A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
A two layered approach for securing an object store network
First International IEEE Security in Storage Workshop, 2002. Proceedings.
In this paper we present a security model for the object store which leverages on existing security infrastructure. ...
An object store control unit presents an abstraction of a dynamic collection of objects, each can be seen as a different array of blocks, thus providing the basis for protection at the object level. ...
Davis, Leo Luan, Benjamin Reed and Miriam Sivan-zimet for reviewing an earlier version of the paper. Finally, we thank the anonymous referees for their valuable comments. ...
doi:10.1109/sisw.2002.1183506
dblp:conf/sisw/AzaguryCFHHNRRS02
fatcat:q6jacvv6tvdj3ibqqw37shzmba
Named Data Networking (NDN), Internet Architecture Design and Security Attacks
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In this paper, we surveyed different network issues and security attacks in Named Data Networks and its counter measures and also we identified a set of current challenges in NDN for budding researchers ...
In Internet over established communication medium a packet in a network transmit data where users and data server with specific IP addresses interacted each other. ...
The security attacks in NDN layers are,
Physical and Data Link Layer Named data network design encryption mechanism is similar to the TCP / IP architecture. ...
doi:10.35940/ijitee.k1258.09811s19
fatcat:3iz6k6oqqna23oucqyjltfin7y
Secure vertical integration for building automation networks
2008
2008 IEEE International Workshop on Factory Communication Systems
This paper presents an adaptive security layer protocol architecture that is capable of operating on heterogenous networks. ...
In recent years, building automation systems have become a widely accepted technology with dedicated but stand-alone solutions existing for a variety of application domains. ...
For example, an application object can be accessed by a BACnet user application while interfacing with a ZigBee application layer plugin. ...
doi:10.1109/wfcs.2008.4638743
fatcat:anupv6df6jdsrm4wmtdz4yc7oe
Internet of Things Security: Challenges and Key Issues
2021
Security and Communication Networks
Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices. ...
Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems. ...
As a result, this approach is not suitable for IoT objects [125] .
Blockchain. Blockchain is a particular sort of database. ...
doi:10.1155/2021/5533843
fatcat:st6oaryrtfgthh5evf6343kkve
A Role of Routing, Transport and Security Mechanisms in Information Centric Network
2019
International journal of recent technology and engineering
To suit recent expectations there is need of revolution in communication networks; Information Centric Network (ICN) is a new kind of network architecture evolving for future internet. ...
This article introduces ICN and its prominent features and reviews the work done post architectural approaches in the areas of routing, transport and security specifically. ...
Object Based Security In TCP/IP networks two end point connections are secured but content itself is not secured, here content travel through a secure channel, but in ICN security is provided to content ...
doi:10.35940/ijrte.b1037.0782s419
fatcat:swrc2p437ndf7or5p56hbccnme
A Survey on the Internet of Things Software Arhitecture
2015
International Journal of Advanced Computer Science and Applications
IoT may be considered as a network of physical objects with embedded communication technologies that 'feel' or interact with internal or external environment. ...
The Internet of Things (IoT) is a concept and a paradigm that considers the pervasive presence in the environment of a variety of things/objects through wired or wireless that are uniquely addressed and ...
The authors define this layer as a neural network that represents the brain of the IoT and includes a network convergence for communication, the Internet, a network management center, an information center ...
doi:10.14569/ijacsa.2015.061219
fatcat:qpy24dqsubf5rkr3r4os6lfz7u
A distributed systems approach to secure Internet mail
2005
Computers & security
This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. ...
This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. ...
Internet Security Internet security problems broadly speaking fall into two categories: insecure implementation of servers or clients (application layer), and insecure network protocols (lower layers). ...
doi:10.1016/j.cose.2005.03.007
fatcat:xbuj3djwdfe47hhwj66utvdqzm
FLIOTA: A Novel Four-Layer IOT Architecture
2019
DEStech Transactions on Environment Energy and Earth Science
Thus a novel Four-layer IOT architecture(FLIOTA) was proposed, which consists of Core Layer (CL), Security and Application Layer (SIL), Application Layer (AL) and Sensor and Actuator Layer (SAL), and is ...
A SOA approach allows for software and hardware reusing, because it does not impose a specific technology for the service implementation. ...
On the other side, the data transmitted to the actuators should be stored in the CSS permanently, stored in the DSS for a life time of Td, and in the LSS for a life time of Tl. ...
doi:10.12783/dteees/icepe2019/28956
fatcat:bcbleya42bbjjcuwnr7he2ux64
Enhancing the Semantic Web of Things: A fog-centric Architecture and a Geospatial Indexing Method
2020
International Journal of Emerging Trends in Engineering Research
and store the semantic description of the IoT resources in the fog layer. ...
The deployment of interoperability, mobility, security and scalability mechanisms is essential for IoT. While, these mechanisms are resources consumers, IoT devices are resources constrained. ...
PHT builds a prefix tree in which objects are stored at leaf nodes. Hence, an object with key K is stored at a leaf node with a label that is a prefix of K. ...
doi:10.30534/ijeter/2020/243892020
fatcat:ho7romk5kbdvbdfphivzloy55i
Trust and Reputation in the Internet of Things: State-of-the-art and Research Challenges
2020
IEEE Access
In this setting, we propose a comparison based on the important characteristics of the IoT layer and the architecture type. ...
Such an analysis allows us to highlight both advantages and limitations of each approach, and to discuss the emerging research challenges. ...
Adopting the SoA approach in the IoT architecture will generate four layers: the perception layer, network layer, service layer, and application layer. ...
doi:10.1109/access.2020.2982318
fatcat:a3vx6d4q3rchlms2wnphliqofa
A Blockchain Application Prototype for the Internet of Things
2022
Journal of Communications Software and Systems
In this paper, a new approach is proposed with a threelayer architecture: layer of sensing and collection of data made up of the IoT network, layer of processing and saving of data exchanges at the Blockchain ...
The prototype implemented in this study allows all transactions (data exchanges) generated by IoT devices to be recorded and stored on a dedicated Blockchain, assuring the security of IoT objects' communications ...
A three-layer architecture is proposed in this approach: the Blockchain, the IoT network, and the web interface that allows users to interact with the two previous layers. ...
doi:10.24138/jcomss-2021-0129
fatcat:zxnzxeag45crppwuzxbo6gt2d4
Flexible security configuration for virtual machines
2008
Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08
Virtual machines are widely accepted as a promising basis for building secure systems. ...
We describe the design and implementation of such an architecture using SELinux, Xen and IPsec as the tools to express and enforce policies at the OS, VM and Network layers, respectively. ...
The policy store is a network daemon running in dom0 and acts as a local cache for the global application authority. ...
doi:10.1145/1456508.1456515
dblp:conf/ccs/RuedaSJ08
fatcat:7rk6zvwfabhn7cp7kvgpev7jte
A review on biologically inspired approaches to security for Internet of Things (IoT)
2016
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
The IoT calls for a new paradigm of security, which will have to consider the security problem as a comprehensive approach including the new actors and their interactions. ...
The similarities between the biological phenomenon's and the operations of the network make bio inspired approach a interesting field for research. ...
Muna and Azween in [6] proposed a novel approach for adaptive immune virtual layer by multi mobile agents. ...
doi:10.1109/iceeot.2016.7754848
fatcat:afobuqmyhbc2zbyotkmtzmzwgm
Deep Secure Encoding: An Application to Face Recognition
[article]
2015
arXiv
pre-print
In this paper we present Deep Secure Encoding: a framework for secure classification using deep neural networks, and apply it to the task of biometric template protection for faces. ...
Using deep convolutional neural networks (CNNs), we learn a robust mapping of face classes to high entropy secure codes. ...
Figure 1 : 1 An illustration of the deep secure encoding network used in this work. ...
arXiv:1506.04340v1
fatcat:mmz3bkz2zvfgnnqetggjthyju4
Improving security issues and security attacks in cloud computing
IJARCCE - Computer and Communication Engineering
2014
IJARCCE
IJARCCE - Computer and Communication Engineering
In this paper, the solution for various security issues and security attacks are analyzed to secure cloud. ...
Cloud computing is a model that provides the services based on as-needed and when-needed basis. Cloud computing provides online information storage, infrastructure and application. ...
The following figure2 represents the framework layers for cloud security. First layer in the cloud security is the virtual network monitor layer. It is the top most layers in cloud security layers. ...
doi:10.17148/ijarcce.2014.31015
fatcat:4k7bkugwjzdpjkliljzlgm7tmi
« Previous
Showing results 1 — 15 out of 123,049 results