Search results for "Computer security"

showing 10 items of 433 documents

Characteristics and Measures for Mobile-Masquerader Detection

2006

Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.

Computer scienceFunctional abilitiesSubstitution (logic)Computer securitycomputer.software_genreSecurity policycomputerMobile device
researchProduct

Multi-agent Systems for Estimating Missing Information in Smart Cities

2019

International audience; Smart cities aim at improving the quality of life of citizens. To do this, numerous ad-hoc sensors need to be deployed in a smart city to monitor the environmental state. Even if nowadays sensors are becoming more and more cheap their installation and maintenance costs increase rapidly with their number. This paper makes an inventory of the dimensions required for designing an intelligent system to support smart city initiatives. Then we propose a multi-agent based solution that uses a limited number of sensors to estimate at runtime missing information in smart cities using a limited number of sensors.

Computer scienceMulti-agent system020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Missing Information EstimationSmart city11. Sustainability0202 electrical engineering electronic engineering information engineeringSmart City020201 artificial intelligence & image processingState (computer science)Cooperative Multi-agent Systemscomputer
researchProduct

A Software Package for a Serum Bank Management

1979

A serum-bank is a collection of human serum samples coming from different locations (in our case Children Hospital, schools, factories, town departemens), allocated in some archives. Principal users of a such data-bank are, of course, physicians and biologists that are mainly interested in statistical analysis (computation of averages, variances factor analysis, etc.) of immunological and epidemiological relevance, in order to investigate about some haematochemical parameters common to some selected subset of the archives [1], [2].

Computer sciencePrincipal (computer security)Relevance (information retrieval)Statistical analysisOperations managementMarketingSoftware packageSerum samplesBank management
researchProduct

Experimental evaluation of privacy-preserving aggregation schemes on planetlab

2015

New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…

Computer sciencePrivacy softwareSettore ING-INF/03 - TelecomunicazioniAggregate (data warehouse)aggregationComputer securitycomputer.software_genreprivacySecret sharingInformation sensitivityPlanetLabInformation leakageSecure multi-party computationcomputer
researchProduct

On the darker side of C++

1988

We discuss several negative features and properties of the C++ language, some common with C, others pertaining to C++ classes. Remedies are proposed for most of the latter ones, most of the former ones being feared to be already incurable. The worst class-related defects claimed in present C++ have to do with free store management. Some hints are given to programmers on how to avoid pitfalls.

Computer scienceProgramming languageObject-orientationComputer securitycomputer.software_genrecomputer
researchProduct

MEDiSN

2010

Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high quality care. At the same time, there is a growing concern about hospitals' ability to provide effective care during disaster events. For these reasons, tools that automate patient monitoring have the potential to greatly improve efficiency and quality of health care. Towards this goal, we have developed MEDiSN , a wireless sensor network for monitoring patients' physiological data in hospitals and during disaster events. MEDiSN comprises Physiological Monitors (PMs), which are custom-built, patient-worn motes that sample, encrypt, and sign physiological data and Relay Po…

Computer scienceRemote patient monitoringNetwork packetbusiness.industryQuality of serviceTestbedComputer securitycomputer.software_genreEncryptionHardware and ArchitectureHealth careWirelessbusinesscomputerWireless sensor networkSoftwareACM Transactions on Embedded Computing Systems
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct

Security Challenges of IoT-Based Smart Home Appliances

2018

The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…

Computer sciencebusiness.industryBotnetLocal area network020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEvil twinHarmHome automation020204 information systems0202 electrical engineering electronic engineering information engineeringCode injectionThe InternetbusinesscomputerVulnerability (computing)
researchProduct