Search results for "computer networks"
showing 10 items of 860 documents
Security framework for dynamic service-oriented IT systems
2018
The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …
Executives' Commitment to Information Security
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
A Comparison between Habituation and Conscience mechanism in Self–Organizing Maps
2006
In this letter, a preliminary study of habituation in self-organizing networks is reported. The habituation model implemented allows us to obtain a faster learning process and better clustering performances. The liabituable neuron is a generalization of the typical neuron and can be used in many self-organizing network models. The habituation mechanism is implemented in a SOM and the clustering performances of the network are compared to the conscience learning mechanism that follows roughly the same principle but is less sophisticated.
A multiscale approach to automatic and unsupervised retinal vessel segmentation using Self-Organizing Maps
2016
In this paper an automatic unsupervised method for retinal vessel segmentation is described. Self-Organizing Map, modified Fuzzy C-Means, STAPLE algorithms and majority voting strategy were adopted to identify a segmentation of the retinal vessels. The performance of the proposed method was evaluated on the DRIVE database.
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…
The Effects of the Use of Serious Game in Eco-Driving Training
2016
International audience; Serious games present a promising approach to training and learning. The player is engaged in a virtual environment for a purpose beyond pure entertainment, all while having fun. In this paper, we investigate the effects of the use of serious game in eco-driving training. An approach has been developed in order to improve players’ practical skills in terms of eco-driving. This approach is based on the development of a driving simulation based on a serious game, integrating a multisensorial guidance system with metaphors including visual messages (information on fuel consumption, ideal speed area, gearbox management, etc.) and sounds (spatialized sounds, voice message…
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Process reference frameworks as institutional arrangements for digital service innovation
2020
Abstract Information systems (IS) service organizations are increasingly more concerned with their ability to co-create digital services with customers in service ecosystems. Practitioners and researchers, however, lack understanding of which organization mechanisms effectively contribute to IS organizations’ innovation practices. Grounded in service-dominant logic, we hypothesized that process reference frameworks (PRFs), such as the IT Infrastructure Library (ITIL), act as institutional arrangements through their norms, rules, and practices, enhancing IS organizations’ ability to innovate digital services. Data collected from 159 IS organizations confirmed our hypotheses, showing that eff…
An Innovative Pricing Method for Telecommunication Services Pricing through American Options
2009
With the evolution of telecommunication networks and of their services the role of service provider is changed, so nowadays there is a coexistence of Network Operators and Virtual Operators. The difference between these players is not in the way they offer a service but primarily in their economic objectives and risk attitudes. Essentially, Network Operators own their infrastructures and typically have to sustain both fixed costs (CAPEX) and recurrent costs (OPEX), while Virtual Operators may have a simpler cost structure, mainly consisting of OPEX for the hire of network resources. Since these two operators can provide the same service in two different markets, their objectives differ subs…
A combined fuzzy-SEM evaluation approach to identify the key drivers of the academic library service quality in the digital technology era: An empiri…
2017
A conceptual model of the Academic Library (AL) service quality is hypothesized in the present article, and then validated and analyzed by a novel evaluation approach. Specifically, the conceptual model integrates the fundamental attributes of the canonical AL service together with those more relevant of the new and widely considered AL Electronic Service (e-services). As concerns the evaluation approach, it incorporates the Fuzzy Sets Theory (FST) so as to deal with the students' uncertainty over their own judgments on the AL service quality and a Structural Equation Model (SEM) to validate the conceptual model and to determine the key drivers of the AL service quality. The effectiveness o…