Search results for "Security service"
showing 10 items of 23 documents
Improvement of a Service Level Negotiation Protocol using Formal Verification
2013
International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
Ksiądz prymas Stefan Wyszyński na uroczystościach milenijnych w Opolu i Kamieniu Śląskim (13-14 sierpnia 1966 r.) - historia i aktualność przesłania
2022
W dniach 13 i 14 sierpnia 1966 r. ks. prymas Stefan Wyszyński wziął udział w uroczystościach liturgicznych w Opolu i Kamieniu Śląskim w ramach obchodów milenium chrztu w Polsce. Wygłosił wtedy kazania w Opolu 13 i 14 sierpnia, a także 14 sierpnia w Kamieniu Śląskim. Zaangażowanie ówczesnych lokalnych władz, milicji czy Służby Bezpieczeństwa w niwelowanie znaczenia tych obchodów, a zarazem treść przesłania, z jakim do swoich rodaków zwrócił się w Opolu i Kamieniu Śląskim z 1966 r. prymas Wyszyński, dowodzą, że trudno było pozostać obojętnym wobec tego nauczania. Chociaż uwarunkowania społeczno-polityczne zmieniły się, postać prymasa i jego nauczanie wciąż inspirują. Artykuł pt. Ksiądz prymas…
IoT-MAAC: Multiple Attribute Access Control for IoT environments
2020
Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism that considers the access of IoT objects to IoT gateways in order to enhance the reliability of IoT data provided by the IoT objects. Our proposed access control mechanism, called IoT-MAAC (Multi Attribute Access Control), allows retrieving requested data from the most reliable and secured IoT objects among the available objects in the IoT environmen…
A roadmap towards improving managed security services from a privacy perspective
2014
Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…
Policing in the Slovak Republic: The Organization and Current Problems of Police Work
2013
The Police hold one of the most important roles within the modern society from the viewpoint of providing and maintaining peace, order and security. In the Slovak Republic the police have been in existence for a relatively short time, but legislation regulating their activities and structure has already undergone several reforms. This treatise contains information regarding the structure and tasks of the Police of the Slovak Republic, discusses the development of criminality within the Slovak Republic, and analyses the current social status of the Police.
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013
In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
2010
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…