Search results for "Security"

showing 10 items of 1693 documents

Towards Modelling Information Security with Key-Challenge Petri Nets

2009

Our global information society is based on distributed wide-area networks. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network-accessible resources from unauthorized access, as well as continuous monitoring and measurement of the network security's effectiveness. In this paper, we describe the use of Petri nets in modelling network security. We propose a new hierarchical method for modelling network attacks and evaluating effectiveness of the corresponding defences. Our model is called Key-Challenge Petri Net (KCPN).

Network administratorNetwork securitybusiness.industryComputer scienceDistributed computingInformation securityProcess architectureComputer security modelPetri netComputer securitycomputer.software_genreSecurity serviceNetwork Access Controlbusinesscomputer
researchProduct

Towards a relation oriented service architecture

2010

Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented by adhering to the original design tenets of the Internet. Some of the tenets have been broken, others diluted and new ones are emerging to accommodate new paradigms. Moreover, applications and services have been moving slowly but consistently towards a uniform model based on Service Oriented Appr…

Network architecturecomputer.internet_protocolbusiness.industryComputer scienceQuality of serviceInteroperabilityService-oriented architectureComputer securitycomputer.software_genreBackward compatibilityWorld Wide WebNext-generation networkThe InternetSoftware architecturebusinesscomputer2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)
researchProduct

Two tiered privacy enhanced intrusion detection system architecture

2009

The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.

Network forensicsInformation privacyComputer sciencePrivacy policyLaw enforcementXACMLComputingMilieux_LEGALASPECTSOFCOMPUTINGIntrusion detection systemNetwork monitoringComputer securitycomputer.software_genreHost-based intrusion detection systemcomputercomputer.programming_language2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct

A trust-based security enforcement in disruption-tolerant networks

2017

We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.

Network packetbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreMedical servicesTrustworthiness020204 information systems0202 electrical engineering electronic engineering information engineeringPeer to peer computingComputational trustUnavailabilitySubjective logicbusinessEnforcementcomputerComputer network2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Feasibility of FPGA accelerated IPsec on cloud

2018

Abstract Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurre…

Network securityComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolPacket processingCloud computing02 engineering and technologycomputer.software_genreEncryptionGeneralLiterature_MISCELLANEOUSArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringField-programmable gate arrayVirtual network0505 lawbusiness.industryNetwork packet05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringByteVirtualization020202 computer hardware & architectureHardware and ArchitectureEmbedded systemIPsec050501 criminologyHardware accelerationbusinesscomputerSoftwareMicroprocessors and Microsystems
researchProduct

Learning Temporal Regularities of User Behavior for Anomaly Detection

2001

Fast expansion of inexpensive computers and computer networks has dramatically increased number of computer security incidents during last years. While quite many computer systems are still vulnerable to numerous attacks, intrusion detection has become vitally important as a response to constantly increasing number of threats. In this paper we discuss an approach to discover temporal and sequential regularities in user behavior. We present an algorithm that allows creating and maintaining user profiles relying not only on sequential information but taking into account temporal features, such as events' lengths and possible temporal relations between them. The constructed profiles represent …

Network securitybusiness.industryComputer scienceAnomaly detectionArtificial intelligenceIntrusion detection systemData miningAnomaly (physics)businesscomputer.software_genrecomputer
researchProduct

β-delayed neutron emission of r-process nuclei at the N = 82 shell closure

2021

This experiment was performed at RI Beam Factory operated by RIKEN Nishina Center and CNS, University of Tokyo. O.H, T.D, P.J.W, C.G.B, C.J.G and D.K would like to thank STFC, UK for support. This research was sponsored in part by the Office of Nuclear Physics, U.S. Department of Energy under Award No. DE-FG02-96ER40983 (UTK) and DEAC05-00OR22725 (ORNL), and by the National Nuclear Security Administration under the Stewardship Science Academic Alliances program through DOE Award No. DENA0002132. This work was supported by National Science Foundation under Grants No. PHY-1430152 (JINA Center for the Evolution of the Elements), No. PHY-1565546 (NSCL), and No. PHY-1714153 (Central Michigan Uni…

Nuclear and High Energy PhysicsNational securityQC1-999ß-delayedNuclear physicsLibrary scienceNeutrons--Capturaβ-delayed neutron emission7. Clean energy01 natural sciencesNeutrons--CaptureAstrophysical0103 physical sciencesEuropean commissionr-processimportant010306 general physicsChinaNuclear ExperimentNeutron emissionr-processPhysics:Física [Àrees temàtiques de la UPC]010308 nuclear & particles physicsbusiness.industryr-processPhysicsChinese academy of sciencesbeta-delayed neutron emissionResearch councilChristian ministryFísica nuclearNational laboratorybusinessAdministration (government)Physics Letters B
researchProduct

Numerical modelling of out-of-plane response of infilled frames: State of the art and future challenges for the equivalent strut macromodels

2017

Abstract Infill-frame interaction constitutes a still open question both in research and in practicing engineering. Computational models used to predict this interaction are, in most cases, addressing the estimation of the response of the infilled frames when subjected to actions parallel to their plane. However, the observation of the post-earthquake damage has demonstrated that infills, weakened by the in-plane actions, may fail out-of-plane increasing the risks associated to the earthquake scenarios. In spite of this, different studies have shown that infills, if properly designed and supported by the frame, exhibit a significant strength and displacement capacity when called to resist t…

Numerical testingEngineeringInfilled frames0211 other engineering and technologies020101 civil engineering02 engineering and technology0201 civil engineeringOut of planeOut-of-planeSeismic assessmentMasonryArching actionCivil and Structural Engineering021110 strategic defence & security studiesComputational modelbusiness.industryIn-planeStructural engineeringMasonryInfilled framesSettore ICAR/09 - Tecnica Delle CostruzioniNonlinear systemIn planeArching action; In-plane; Infilled frames; Masonry; Out-of-plane; Seismic response;businessInfilled frameSeismic response
researchProduct

Food insecurity and physical multimorbidity among adults aged ≥ 50 years from six low- and middle-income countries

2022

Abstract Purpose Food insecurity and multimoribidity (i.e., ≥ 2 chronic conditions) may be linked bidirectionally, but there are no studies on this topic from LMICs. Therefore, the aim of the present study was to examine the association between food insecurity and physical multimorbidity in a large representative sample of older adults from six LMICs. Methods Cross-sectional, community-based data on adults aged ≥ 50 years from the World Health Organization’s Study on Global AGEing and Adult Health (SAGE) conducted in China, Ghana, India, Mexico, Russia, and South Africa were analyzed. A total of 11 chronic physical conditions were assessed. Past 12 month food insecurity was assessed with tw…

Nutrition and DieteticsChronic disease Food insecurity Low- and middle-income countries Multimorbidity Older adultsMedicine (miscellaneous)Smith L. Shin J. I. Jacob L. López Sánchez G. F. Schuch F. Tully M. A. Oh H. Veronese N. Soysal P. Butler L. et al. -Food insecurity and physical multimorbidity among adults aged ≥ 50 years from six low- and middle-income countries.- European journal of nutrition 2022
researchProduct

Mobile agents principles of operation

2004

Publisher Summary This chapter discusses the mobile agent technology and summarizes their features, principles of operation and implementation elements. Some development tools are also discussed. The chapter provides general description of mobile agents as an advanced software paradigm, which extends object oriented programming. Then it discusses principles of operation starting from agent intelligent behavior and continuing with mobility, communication, coordination, and fault tolerance. Finally, as for related topics, monitoring, performances, and security issues are discussed in the chapter. Agent monitoring techniques are very useful because they allow users to know which agents are run…

Object-oriented programmingComputer sciencebusiness.industryAccess controlFault toleranceEncryptionInternet securityCommunications securityComputer securitycomputer.software_genreSoftwareMobile agentbusinessHost (network)computer
researchProduct