Search results for "Security"

showing 10 items of 1693 documents

Web Services Specific Security Standards

2014

Abstract In this paper are described the aspects regarding the security within OGSA framework, introducing WS-Security standard – OASIS standard for Web Services security. There are approached the security aspects of the OGSA environment for the delivered architectures P2P – ‘Peer-to-Peer’ and there are presented the recent initiatives for creating a specific and adapted environment OGSA for the applications P2P and the specific security demands of these transactions. Furthermore, there are exposed aspects regarding the mobility of services and resources in the P2P context, with the conditions of applying WSRF framework, derived from OGSA to the P2P environments, SOA processes in P2P enviro…

Computer sciencebusiness.industryGeneral Engineeringmobile agents.Energy Engineering and Power TechnologyContext (language use)mobile environmentscomputer.software_genreWeb application securitySecurity softwareWorld Wide WebGrid architecturesWeb servicebusinesscomputersecurity softwareWeb servicesProcedia Economics and Finance
researchProduct

An Investigation of the Energy Consumption by Information Technology Equipments

2013

The World Wide Web and the rise of servers and PC's data centers have become a major position in the overall power consumption of the world. In order to prevent global warming and ensuing disasters, already Internet-service providers, hosting providers on green power have changed. Even household energy suppliers offer green electricity from renewable energy such as wind , solar, biomass and hydro, which emits no carbon dioxide, to stand against global warming. Only a global change for the information technology can prevent the global -warming. The switch to renewable energy is the beginning of our future and must be pursued as well as the research and development in information and communic…

Computer sciencebusiness.industryGlobal warmingInformation technologyGlobal changeEnergy consumptionEnvironmental economicsComputer securitycomputer.software_genreRenewable energyInformation and Communications TechnologyServerPosition (finance)businesscomputerInternational Journal of Computer Science and Information Technology
researchProduct

Security Enhancement of Peer-to-Peer Session Initiation

2012

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…

Computer sciencebusiness.industryInternet privacySecurity enhancementSession (computer science)Peer-to-peercomputer.software_genrebusinesscomputer
researchProduct

Low-cost active cyber defence

2014

The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…

Computer sciencebusiness.industryInternet privacybusinessComputer securitycomputer.software_genrePhishingcomputerCyber threats2014 6th International Conference On Cyber Conflict (CyCon 2014)
researchProduct

UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments

2010

A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…

Computer sciencebusiness.industryInteroperabilityProvisioningComputer securitycomputer.software_genreAdvanced Traffic Management SystemInteroperationIntelligent NetworkMiddleware (distributed applications)Semantic technologybusinesscomputerMobile serviceComputer network2010 Fifth International Conference on Internet and Web Applications and Services
researchProduct

New key based on tilted lenses for optical encryption

2016

A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is pr…

Computer sciencebusiness.industryMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEncryption01 natural sciencesGeneralLiterature_MISCELLANEOUSIndustrial and Manufacturing EngineeringOptical encryption010309 optics03 medical and health sciences0302 clinical medicineOpticsComputer Science::Multimedia0103 physical sciences030221 ophthalmology & optometryHybrid cryptosystemBusiness and International ManagementbusinessComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and SecurityApplied Optics
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

Keynote talk 3: From basics to advanced modelling and simulation techniques for mobile radio channels

2011

From the earliest beginnings of mobile communications to the present time, there has always been a high demand for realistic mobile radio channel models. This demand is driven by the fact that channel models are indispensable for the performance evaluation, parameter optimisation, and test of mobile communication systems. Channel modelling and simulation techniques are therefore of great importance for electronics and telecommunication engineers who are involved in the development of present and future mobile communication systems. This presentation will start with a review of the basic principles of mobile radio channel modelling and gradually moves to more advanced modelling and simulatio…

Computer sciencebusiness.industryPrincipal (computer security)Emphasis (telecommunications)Electrical engineeringlaw.inventionOpen researchRelaylawElectronic engineeringMobile telephonyElectronicsbusinessComputer Science::Information TheoryCommunication channelEnvelope (motion)The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)
researchProduct

A new autonomous data transmission reduction method for wireless sensors networks

2018

International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…

Computer sciencebusiness.industryReal-time computing020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation7. Clean energy[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingReduction (complexity)[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Transmission (telecommunications)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020204 information systemsSensor node0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEnergy (signal processing)Data transmissionData reduction2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

MEDiSN

2008

Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high-quality care. Moreover, there is a growing concern about the ability of hospitals to provide effective care during disaster events. Tools that automate patient monitoring would greatly improve efficiency, quality of care, and the volume of patients treated. Towards this goal, we have developed MEDiSN, a wireless sensor network for monitoring patients' vital signs in hospitals and disaster events. MEDiSN consists of Patient Monitors which are custom-built, patient-worn motes that sample, compress and secure medical data, and Relay Points that form a static multi-hop wireles…

Computer sciencebusiness.industryRemote patient monitoringQuality of serviceVital signsVolume (computing)Sample (statistics)Computer securitycomputer.software_genreWirelessbusinesscomputerCollection Tree ProtocolWireless sensor networkProceedings of the 6th ACM conference on Embedded network sensor systems
researchProduct