Search results for "Internet security"
showing 5 items of 5 documents
Ocena wiarygodności internetowych serwisów ubezpieczeniowych w Polsce
2016
Wiarygodność partnera transakcji czy usług realizowanych przez Internet stanowi istotny czynnik dla dalszego rozwoju gospodarki internetowej. Dotyczy to między innymi rozwoju ubezpieczeń internetowych. Dlatego umiejętność oceny wiarygodności serwisów WWW staje się ważnym narzędziem w rywalizacji na rynku ubezpieczeniowym. Celem artykułu jest przedstawienie wyników oceny wiarygodności serwisów WWW wybranych ubezpieczycieli prowadzących działalność w Polsce. W artykule pokazano, że kryteria oceny wiarygodności serwisów internetowych można przyporządkować do trzech wymiarów; są nimi: zdolność serwisu do zapewniania wiarygodności, życzliwość projektantów, twórców i administratorów serwisu w zak…
Security and privacy in the Internet of Things: Current status and open issues
2014
The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…
Mobile agents principles of operation
2004
Publisher Summary This chapter discusses the mobile agent technology and summarizes their features, principles of operation and implementation elements. Some development tools are also discussed. The chapter provides general description of mobile agents as an advanced software paradigm, which extends object oriented programming. Then it discusses principles of operation starting from agent intelligent behavior and continuing with mobility, communication, coordination, and fault tolerance. Finally, as for related topics, monitoring, performances, and security issues are discussed in the chapter. Agent monitoring techniques are very useful because they allow users to know which agents are run…
Online Web Bot Detection Using a Sequential Classification Approach
2019
A significant problem nowadays is detection of Web traffic generated by automatic software agents (Web bots). Some studies have dealt with this task by proposing various approaches to Web traffic classification in order to distinguish the traffic stemming from human users' visits from that generated by bots. Most of previous works addressed the problem of offline bot recognition, based on available information on user sessions completed on a Web server. Very few approaches, however, have been proposed to recognize bots online, before the session completes. This paper proposes a novel approach to binary classification of a multivariate data stream incoming on a Web server, in order to recogn…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.