Filters








93,698 Hits in 7.3 sec

Digital government security infrastructure design challenges

J. Joshi, A. Ghafoor, W.G. Aref, E.H. Spafford
2001 Computer  
Acknowledgment This study is supported, in part, by a grant from the Center for Education and Research in Information Assurance and Security at Purdue.  ...  Information about agent technology that addresses the issue of security in a heterogeneous environment has begun appearing in the literature.  ...  Researchers have proposed several new approaches and models to address these issues.  ... 
doi:10.1109/2.901169 fatcat:jrf2e6nrarbmpnwknthcvvcvsy

Multi-agent software complex for researching the direction of development of the fuel and energy complex taking into account energy security "INTEC-A"

Timur G. Mamedov, Aleksey G. Massel, F.-J. Lin, N. Voropai, C.-I. Chen, K. Suslov, D. Sidorov, A.M. Foley, Y. Sun, P. Lombardi, A. Kler
2021 E3S Web of Conferences  
In the course of direct reengineering of this software complex, a multi-agent approach was used to expand its functionality in the future.  ...  security, called INTEC-A.  ...  was decided to develop a new version of SF-INTEC, based on articles and dissertations describing the existing versions of the software complex and the experience of their use.  ... 
doi:10.1051/e3sconf/202128903004 fatcat:u3zhfrpd7zek7fbdmikwjwuykq

Peer to Peer Cloud Providers Federation

Nourah Fahad Janbi Nourah Fahad Janbi
2019 journal of king abdulaziz university computing and information technology sciences  
The architecture combines different software technologies to fulfil the cloud federation requirements.  ...  On the other hand, it is challenging in term of complexity, security and manageability of the federation. In this paper we propose a fully distributed P2P Cloud Federation (PPCF) architecture.  ...  Agent-based Peer Discovery (APD) Agent-based Peer Discovery is component that use mobile agent technology to discover other cloud providers in the federation and their available recourse and store them  ... 
doi:10.4197/comp.8-1.6 fatcat:rb2lcze34zd35l3bpj2vktgb5y

Table of Contents

2021 2021 International Conference on Information Technologies (InfoTech)  
Security" Security Policy, Methods and Tools B01 The "Self-Assessment" Method within a Mature Third-Party Risk Management Process in the Context of Information Security Veselin Monev New Bulgarian  ...  Multimedia and Social Media A11 The Educational Use of a Website in the Teaching of Chemistry Module on "Acids-Bases-Salts" A.  ... 
doi:10.1109/infotech52438.2021.9548548 fatcat:rpmmi6maxzhjjoi7vh6jrbpr44

Public Safety and National Security Implications of the Horsepox Study

Jennifer Snow, James Giordano
2018 Health Security  
Acknowledgments This work was supported in part by federal funds  ...  In light of this, we recommend a hybrid approach that combines academic, DIY, and industry experts to inform and advise policy development.  ...  pose risks and threats to public safety and national security as a consequence of inadvertent dissemination or intentional use as bioweapons  ... 
doi:10.1089/hs.2018.0018 pmid:29624486 pmcid:PMC5899283 fatcat:oiq5qtfpkbhffivon6scc2xjmi

Community-Structured Decentralized Learning for Resilient EI

Harikrishna Kuttivelil, Katia Obraczka
2021 Proceedings of the First Workshop on Systems Challenges in Reliable and Secure Federated Learning  
During the initialization phase, agents securely exchange feature or data information with one another and measure affinity based on the shared information.  ...  We 1 ) a fully-connected network in which each agent shares its trained model information with every other agent, (2) using random partner selection in which each agent shares information with a random  ... 
doi:10.1145/3477114.3488764 fatcat:qumfsdkf4zhwxir6ztybs2n3ku

Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach

Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura
2014 Journal of Information Processing  
Moreover, it is proved that both approaches effectively work to protect privacy.  ...  Specifically, we explore technologies of proxies that include provision of anonymity and building of trust in a federation.  ...  We have two approaches: one is to use SII-like agents, and the other to use cascaded proxies. c 2014 Information Processing Society of Japan Problem Specification Let us represent the privacy requirements  ... 
doi:10.2197/ipsjjip.22.464 fatcat:gwzim2uoabdajgocskrpjkgf4a

Computational Intelligence in Cyber Security

Dipankar Dasgupta
2006 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety  
The use of these techniques allowed building efficient and robust decision support modules, providing cross-linking solutions to different cyber security applications.  ...  Computational Intelligence techniques have proven to be flexible in decision making in dynamic environment.  ...  Thus, a multi-faceted and more comprehensive approach is necessary to deal with influx of new threats.  ... 
doi:10.1109/cihsps.2006.313289 fatcat:t5wir63zwbedrdz2o5cmlwy6ei

Table of Contents

2020 2020 International Conference on Information Technologies (InfoTech)  
, Switzerland) [B03] Defining and Applying Information Security Goals for Blockchain Technology Veselin Monev New Bulgarian University (Bulgaria, Switzerland) [B04] Organisational Information Security  ...  Dagestan State University of National Economy (Russian Federation) [B02] Measuring the Optimal Information Security Complexity for Blockchain Operations Veselin Monev New Bulgarian University (Bulgaria  ... 
doi:10.1109/infotech49733.2020.9211049 fatcat:ti7b24sbs5av7bt6wzuzjeliiu

Design of a Virtual Community Infrastructure for Elderly Care [chapter]

L. M. Camarinha-Matos, H. Afsarmanesh
2002 IFIP Advances in Information and Communication Technology  
An architecture for a flexible platform based on adaptive mobile agents and information federation mechanisms is proposed and preliminary feasibility experiments are described.  ...  community", represent a promising approach to reduce the overwhelming care provision costs and to increase their quality.  ...  c. launching of new agents. It can be based on a catalog of agent types (agent skeletons). f.  ... 
doi:10.1007/978-0-387-35585-6_47 fatcat:drmmchifdbd4dil7hzjc6ti3ti

Web-Based Parallel Simulation of AGVs Using Java and JINI [chapter]

Rong Ye, Wen-Jing Hsu, Ze-Hua Liu
2001 Lecture Notes in Computer Science  
The objectives are to explore and address relevant issues, evaluate various approaches, demonstrate a workable version.  ...  In this project we make a small but practical step toward the grand vision of distributed simulation by using certain prevailing Internet technologies to enable access of simulation services anytime and  ...  Using JINI is a new approach to demonstrate the concept of Web-enabled AGV simulation system.  ... 
doi:10.1007/3-540-44743-1_38 fatcat:htkunpxgdzhfvjt27nx6xgz57e

Interoperable Federated Cloud Networking

Eduardo Huedo, Ruben S. Montero, Rafael Moreno, Ignacio M. Llorente, Anna Levin, Philippe Massonet
2017 IEEE Internet Computing  
The BEACON framework enables the provision of federated cloud infrastructures, with special emphasis on inter-cloud networking and security issues, to support the automated deployment of applications and  ...  BEACON provides many advanced features for the federated cloud networks such as automated high availability, datacenter location-aware elasticity, automated Service Function Chaining (SFC), and security  ...  Our approach to improving security relies on enforcing a global security policy on the federated cloud network using SFC across the different clouds 4 .  ... 
doi:10.1109/mic.2017.3481337 fatcat:pgtkfzjnbfczppxnwq535amirq

The impact of innovative technologies on consumers in the power supply market

Nadezhda Karuseva, Semen Livshits, Andrew Kotsubinski, Natalya Yudina, Olga Novikova, Anastasiia Tabakova, N. Vatin, P. Zunino, E. Vdovin
2019 E3S Web of Conferences  
Article will also talk about tools that are required to replace old service with a new power supply system, based on innovative technologies that include small-scale renewable energy generation.  ...  Service of supplying electricity to consumers in the Russian Federation (RF) is carried out based on power supply contract.  ...  If traditional approaches do not work, intelligent system solutions based on multi-agent technologies (multi-agent systems) come to the rescue.  ... 
doi:10.1051/e3sconf/201914004009 fatcat:hya4xaiqvbepphfxdx7vincxo4

Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review

Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad
2010 Computer and Information Science  
This paper of literature review also describes an approach that allows us to build a security cloud platform using MAS architecture and this architecture tends to use specialized autonomous agents for  ...  security of CDS, on how the MAS technology could be utilized in a cloud platform for serving the security that is developed by using a collaborative environment of Java Agent DEvelopment (JADE).  ...  Several attempts have been made to provide security using a software agent systems approach.  ... 
doi:10.5539/cis.v3n4p175 fatcat:z5tjlard7vhdppdlj2eubuwo7y

An open, component-based information infrastructure to support integrated regional healthcare networks

D G Katehakis, S Kostomanolakis, M Tsiknakis, S C Orphanoudakis
2001 Studies in Health Technology and Informatics  
The federated approach is principally used for facilitating the virtual view of the Integrated Electronic Health Record (I-EHR), without having to replicate unnecessary information.  ...  Inter-operability can be achieved either through messages or through a more advanced approach based on a federation of autonomous systems.  ...  The federated approach is based on an underlying infrastructure, based upon a minimum common/ federated data model, of both generic and health-related services to support the provision of integrated shared  ... 
pmid:11604698 fatcat:3tyvkk3twfdvrjozbf4iuygjee
« Previous Showing results 1 — 15 out of 93,698 results