Filters








98 Hits in 5.8 sec

Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions

Abdelzahir Abdelmaboud, Abdelmuttlib Ibrahim Abdalla Ahmed, Mohammed Abaker, Taiseer Abdalla Elfadil Eisa, Hashim Albasheer, Sara Abdelwahab Ghorashi, Faten Khalid Karim
2022 Electronics  
Scalability, interoperability, security, and privacy, as well as trustworthiness, are all issues that IoT applications face.  ...  Furthermore, we discuss how blockchain technology can be used to broaden the spectrum of IoT applications. Besides, we discuss the recent advances and solutions offered for IoT environments.  ...  Acknowledgments: The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Review Article, under grant number (R.A./37/43).  ... 
doi:10.3390/electronics11040630 fatcat:njmtuuai6fd6zkp7xfp2743sfe

Trends and Directions in Cloud Service Selection

Mona Eisa, Muhammad Younas, Kashinath Basu, Hong Zhu
2016 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)  
The paper also envisions various directions for future research.  ...  Thus selecting the best cloud services becomes a challenging task for prospective cloud users.  ...  For example, an organization can use hybrid cloud model where it utilizes public cloud for less-critical applications and private cloud for mission critical applications [13] .  ... 
doi:10.1109/sose.2016.59 dblp:conf/sose/EisaYBZ16 fatcat:44w3xnncqvdmjfluedhany6ara

Enterprise information security, a review of architectures and frameworks from interoperability perspective

Marzieh Shariati, Faezeh Bahmani, Fereidoon Shams
2011 Procedia Computer Science  
security solutions is put together.  ...  The Enterprise Information Security Architecture (EISA) offers a framework upon which business security requirements, the risks and the threats are analyzed and a portfolio of the best integrated enterprise  ...  Acknowledgements Authors would like to acknowledge the support provided by Education and Research Institure for ICT(ERICT), Iran.  ... 
doi:10.1016/j.procs.2010.12.089 fatcat:b7lnxfefsraljhy4c5kjjasvby

Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis

Farzaneh Sadat Jalayer, Akbar Nabiollahi
2016 International Journal of Computer Science & Information Technology (IJCSIT)  
Some of the upcoming challenges can be the study of available frameworks in Enterprise Information Security Architecture (EISA) as well as criteria extraction in this field.  ...  It could be concluded that the database and database security criteria, inner software security, electronic exchange security and supervising malicious software can be high priorities. KEYWORDS  ...  ENTERPRISE INFORMATION SECURITY ARCHITECTURE (EISA) Enterprise Information Security Architecture is the practice of applying a comprehensive and careful method for describing a current and/or future structure  ... 
doi:10.5121/ijcsit.2016.8504 fatcat:cqmv7nijnbdqlaew2cepegimhi

Contribution to Enterprise Intelligent Systems Architecture: Assumptions, Expectations and a Proposal

Abdessamad Mouzoune
2012 Intelligent Information Management  
In the present paper we propose three base assumptions for an enterprise intelligent system architecture as related to 1) Cognitive Enterprise, 2) Embodied Cognition and 3) Agent Paradigm.  ...  In addition, we suggest possible expectations from Enterprise Intelligent Systems Architecture and propose an architectural frame based on the cognitive architecture CogAff.  ...  However, being enterprise-wide packages application software is not sufficient for systems to be considered enterprise systems.  ... 
doi:10.4236/iim.2012.46035 fatcat:yndje4lnpfcx3cyv2rqniwwlum

Applying Machine Learning Techniques for Caching in Edge Networks: A Comprehensive Survey [article]

Junaid Shuja, Kashif Bilal, Waleed Alasmary, Hassan Sinky, Eisa Alanazi
2020 arXiv   pre-print
These applications of machine learning can help identify relevant content for an edge network.  ...  This article investigates the application of machine learning techniques for in-network caching in edge networks.  ...  Blockchain-based privacy and security solutions have been proposed for edge networks [169, 170] .  ... 
arXiv:2006.16864v4 fatcat:fwayzkv5vrghzayqxq5sgfyh2u

Account + GST Inventory Management ERP System (Using Cloud Storage)

Harshvardhan R Patil, Sourabh R Kotgire, Nikhil S Madhekar, Priyanka N Shelke, Mrs. Ishwari Raskar
2022 International Journal for Research in Applied Science and Engineering Technology  
Therefore, there is a need for an effective approach for designing a useful approach towards an ERP for the purpose of managing a small to medium organizations.  ...  Abstract: An ERP system or Enterprise Resource Planning System has been one of the most effective and useful implementations that have been highly effective and useful.  ...  A data management solution is a considerable software application that is employed to administer and supervise databases. It may generate, operate, and update databases.  ... 
doi:10.22214/ijraset.2022.41898 fatcat:oo4a6mozdbh3thow2jztzchope

Personal control of privacy and data: Estonian experience

Jaan Priisalu, Rain Ottis
2017 Health and Technology  
The national communications and transactions platform allows for twenty-first century governance by allowing for transparency, e-safety (inter alia privacy), e-security, entrepreneurship and, among other  ...  Estonian experience shows that an open and transparent attitude provides a good foundation for trust between the Citizen and the State, and gives more control to the real owner of the data -the Citizen  ...  The designed system was named BX-Road,^and it defined the baseline security standard for all data transport within the Estonian government information enterprise, enabling a more efficient and secure way  ... 
doi:10.1007/s12553-017-0195-1 pmid:29308346 pmcid:PMC5741780 fatcat:7ufxcm4o2vhbrkdjtr6d6wjpg4

Cyber security assessment of a power plant

Igor Nai Fovino, Luca Guidi, Marcelo Masera, Alberto Stefanini
2011 Electric power systems research  
The IRRIIS project is an IST FP6 IP, funded by the European Commission under contract no 027568 >For ECN registration send any email to: subscribe@ciip-newsletter.org >Article can be submitted to be published  ...  to: submit@ciip-newsletter.org >Questions about articles to the editors can be sent to: editor@ciip-newsletter.org >General comments are directed to: info@ciip-newsletter.org >Download site for specific  ...  application security right from the start.  ... 
doi:10.1016/j.epsr.2010.10.012 fatcat:lydqvovrp5hz3mjp3ekos5i72q

QoS Based Service Selection and Provisioning in Cloud Computing

Mona Medhat Eisa
2019
Gartner Peer Insights is a platform provided by Gartner that offers authentic reviews and ratings for enterprise IT solutions and cloud services.  ...  For example, an organization can use hybrid cloud model where it utilizes public cloud for less critical applications and the private cloud for the critical and sensitive applications.  ...  The QoS attributes chosen for this evaluation test include security, usability and performance. The scenario assumes both Beginner and Intermediate/Expert level consumer.  ... 
doi:10.24384/3q9t-5k95 fatcat:miurxx6sujh4bmyigwtcqslfaq

Towards interoperable e-Health system in Tanzania: analysis and evaluation of the current security trends and big data sharing dynamics

Marseline Michael Mtey, Mussa Ally Dida
2019 International Journal of Advanced Technology and Engineering Exploration  
With the adoption of HL7 and DICOM message standards, EISA also uses the government X-Road middleware software for security during data transport and sharing processes.  ...  It consists of an Individual Healthcare Identifier (IHI) issued to users for secure controlling of information [61] .  ... 
doi:10.19101/ijatee.2019.650057 fatcat:6gse53aopvhkdl5qastlmsqyom

An Automated Signature Generation Method for Zero-day Polymorphic Worms Based on C4.5 Algorithm

Mohssen Mohammed, Eisa Aleisa, Neco Ventura
unpublished
In this paper, we propose an accurate signature generation system for zero-day polymorphic worms.  ...  Polymorphic worms are considered as the most critical threats to the Internet security, and the difficulty lies in changing their payloads in every infection attempt to avoid the security systems.  ...  This makes it difficult for them to find solutions to certain problems.  ... 
fatcat:utc742luv5bl7afffddyn2lrsy

Targeting Cyber Threats by Recognizing Active and Passive Malicious Attack Techniques and Protecting Information

Vanja Korać, Dragan Prlja
2018 Arheologija i prirodne nauke  
Digital wellbeing is the most important thing in an organisation.  ...  For this reason, organisations are investing heavily in the protection of their systems. 1 Nowadays, it can be said that it has become a real security challenge to protect sensitive information from the  ...  Enterprise Information Security Architecture (EISA) is a standard that can help to determine the measures that have to be undertaken in order to provide security at the highest possible level.  ... 
doi:10.18485/arhe_apn.2018.14.9 fatcat:wtvk3m3m5vd5hez4eub7samf2i

Protecting Critical Infrastructure in the EU

Centre for European Policy Studies
2010 Social Science Research Network  
These standards are used in many CIIs for security metrics taxonomy. 65 They are focused on management of IT security and general IT technologies, and can provide sufficient solutions for the 'Enterprise  ...  In addition, ENISA was empowered with the task of identifying possible sources of security information that could potentially contribute to an EISAS.  ...  CSIRT (Computer Security and Incident Response Team). Another term for CERT. Culture of security.  ... 
doi:10.2139/ssrn.1756710 fatcat:xkc3vththvctdgdhnmhkkav6i4

Evolution of continuing education programmes in Europe

Alex Mersel, Paulo Melo, Vjeko Jerolimov
2013 International Dental Journal  
ENISA) is a centre of network and information security expertise for the EU, its Member States, the private sector, and Europe's citizens.  ...  This document continues work from previous activities by suggesting training materials, scenarios and a way forward for implementing the EC roadmap for NIS education in Europe ( 1 ).  ...  .  Development of an EU information assurance training/education solution for the working realities of SMEs.  ... 
doi:10.1111/idj.12010 pmid:23410023 fatcat:ycckh24vinhabgqsnfll43rsjm
« Previous Showing results 1 — 15 out of 98 results