Filters








15,725 Hits in 7.0 sec

Mediated overlay services (MOSES): Network security as a composable service

Stelios Sidiroglou, Angelos Stavrou, Angelos D. Keromytis
2007 2007 IEEE Sarnoff Symposium  
MOSES is roughly modeled on the web services framework. In addition to ease-ofdeployment, MOSES allows for economies of scale and a reduction to the total cost of ownership.  ...  However, the current paradigm of outsourced managed security service providers (MSSPs) is often difficult to transition to, offers little control to the organization, does not allow "best of breed" composition  ...  MOSES is roughly modeled on the web services framework.  ... 
doi:10.1109/sarnof.2007.4567338 fatcat:ahbxgobpizedbplefcgyy262ta

Services organisation in IoT: mixing Orchestration and Choreography

Sylvain Cherrier, Rami Langar
2018 2018 Global Information Infrastructure and Networking Symposium (GIIS)  
But it lacks a commonly adopted architecture, able to deal with its important heterogeneity and its constraints. The major trend in IoT Applications conception is based on a centralized architecture.  ...  However, a distributed approach can be imagined. The distributed architecture, called Choreography, can offer some solutions for interoperability and security, which are important issues of the IoT.  ...  In IoT SOA approach, the distributed architecture is a Choreography. A. Distributing the control The Automated WSAN is based on a distributed architecture.  ... 
doi:10.1109/giis.2018.8635748 dblp:conf/giis/CherrierL18 fatcat:c6vtovfukre4poxzsmkqszgeqe

VANETs and Internet of Things (IoT): A Discussion

Shahirah Mohamed Hatim, Shamsul Jamel Elias, Norkhushaini Awang, Mohd Yusof Darus
2018 Indonesian Journal of Electrical Engineering and Computer Science  
This paper also would like to address the importance of IoT based on VANET in traffic control management system to cope up with the new wireless technology era.  ...  Section I of this paper provides a brief explanation on VANETs and IoT, section II discusses the main challenges suffered by VANETs and IoT, section III covers on the existing applications of VANETs and  ...  A Congestion Control System Based on VANET for Small Length Road Using the structure of BUS-VANET.  ... 
doi:10.11591/ijeecs.v12.i1.pp218-224 fatcat:qmv43rqbibcgzlk23ulxn22fju

STUDY ON SECURITY AND QUALITY OF SERVICE IMPLEMENTATIONS IN P2P OVERLAY NETWORK FOR EFFICIENT CONTENT DISTRIBUTION

K.Ramalakshmi .
2014 International Journal of Research in Engineering and Technology  
Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organization nodes organize itself in a dynamic way.  ...  This enables malicious nodes to launch man-inthe-middle or denial-of-service attacks and many security related attacks.  ...  Enhances the service provisioning and has real-time control over the flow prioritization. 4.  ... 
doi:10.15623/ijret.2014.0304081 fatcat:lhin4gxxvbddhol5ela2s3jluy

Network neutrality: Avoiding the extremes

Galina Schwartz, Nikhil Shetty, Jean Walrand
2008 2008 46th Annual Allerton Conference on Communication, Control, and Computing  
This proposal is based on the fact that current technology permits a reliable estimate of ISPs' installed (and activated) capacity.  ...  The x-network creates better delineated property rights for the ISPs, which improve their incentives to (i) experiment with providing enhanced quality of service, (ii) introduce novel products which require  ...  Our technology-based proposal gives a regulator the means to achieve his objectives by imposing capacity-based constraints on ISPs.  ... 
doi:10.1109/allerton.2008.4797680 fatcat:u2y7hwzxefe33kzrajogqs7rfa

Overlay AuthoCast: Distributed Sender Authentication in Overlay Multicast

Matthias Wahlisch, Thomas C. Schmidt, Gabriel Hege
2009 IEEE INFOCOM Workshops 2009  
Multicast services raise significant operational and security challenges not only when deployed on the Internet layer, but also in overlay networks.  ...  Large P2P groups as emerging from IPTV applications may be abused by unwanted traffic or denial of service attacks through amplified flooding.  ...  Nevertheless, efficient group services via multicast on the Internet layer are not globally provided, but remain restricted to walled domains.  ... 
doi:10.1109/infcomw.2009.5072175 fatcat:7gykvauwmrbcnaqs3e7bld7e3u

An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol

Veena R.S., Ramachandra V., Indiramma M.
2015 International Journal of Computer Applications  
This paper mainly focus on understanding the changing trends of usage of cloud computing platform for various services, fundamental research approaches towards cloud security and finally need of requirements  ...  The level based services makes the higher possibilities of availability, scalability, collaborative in most cost effective way.  ...  Out of this, there are 147 Journals based on security issues of Internet-of-Things.  ... 
doi:10.5120/ijca2015907114 fatcat:z7bxshcyhbg5zkt7vb5ur7qkla

PacketCloud

Yang Chen, Bingyang Liu, Yu Chen, Ang Li, Xiaowei Yang, Jun Bi
2013 Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture - MobiArch '13  
We have implemented a proof-of-concept prototype of PacketCloud based on the MobilityFirst architecture.  ...  This paper proposes PacketCloud, a cloudlet-based open platform to host elastic in-network services.  ...  In general, these services can either enhance the user experience while surfing the Internet, or optimize the traffic in the network.  ... 
doi:10.1145/2505906.2505910 dblp:conf/mobiarch/ChenLCLYB13 fatcat:pg5xdkvrwna5tpmprf7nnvre5i

Framework for Access Policy for Boosting Secure Communication at SDN in FIA

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Hence, in this aspect, the software-defined network could offer a significant security solution on the top of future internet architecture.  ...  Cross-Scripting Attack is one such rising security concern for future internet architecture that is found very less investigated in existing times.  ...  work carried out by Alshra et al.[21]introduced, security approach based on the implementation of the isolated hardware device with the SDN system to prevent controller component from a packet injection  ... 
doi:10.35940/ijitee.d1529.029420 fatcat:x3aerm6phbaq7o2f5ke7zikvl4

Security-as-a-Service from Clouds: A Comprehensive Analysis

Deepak H.Sharma, C A Dhote, Manish M. Potey
2013 International Journal of Computer Applications  
The securityas-a-service model can also enhance functionality of existing on-premise implementations by working as a hybrid solution.  ...  In Security-as-a-service model the focus is on security provided as cloud services; i.e. security delivered through the cloud instead of on-premise security solutions.  ...  Functionality of existing on-premise implementations are being enhanced by using security-as-a-service as a hybrid solution.  ... 
doi:10.5120/11374-6642 fatcat:blfmq5bhmbfhfgwfjpyhhu54hq

Multidomain SDN-Based Gateways and Border Gateway Protocol

Hamad Saud Alotaibi, Mark A. Gregory, Shuo Li, Ihsan Ali
2022 Journal of Computer Networks and Communications  
In this review, an investigation is provided on using the SDN paradigm to enhance multidomain traffic management and control and to optimize BGP operation.  ...  The flexibility afforded by the Internet architecture ensures that timely changes to the network topology can occur without centralized control.  ...  Acknowledgments is study was supported by the Interior Ministry of Saudi Arabia and the Saudi Arabia Cultural Mission. e authors would like to thank Mr. Hoang Do and Dr. Franciscus X.A.  ... 
doi:10.1155/2022/3955800 fatcat:c2vbh54f65b27hhnf7fflvyjeq

An Architecture for Hierarchical Software-Defined Vehicular Networks

Sergio Correia, Azzedine Boukerche, Rodolfo I. Meneguette
2017 IEEE Communications Magazine  
As one of the significant parts for Internet of Everything (IoE), vehicular networks provide network services for things in intelligent transport systems.  ...  In vehicular networks, vehicle can communicate with vehicles, pedestrians and infrastructures (Internet) by exploiting vehicle to everything (V2X) technologies.  ...  Acknowledgements This work was supported by NSFC under Grant No. 61971028.  ... 
doi:10.1109/mcom.2017.1601105 fatcat:aqxe2dv64fftxlbpr32gduomv4

Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure [chapter]

Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Hiren Patel
2012 IFIP Advances in Information and Communication Technology  
Though, the proposed scheme is implemented with a Eucalyptus framework, it may work well for other Cloud platforms. It can serve as model to study the behavior of NIDS for distributed environment.  ...  Noah Guilbault and Ratan Guha [6] shows a way for designing and implementing distributed grid based IDS using virtual servers deployed on Amazon's Elastic Compute Cloud service. Aman Bakshi et al.  ...  By using this, a user can open or close ports to control the inbound or outbound network traffic over it.  ... 
doi:10.1007/978-3-642-29852-3_6 fatcat:ptudrjrmhrex7pmhoc6c4kbkf4

Future vision of globally harmonized national airspace system with concepts of operations beyond year 2020

Mohleji, Ostwald
2003 22nd Digital Avionics Systems Conference Proceedings (Cat No 03CH37449) DASC-03  
flight planning independent of look ahead times; 4) flexible sector boundaries based on equitable workload; and 5) a universal information service assuring uniformity and security of real time information  ...  This paper presents a vision of future NAS and operational concepts for year 2020 and beyond based on a number of new paradigms that will provide globally harmonized service to conventional aircraft, uninhabited  ...  Workload Flexible sector boundaries will be established based on a uniform number of flights simultaneously handled by each controller to equitably distribute workload among most controllers.  ... 
doi:10.1109/dasc.2003.1245832 fatcat:vk6gv5jwpncsrdou4cngjqawfq

Global Service Provider Strategies and Networking Alternatives

Ron Landi, Mahesh Raisinghani
2004 Information Resources Management Journal  
It discusses strategic planning for the provision of new data and Internet services, and assesses alternative network designs and technologies to provide optimized solutions and service delivery.  ...  MDU) markets; identification of the market and cost synergies for combining voice and IP services on common carrier facilities; and comparison of leasing versus building alternatives for metropolitan transport  ...  There are market place factors such as Internet growth, new IP services, voice and data convergence, non-traditional competitors, and global expansion.  ... 
doi:10.4018/irmj.2004010102 fatcat:u22hjtfhxnf5lngmijsul6zrze
« Previous Showing results 1 — 15 out of 15,725 results