter-provider AAA and Billing of VoIP Users with Token-based Method

2007

With the increasing popularity of wireless LAN technology, providers of real-time voice over IP (VoIP) services, known as voice service providers (VSP), are asking for roaming solutions and AAA (Authentication, Authorization and Accounting) methods that allow users to use their services from any available public Internet access network. In this paper we propose an AAA and billing architecture that allows users of VSPs to have access to the Internet from wired and wireless access networks provided by both traditional carriers, such as 3G providers, and wireless local access network (WLAN) providers. We propose a token-based AAA method that allows users of VoIP services to have their VSPs as …

Session Initiation ProtocolAccess networkbusiness.product_categoryVoice over IPbusiness.industrycomputer.internet_protocolComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService providerComputer securitycomputer.software_genreSecurity Assertion Markup LanguageInternet accessThe InternetRoamingbusinesscomputerComputer network2007 First International Global Information Infrastructure Symposium
researchProduct

Trust enhancement of P2PSIP communication systems

2011

Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…

Session Initiation ProtocolComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOverlayComputer securitycomputer.software_genreCommunications systemComputer Science ApplicationsDistributed hash tableNAT traversalConfidentialitySubjective logicChord (peer-to-peer)computerInternational Journal of Internet Technology and Secured Transactions
researchProduct