Filters








123,049 Hits in 5.8 sec

A two layered approach for securing an object store network

A. Azagury, R. Canetti, M. Factor, S. Halevi, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, J. Satran
First International IEEE Security in Storage Workshop, 2002. Proceedings.  
In this paper we present a security model for the object store which leverages on existing security infrastructure.  ...  An object store control unit presents an abstraction of a dynamic collection of objects, each can be seen as a different array of blocks, thus providing the basis for protection at the object level.  ...  Davis, Leo Luan, Benjamin Reed and Miriam Sivan-zimet for reviewing an earlier version of the paper. Finally, we thank the anonymous referees for their valuable comments.  ... 
doi:10.1109/sisw.2002.1183506 dblp:conf/sisw/AzaguryCFHHNRRS02 fatcat:q6jacvv6tvdj3ibqqw37shzmba

Named Data Networking (NDN), Internet Architecture Design and Security Attacks

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, we surveyed different network issues and security attacks in Named Data Networks and its counter measures and also we identified a set of current challenges in NDN for budding researchers  ...  In Internet over established communication medium a packet in a network transmit data where users and data server with specific IP addresses interacted each other.  ...  The security attacks in NDN layers are, Physical and Data Link Layer Named data network design encryption mechanism is similar to the TCP / IP architecture.  ... 
doi:10.35940/ijitee.k1258.09811s19 fatcat:3iz6k6oqqna23oucqyjltfin7y

Secure vertical integration for building automation networks

Christian Reinisch, Wolfgang Granzer, Wolfgang Kastner
2008 2008 IEEE International Workshop on Factory Communication Systems  
This paper presents an adaptive security layer protocol architecture that is capable of operating on heterogenous networks.  ...  In recent years, building automation systems have become a widely accepted technology with dedicated but stand-alone solutions existing for a variety of application domains.  ...  For example, an application object can be accessed by a BACnet user application while interfacing with a ZigBee application layer plugin.  ... 
doi:10.1109/wfcs.2008.4638743 fatcat:anupv6df6jdsrm4wmtdz4yc7oe

Internet of Things Security: Challenges and Key Issues

Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, Ambrina Kanwal, Habib Ullah Khan
2021 Security and Communication Networks  
Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices.  ...  Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems.  ...  As a result, this approach is not suitable for IoT objects [125] . Blockchain. Blockchain is a particular sort of database.  ... 
doi:10.1155/2021/5533843 fatcat:st6oaryrtfgthh5evf6343kkve

A Role of Routing, Transport and Security Mechanisms in Information Centric Network

2019 International journal of recent technology and engineering  
To suit recent expectations there is need of revolution in communication networks; Information Centric Network (ICN) is a new kind of network architecture evolving for future internet.  ...  This article introduces ICN and its prominent features and reviews the work done post architectural approaches in the areas of routing, transport and security specifically.  ...  Object Based Security In TCP/IP networks two end point connections are secured but content itself is not secured, here content travel through a secure channel, but in ICN security is provided to content  ... 
doi:10.35940/ijrte.b1037.0782s419 fatcat:swrc2p437ndf7or5p56hbccnme

A Survey on the Internet of Things Software Arhitecture

Nicoleta-Cristina Gaitan, Vasile Gheorghita, Ioan Ungurean
2015 International Journal of Advanced Computer Science and Applications  
IoT may be considered as a network of physical objects with embedded communication technologies that 'feel' or interact with internal or external environment.  ...  The Internet of Things (IoT) is a concept and a paradigm that considers the pervasive presence in the environment of a variety of things/objects through wired or wireless that are uniquely addressed and  ...  The authors define this layer as a neural network that represents the brain of the IoT and includes a network convergence for communication, the Internet, a network management center, an information center  ... 
doi:10.14569/ijacsa.2015.061219 fatcat:qpy24dqsubf5rkr3r4os6lfz7u

A distributed systems approach to secure Internet mail

Philip Machanick
2005 Computers & security  
This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework.  ...  This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer.  ...  Internet Security Internet security problems broadly speaking fall into two categories: insecure implementation of servers or clients (application layer), and insecure network protocols (lower layers).  ... 
doi:10.1016/j.cose.2005.03.007 fatcat:xbuj3djwdfe47hhwj66utvdqzm

FLIOTA: A Novel Four-Layer IOT Architecture

Zhi-zhong ZHANG
2019 DEStech Transactions on Environment Energy and Earth Science  
Thus a novel Four-layer IOT architecture(FLIOTA) was proposed, which consists of Core Layer (CL), Security and Application Layer (SIL), Application Layer (AL) and Sensor and Actuator Layer (SAL), and is  ...  A SOA approach allows for software and hardware reusing, because it does not impose a specific technology for the service implementation.  ...  On the other side, the data transmitted to the actuators should be stored in the CSS permanently, stored in the DSS for a life time of Td, and in the LSS for a life time of Tl.  ... 
doi:10.12783/dteees/icepe2019/28956 fatcat:bcbleya42bbjjcuwnr7he2ux64

Enhancing the Semantic Web of Things: A fog-centric Architecture and a Geospatial Indexing Method

2020 International Journal of Emerging Trends in Engineering Research  
and store the semantic description of the IoT resources in the fog layer.  ...  The deployment of interoperability, mobility, security and scalability mechanisms is essential for IoT. While, these mechanisms are resources consumers, IoT devices are resources constrained.  ...  PHT builds a prefix tree in which objects are stored at leaf nodes. Hence, an object with key K is stored at a leaf node with a label that is a prefix of K.  ... 
doi:10.30534/ijeter/2020/243892020 fatcat:ho7romk5kbdvbdfphivzloy55i

Trust and Reputation in the Internet of Things: State-of-the-art and Research Challenges

Giancarlo Fortino, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M.L. Sarne
2020 IEEE Access  
In this setting, we propose a comparison based on the important characteristics of the IoT layer and the architecture type.  ...  Such an analysis allows us to highlight both advantages and limitations of each approach, and to discuss the emerging research challenges.  ...  Adopting the SoA approach in the IoT architecture will generate four layers: the perception layer, network layer, service layer, and application layer.  ... 
doi:10.1109/access.2020.2982318 fatcat:a3vx6d4q3rchlms2wnphliqofa

A Blockchain Application Prototype for the Internet of Things

Mansour Mededjel, Ghalem Belalem, Fatima Zohra Nesrine Benadda, Samah Kadakelloucha
2022 Journal of Communications Software and Systems  
In this paper, a new approach is proposed with a threelayer architecture: layer of sensing and collection of data made up of the IoT network, layer of processing and saving of data exchanges at the Blockchain  ...  The prototype implemented in this study allows all transactions (data exchanges) generated by IoT devices to be recorded and stored on a dedicated Blockchain, assuring the security of IoT objects' communications  ...  A three-layer architecture is proposed in this approach: the Blockchain, the IoT network, and the web interface that allows users to interact with the two previous layers.  ... 
doi:10.24138/jcomss-2021-0129 fatcat:zxnzxeag45crppwuzxbo6gt2d4

Flexible security configuration for virtual machines

Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
2008 Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08  
Virtual machines are widely accepted as a promising basis for building secure systems.  ...  We describe the design and implementation of such an architecture using SELinux, Xen and IPsec as the tools to express and enforce policies at the OS, VM and Network layers, respectively.  ...  The policy store is a network daemon running in dom0 and acts as a local cache for the global application authority.  ... 
doi:10.1145/1456508.1456515 dblp:conf/ccs/RuedaSJ08 fatcat:7rk6zvwfabhn7cp7kvgpev7jte

A review on biologically inspired approaches to security for Internet of Things (IoT)

Reshma Banu, G. F. Ali Ahammed, Nasreen Fathima
2016 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)  
The IoT calls for a new paradigm of security, which will have to consider the security problem as a comprehensive approach including the new actors and their interactions.  ...  The similarities between the biological phenomenon's and the operations of the network make bio inspired approach a interesting field for research.  ...  Muna and Azween in [6] proposed a novel approach for adaptive immune virtual layer by multi mobile agents.  ... 
doi:10.1109/iceeot.2016.7754848 fatcat:afobuqmyhbc2zbyotkmtzmzwgm

Deep Secure Encoding: An Application to Face Recognition [article]

Rohit Pandey, Yingbo Zhou, Venu Govindaraju
2015 arXiv   pre-print
In this paper we present Deep Secure Encoding: a framework for secure classification using deep neural networks, and apply it to the task of biometric template protection for faces.  ...  Using deep convolutional neural networks (CNNs), we learn a robust mapping of face classes to high entropy secure codes.  ...  Figure 1 : 1 An illustration of the deep secure encoding network used in this work.  ... 
arXiv:1506.04340v1 fatcat:mmz3bkz2zvfgnnqetggjthyju4

Improving security issues and security attacks in cloud computing
IJARCCE - Computer and Communication Engineering

DR.V.VENKATESA KUMAR, M. NITHYA
2014 IJARCCE  
In this paper, the solution for various security issues and security attacks are analyzed to secure cloud.  ...  Cloud computing is a model that provides the services based on as-needed and when-needed basis. Cloud computing provides online information storage, infrastructure and application.  ...  The following figure2 represents the framework layers for cloud security. First layer in the cloud security is the virtual network monitor layer. It is the top most layers in cloud security layers.  ... 
doi:10.17148/ijarcce.2014.31015 fatcat:4k7bkugwjzdpjkliljzlgm7tmi
« Previous Showing results 1 — 15 out of 123,049 results