9,947 Hits in 7.2 sec

A Survey on Future Internet Security Architectures

Wenxiu Ding, Zheng Yan, Robert H. Deng
2016 IEEE Access  
In order to obtain a thorough knowledge of security in future Internet architecture, we review a number of well-known projects, including named data networking, Content Aware Searching Retrieval and sTreaming  ...  These projects aim to move away from the traditional host-centric networks and replace them with content-centric, mobilitycentric, or service-centric networks.  ...  Content-centric networks even do not involve the addresses of the source and destination and just specify data names.  ... 
doi:10.1109/access.2016.2596705 fatcat:ny3dd4naaref7ktsmu32xzosbe

Security education within the IT curriculum

Charles Border, Ed Holden
2003 Proceeding of the 4th conference on Information technology education - CITC '03  
All of the respondents to this study felt that they needed to increase the amount of security content in their IT programs.  ...  This study is designed to gain a better understanding of the extent to which IT programs and the interest areas within them have changed to include a greater security component, and the means by which  ...  Networking and System Administration: Following the paradigm that much of security is keeping the bad guys out at the perimeter the Networking and System Administration group has taken the need to include  ... 
doi:10.1145/947121.947179 dblp:conf/sigite/BorderH03 fatcat:5s4p3shimzctllqin4463dhu2i

Secure Scuttlebutt

Dominic Tarr, Erick Lavoie, Aljoscha Meyer, Christian Tschudin
2019 Proceedings of the 6th ACM Conference on Information-Centric Networking - ICN '19  
We also provide a comparison with Named Data Networking (NDN), an existing information-centric networking architecture, to motivate a larger exploration of the design space for information-centric networking  ...  Secure Scuttlebutt (SSB) is a novel peer-to-peer event-sharing protocol and architecture for social apps.  ...  COMPARING SSB WITH NAMED DATA NETWORKING (NDN) In this section, after a brief introduction to NDN Named Data Networking NDN is an evolution of the Content-Centric Networking proposal that was publicly  ... 
doi:10.1145/3357150.3357396 dblp:conf/acmicn/TarrLMT19 fatcat:aekfffnurnci3psc7sc7bl7u4u

Ethics of Security [chapter]

Tommi Lehtonen
2021 Advances in Information Security, Privacy, and Ethics  
This chapter aims to identify and analyse the ethical problems of security, particularly cyber and digital threats. The concepts of security and safety are defined based on existing literature.  ...  The chapter addresses the key results and research gaps in the field (i.e., security issues in different areas) and future challenges, both theoretical and empirical.  ...  Human-centric cyber security focuses on how an end-user interacts with data and extends security controls into all data systems.  ... 
doi:10.4018/978-1-7998-4117-3.ch004 fatcat:p54rb2nfkffctjgjenktaqyb4y

Trust Metric based Soft Security in Mobile Pervasive Environment

Madhu Sharma Gaur, Bhaskar Pant
2014 International Journal of Computer Network and Information Security  
In the vision of pervasive computing where mobile applications are growing immensely with the potential of low cost, high performance, and user centric solutions.  ...  Despite advances in the technology, there is still a lack of methods to measure the security and level of trust and framework for the assessment and calculation of the degree of the trustworthiness.  ...  states that trusting behavior occurs when an individual (node) perceives an ambiguous path, the result of which could be good or bad, and the occurrence of the good or bad result is contingent on the  ... 
doi:10.5815/ijcnis.2014.10.08 fatcat:ufhtyz33rnclvlxt64rwpcxdae

Semantic Insecurity: Security and the Semantic Web

Harry Halpin
2017 International Semantic Web Conference  
Strangely enough, the Semantic Web has fallen behind the rest of the Web in terms of security.  ...  TLS is not in use currently for the majority of URIs on the Semantic Web, and this leads to a number of potential attacks on the network, web, and even semantic level.  ...  Acknowledgments This work is funded in part by the European Commission H2020 European Commission through the NEXTLEAP Project (Grant No. 6882).  ... 
dblp:conf/semweb/Halpin17 fatcat:px35zugik5abjpbwhmvusoeqyq

Improving security in data-centric storage for wireless sensor networks

Ángel Cuevas, Azzedine Bouckerche
2013 Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks - PE-WASUN '13  
WSN, Data-Centric Storage (DCS), Security.  ...  This paper proposes a novel mechanism to provide with se-curity to existing Data-Centric Storage (DCS) solutions for Wireless Sensor Networks.  ...  The research leading to these results has been partially funded by the Spanish MEC under the CRAMNET project (TEC2012-38362-C03-01) and by the General Directorate of Universities and Research of the Regional  ... 
doi:10.1145/2507248.2507252 dblp:conf/pe-wasun/CuevasB13 fatcat:jukvr7iwkjdjhbfoo4lan7lloa

Applications of social network analysis in behavioural information security research: Concepts and empirical analysis

Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno
2017 Computers & security  
& Security (2017), The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby  ...  the employees can build up their security awareness and accountability for their actions via participation in the organisation's social networks.  ...  Applications of SNA in preventing violations and malware outbreak In behavioural security research, good and bad security behaviours are of equal importance.  ... 
doi:10.1016/j.cose.2017.03.010 fatcat:nzv7shoa3bfghclqhfzyxwwcii

Patterns and Interactions in Network Security [article]

Pamela Zave, Jennifer Rexford
2020 arXiv   pre-print
Although cryptographic protocols hide the data contents of packets, they cannot hide packet headers.  ...  This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not.  ...  party we consider good or bad.  ... 
arXiv:1912.13371v2 fatcat:qfhdtj2pi5cmjk67h2gq53vzem

Improving Smartphone Security and Reliability

2017 Journal of Interconnection Networks (JOIN)  
Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious  ...  Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing.  ...  Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA).  ... 
doi:10.1142/s0219265917400023 fatcat:yq7yda6d4ras7a75jr33mzm3la

Distributed Systems Security Knowledge Area [article]

Neeraj Suri
2019 Zenodo  
Consequently, distributed systems security [...]  ...  These include (a) data flows across the collection of authorised inputs (regulated via Access/Admission Control), (b) transportation of the data to/across the distributed resources (Data Transport functionality  ...  The security issues requires dealing with data-at-rest (static storage) and data-in-transit (dynamic R/W ops).  ... 
doi:10.5281/zenodo.3941852 fatcat:ag6uugbkybg65iacezz6yjmemq

Self-aware Services of NGSDP: Using Bayesian Networks for Measuring Quality of Convergent Services

Zhi Luo, Junping Wang, Qiliang Zhu
2011 Journal of Internet Services and Information Security  
The resultant probabilistic assessment can be transported via network protocols in the convergent services and it enables non-hierarchical communications about the quality of service elements.  ...  The quality engine combines domain independent statistical analysis and probabilistic reasoning technology (Bayesian networks) with domain dependent measurement collection and evaluation methods.  ...  The measurement name has the form MMS.MM4readRESsnt. Journal of Internet Services and Information Security, volume: 1, number: 1, pp. 46-58  ... 
doi:10.22667/jisis.2011.05.31.046 dblp:journals/jisis/LuoWZ11 fatcat:nexlofrusra5ffvq4yd25vkciu

User, Usage and Usability: Redefining Human Centric Cyber Security

Marthie Grobler, Raj Gaire, Surya Nepal
2021 Frontiers in Big Data  
In this paper, we survey advancements made in the development and design of the human centric cyber security domain.  ...  The aim of this survey is to provide both users and system designers with insights into the workings and applications of human centric cyber security.  ...  To this end, Giacobe and Xu (2011) proposed a visualization tool for network security using GeoViz. The idea is to divide the whole IT network into zones and visualise the log data based on zones.  ... 
doi:10.3389/fdata.2021.583723 pmid:33748750 pmcid:PMC7968726 fatcat:y4aztmzsfjbzpfpiroomhmuhjm

Qualitative and Quantitative Results of Enterprise Security Visualization Requirements Analysis through Surveying

Ferda Sönmez, Banu Günel
2019 Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications  
In order to find gaps or missing points in any domain, examination of the literature work is necessary and provides a good amount of information.  ...  In this work, a security visualization requirement analysis survey with 30 information security experts is done. The paper presents the qualitative and quantitative results of this survey.  ...  as the network traffic data.  ... 
doi:10.5220/0007255401750182 dblp:conf/grapp/SonmezG19 fatcat:d4fps3eghnfxrke7k3d2qc4e24

SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things

Tidiane Sylla, Mohamed Aymen Chalouf, Francine Krief, Karim Samaké
2021 Security and Communication Networks  
It secures context information exchange by using a lightweight hybrid encryption system adapted to IoT devices and manages trust through artificial intelligence techniques such as Bayesian networks and  ...  Research studies on context-aware security and privacy focus on security and privacy mechanisms' implementation but do not consider the secure and trustworthy context management.  ...  Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2021/6632747 doaj:a40f52a87a864ecf8981de6a4cf7c65f fatcat:y63ffv44qzccdgrpwihup3ijka
« Previous Showing results 1 — 15 out of 9,947 results