Search results for "Security architecture"

showing 10 items of 12 documents

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

How “African” Is the African Peace and Security Architecture? Conceptual and Practical Constraints of Regional Security Cooperation in Africa

2012

ABSTRACT With the creation of the African Peace and Security Architecture in 2004, African states were aiming to assume the primary responsibility for peace and security on the continent and establish a structure to assemble the necessary financial and military means. However, despite the constant evocation of “African ownership,” it is non-African actors that call the tune and can define and drive African security. Based on a detailed juxtaposition of rhetoric and empirical evidence, this paper argues that significant conceptual and practical problems constrain the “Africanization” of African security and that it appears increasingly unlikely that the continent's states will be able to ach…

Critical security studiesPolitical economyPolitical sciencePolitical Science and International RelationsConflict resolutionInternational securityAfricanizationEnterprise information security architectureEmpirical evidenceSecurity studiesSafety ResearchPeacekeepingAfrican Security
researchProduct

Management Structure Based Government Enterprise Architecture Framework Adaption in Situ

2017

Part 1: Regular Papers; International audience; The fragmentation of the public sector makes it difficult to manage strategically and architecturally as a whole. Enterprise Architecture (EA) is considered as an improvement to that. Architectural modeling and visualization of the general management strategy plans along with parallel database development in a local government forms the primary data in the longitudinal case study using Action Design Research Method. To find a proper organizational fit for the EA framework in public sector, we reflect on how the current state architectural descriptions got organized in situ in a deep corporate hierarchy, and what were the emerging management ne…

Enterprise architecture framework0209 industrial biotechnologyKnowledge management[SHS.INFO]Humanities and Social Sciences/Library and information sciencesyritysstrategiatSherwood Applied Business Security ArchitectureEnterprise architecture02 engineering and technologygovernment enterprise architectureframework adaptionStrategy architectureFramework adaptionstrategy architecture020901 industrial engineering & automationEnterprise architecture management020204 information systemsBusiness architecture0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]View modelaction design researchbusiness.industryGovernment enterprise architecturejulkinen sektoriThe Open Group Architecture FrameworkBusinessInformation FrameworkAction design researchkokonaisarkkitehtuuri
researchProduct

A CAN Fieldbus Based Architecture for Distributed Control Systems Implementation

2003

Abstract The application of distributed systems theory to the implementation of industrial control systems is one of the best options to develop simple, scalable and physically distributed control systems. Following this line, our group has proposed a new architecture based on Rule Nets (RN) as an HLP over CAN fieldbus for the implementation of Distributed Systems. This architecture has been applied to several control applications, obtaining excellent results. The most outstanding feature of the architecture was its simplicity in the control systems design, without any efficiency loss. New capabilities have been added to improve its features and develop new analysis tools, in order to incre…

Enterprise architecture frameworkComputer scienceDistributed computingIndustrial control systemDistributed System Security ArchitectureControl systemApplications architectureScalabilityFoundation Fieldbus H1Systems designReference architectureFieldbusSpace-based architectureDistributed control systemIFAC Proceedings Volumes
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

Challenges of Government Enterprise Architecture Work – Stakeholders’ Views

2008

At present, a vast transformation within government systems is executed towards electronic government. In some countries, this change is initiated as enterprise architecture work. This paper introduces results from an empirical study on different stakeholders' views on enterprise architecture development within Finnish state government. The data is gathered from 21 interviews accomplished during spring 2007 among participants of the Interoperability Programme of Finnish state administration. The interviewees represent different sectors and levels of Finnish government and IT companies. On the basis of qualitative data analysis we discuss challenges of enterprise architecture work in the con…

Knowledge managementEnterprise architecture managementbusiness.industryBusiness architectureEnterprise integrationEnterprise architectureBusinessEnterprise information security architectureNIST Enterprise Architecture ModelEnterprise planning systemEnterprise software
researchProduct

Managing information security in a business network of machinery maintenance services business – Enterprise architecture as a coordination tool

2007

Today, technologies enable easy access to information across organizational boundaries, also to systems of partners in business networks. This raises, however, several complex research questions on privacy, information security and trust. The study reported here provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous information and communication technologies (ICT): Systems, platforms, infrastructures as well as security policies. Enterprise architecture (EA) is proposed as a means for comprehensive and coordinated planning and management of corporate ICT and the security infrastructure. The EA approach …

Knowledge managementbusiness.industrySherwood Applied Business Security ArchitectureBusiness system planningEnterprise architectureInformation securityEnterprise information security architectureSecurity information and event managementInformation security managementHardware and ArchitectureBusiness architecturebusinessSoftwareInformation SystemsJournal of Systems and Software
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Effects of PSD2 on security architecture of mobile banking : a review of literature

2017

This thesis aims to find out the changes that the Payment Service Directive (PSD2) will bring to the security architecture of mobile banking. PSD2 will create a situation where security mechanisms are separated from the actual banking application. Payment service providers must provide their Application Programming Interface for third party developers to give them access to authentication of payment transactions. PSD2 requires payments service providers to offer strong customer authentication with separate authentication mechanism from the banking application. This thesis found that academic literature about the security architecture of mobile banking does not provide a model where a separa…

Payment Service DirectivejärjestelmäarkkitehtuuriMobile bankingtietoturva-arkkitehtuuriverkkomaksaminenSecurity architecturePSD2mobiilipankitKirjallisuuskatsaussalausvarmenteetdirektiivitmobiilisovelluksetsovelluskehyksettietoturvakyberturvallisuusmaksupalvelutmaksupalveludirektiivi
researchProduct

Analysis of dynamic service oriented systems for security related problems detection

2017

The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…

Security engineeringCloud computing securitysecurity incidentsSecurity serviceSoftware security assuranceComputer scienceDistributed computingSherwood Applied Business Security Architecturesecurity levelSecurity managementservice oriented systemsComputer security modelSecurity information and event management
researchProduct