Search results for "Security"

showing 10 items of 1693 documents

Building a Medical Research Cloud in the EASI-CLOUDS Project

2014

The demand for IT resources is constantly growing in the scientific area. The ability to store and process increasing amounts of data has transformed many research disciplines, like the life-sciences, which now rely on complex data processing and data analytics. Cloud environments are able to integrate and encapsulate possibly distributed resources and allow convenient and on-demand access to the corresponding services, tools, and complete work environments. The European research project EASI-CLOUDS (http://www. easi-clouds.eu) develops a platform for a convenient service delivery with special regard to service integration, monitoring, management, and Service Level Agreement (SLA) negotiati…

World Wide WebService-level agreementEngineeringCloud computing securityService delivery frameworkbusiness.industryCloud testingSoftware as a serviceeMixCloud computingData as a servicebusiness2014 6th International Workshop on Science Gateways
researchProduct

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Biosorption of nickel (II) and zinc (II) from aqueous solutions by the biomass of yeast Yarrowia lipolytica

2017

Abstract This study examined the biosorption process of Ni(II) and Zn(II) from an aqueous solution by dead biomass of Yarrowia lipolytica. Optimum biosorption conditions were determined as a function of pH, biomass dosage, contact time, and temperature. The biosorbent was characterized by FTIR, which indicated the participation of hydroxyl, carboxyl, amide and amine groups in the process of binding the metal ions. The results showed that the biosorption processes of both metal ions closely followed pseudo-second order kinetics. The equilibrium data of Ni(II) and Zn(II) ions at 20, 30 and 40°C fitted the Langmuir and Freundlich isotherm models. Langmuir isotherm provided a better fit to the …

Yarrowia lipolyticaGeneral Chemical Engineering0211 other engineering and technologiesBiomasschemistry.chemical_element02 engineering and technologyZinc010501 environmental sciences01 natural sciencesnickelQD1-9990105 earth and related environmental sciences021110 strategic defence & security studiesAqueous solutionbiologyzincBiosorptionIndustrial chemistryYarrowiaGeneral Chemistrybiology.organism_classificationYeastChemistryNickelChemical engineeringchemistryadsorption isothermsBiotechnologybiosorptionPolish Journal of Chemical Technology
researchProduct

The nature of security and risk in complex socio-technical systems : a partial application of Critical Systems Heuristics (CSH) to Finnish Security S…

2011

Tämä tutkimus selventää suhteita turvallisuuden, riskien sekä kompleksisten sosio-teknisten järjestelmien välillä. Käsittely tapahtuu pääosin yhteiskunnallisella tasolla, mutta eri järjestelmiä ja niiden yleisiä sekä teoreettisia perusrakenteita tarkastellaan kokonaisuuden ymmärtämiseksi paremmin. Samalla pyritään parantamaan käsitystä niistä monista yhteisvaikutuksista joita eri järjestelmillä on toisiinsa ja miten ne vaikuttavat turvallisuuteen. Turvallisuus on tunnistettu olevan suhteellista ja käyttäytyvät eri tavalla todellisissa avoimissa järjestelmissä ja avoimessa järjestelmien ympäristössä, verrattuna yksinkertaisiin järjestelmiin. Teknologia on alati läsnä nykyaikaisissa kehittyne…

Yhteiskunnan turvallisuusstrategia (YTS)turvallisuusverkottuneet teknologiatsecuritykompleksisuussosio-tekniset järjestelmätriskiyhteiskuntateknologiaCritical Systems Heuristics (CSH)esiin nousevat ilmiötcomplexityriskitasiantuntijuusrisk
researchProduct

Zabezpieczenie na nieruchomości w postępowaniu karnym jako wyraz równorzędności reguł interpretacji w praktyce orzeczniczej sądu karnego

2021

Artykuł poddaje analizie instytucję zabezpieczenia na nieruchomości w postępowaniu karnym w kontekście połączenia w niej działania organów postępowania karnego w dwóch różnych procedurach i w dwóch różnych pozycjach procesowych. Zabezpieczenie następuje w zakresie tytułu wykonawczego w postaci stosownego postanowienia i wynika z postępowania karnego w fazie in personam. Tytuł wykonawczy uzyskany w procedurze karnej stanowi podstawę wpisu hipoteki przymusowej według regulacji procedury cywilnej do księgi wieczystej. Artykuł ma na celu przedstawienie powyższej problematyki w kontekście rozkładu ciężaru argumentacyjnego poszczególnych uczestników dyskursu wskazanej sytuacji procesowej, a także…

Zabezpieczenie na nieruchomościsystematic and functional rules of interpretationpostanowienie o zabezpieczeniuburden of argumentationinterpretacja semantyczna i funkcjonalnacriminal proceedingssemantichipoteka przymusowarozkładu ciężaru argumentacyjnegoSecurity on real estatepostępowanie karnepostępowanie cywilnePrzegląd Prawa i Administracji
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

2023

Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]5GBIoV[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Zero-day attacksSécurité5G V2X IoV Sécurité Attaques Détection Apprentissage Fédéré[INFO] Computer Science [cs]Intrusion DetectionDétectionAttaquesSecurityV2XApprentissage FédéréFederated Learning5GConnected and Automated Vehicles[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès

2019

Research of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards.

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]BiometryIntruder detectionAlgorithm/architecture matchingBiométrieDétection d'intrusion en zone surveilléeAdéquation algorithme/architecture[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine Learning[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Traitements d'imagesDeep LearningImage processing[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Automatic Timeline Construction and Analysis For Computer Forensics Purposes

2014

International audience; To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore, it becomes more and more necessary to develop automatic tools to help or even replace investigators in some parts of the investigation. This paper introduces a multi-layered architecture designed to assist the investigative team in the extraction of information left in…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]Computer science[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Digital forensicsEvent ReconstructionOntology (information science)Computer securitycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Task (project management)[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]Timeline AnalysisCrime scene[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Event reconstructionOntologyTimelineComputer forensics16. Peace & justiceData science[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH][ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY]Digital Forensics[INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]computerCognitive load
researchProduct