Search results for "Security level"

showing 7 items of 7 documents

Health effects of mercury ingested through consumption of seafood

1995

It is known world-wide literature that seafood consumption is the main source of mercury intake in people not occupationally exposed. Several studies on the presence of mercury in sea water, sediment and fish and its effects on human health have been carried out in many countries in the Mediterranean area such as Greece, Italy and Jugoslavia. Few data have been published on Sicilian coastal population, consumers of high amounts of fish and on seawater status as the starting point of alimentary chains involving marine food. This study was carried out in July 1991 and July 1992 to determine total mercury and methylmercury levels in selected populations of the coast of Sicily: fishermen in a l…

education.field_of_studyEnvironmental EngineeringPopulationchemistry.chemical_elementlanguage.human_languageMercury (element)Fisherychemistry.chemical_compoundHuman healthMediterranean seaGeographychemistrylanguageSeawaterSecurity leveleducationMethylmercurySicilianWater Science and TechnologyWater Science and Technology
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Security framework for dynamic service-oriented IT systems

2018

The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …

security incidentssecurity levelService-oriented systemsJournal of Information and Telecommunication
researchProduct

Security framework for dynamic service-oriented IT systems

2018

The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …

Security frameworkProcess managementService oriented systemsComputer Networks and CommunicationsComputer science0211 other engineering and technologiesContext (language use)02 engineering and technologylcsh:Telecommunicationlcsh:TK5101-6720security level0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Electrical and Electronic EngineeringArchitectureService orientedSecurity levelService-oriented systems021110 strategic defence & security studieslcsh:T58.5-58.64lcsh:Information technologybusiness.industryInformation technologyComputer Science Applicationssecurity incidents020201 artificial intelligence & image processingbusinessJournal of Information and Telecommunication
researchProduct

Analysis of dynamic service oriented systems for security related problems detection

2017

The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…

Security engineeringCloud computing securitysecurity incidentsSecurity serviceSoftware security assuranceComputer scienceDistributed computingSherwood Applied Business Security Architecturesecurity levelSecurity managementservice oriented systemsComputer security modelSecurity information and event management
researchProduct

Multi-Platform Agent Systems with Dynamic Reputation Policy Management

2011

Open, distributed multi-platform agent systems require new management approaches for resources and data secure access. In this paper a Jade-S based multi-platform agent system implementing dynamic reputation policy management is proposed. The implemented extension deals with biometrics, X-Security, DES cryptography and agent reputation. With more details, the proposed reputation management system helps to assess the agent's behavior and reliability, in order to select trusted agents. This is made possible by the knowledge that agents are able to acquire, over time, and that allows them to choose the best solution using own intelligence in total autonomy.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer sciencebusiness.industrymedia_common.quotation_subjectReliability (computer networking)JADE (programming language)CryptographyComputer securitycomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEOrder (exchange)businesscomputerMulti platformAutonomycomputer.programming_languagemedia_commonReputationMulti-agents system security levels dynamic reputation management.
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct