A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
High-Level Architecture for a Single Location Surveillance Point
2007
2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)
The Single Location Surveillance Point (SLSP) is a distributed multi-sensor surveillance software system. ...
The session server routes the crude sensor information to the logical decision making service. ...
Reviewing these image processing tasks, it has discriminated research areas that need to be scrutinized further, such as adaptation, data fusion, and tracking methods in a co-operative multi-sensor environment ...
doi:10.1109/icwmc.2007.46
fatcat:dx2a4easyzcttbxa3uoh7vojkq
Cost based Selection of Cloud Providers using Broker in Multi Cloud Environment
2017
International Journal for Research in Applied Science and Engineering Technology
Here we are generating a link between user and provider for making the services secure till the session expires. ...
In cloud computing resources are provided to customers based on their priorities and their requests, but sometimes non-cloud provider organizations also want to share their unused resources through cloud ...
PROPOSED WORK In Cloud Computing environment the main feature is security [5] that must be available in all the scenarios whether it is cloud monitoring, cloud governance, cloud distribution or cloud ...
doi:10.22214/ijraset.2017.4199
fatcat:2zkfnhgwsvgodb4gv6t4p5gvpa
Design and development of context- Aware and context- Adaptable system with session handling mechanism for ubiquitous computing
2021
Malaya Journal of Matematik
These mechanisms will play a significant role to offer valuable services to the end users, it will also provides ample of challenges and opportunities for the application developers to increase the system ...
An extension based on Ubiquitous computing in smart environment and future of this smart environment is to be enhanced by two mechanisms namely Context-awareness and Context-adaptability. ...
In this type of environment, an important task is the recognition process of a resident's activity in the environment to anticipate the needs of occupants and to adapt to such a intelligent environment ...
doi:10.26637/mjm0901/0013
fatcat:iu5mttmsujcvbfhj22pd6ggly4
Multi-domain Security Authentication Protocol for Hybrid Cloud
2015
International Journal of Security and Its Applications
This paper provides a security authentication protocol among multiple domains. ...
The paper proposed a multi-domain authentication protocol in hybrid cloud network environment, which ensure the security mutual authentication among entities that from different cloud networks or different ...
While there are multiple service providers in a hybrid cloud, it is much more difficult to assure its security for key distribution and mutual authentication. ...
doi:10.14257/ijsia.2015.9.8.29
fatcat:jxdskvywyfd2hd27z4ufbuwkgi
An End-to-End Security Auditing Approach for Service Oriented Architectures
2012
2012 IEEE 31st Symposium on Reliable Distributed Systems
In this paper, we provide an efficient solution for end-to-end security auditing in SOA. ...
Although the establishment of trust across all involved partners is required as a prerequisite to ensure secure interactions, still a new end-to-end security auditing mechanism is needed to verify the ...
ACKNOWLEDGMENT We would like to thank Bala Gnanasekaran, Guneshi Wickramaarachchi, Ranjitkumar Sivakumar, Bill Pfeifer and Nwokedi Idika for their contributions to this project. ...
doi:10.1109/srds.2012.5
dblp:conf/srds/AzarmiBARASLO12
fatcat:cj4bgwkrqfdnrawmaxgsmx46ua
A Flexible and Reliable Architecture for Mobile Agent Security
2009
Journal of Computer Science
Interaction with security agent is multi-mode providing hassle-free access to the user. ...
Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and ...
It is obvious that security issues have to be taken care of in the gateway to ensure a secure transmission in the end-to-end system, as shown in Fig. 1 . ...
doi:10.3844/jcssp.2009.270.274
fatcat:4aozu4jp65eg5efugjntcqwp4a
An Improved Outlier Detection Mechanism for Hierarchical Key Management in Hierarchical Mobile Ad-hoc Networks (MANETs)
2019
International journal of recent technology and engineering
The proposed method requires four sequential analysis of outlier detection schemes at different layers of MANET protocol stack because single scheme per layer is not efficient in identifying outliers in ...
The proposed key management method is useful for MANETs in group authentication and implementation of lightweight cryptographic primitives with secure key. ...
Key management process using cryptography primitives helps in providing security to gathering information, secure key distribution and re-generation. ...
doi:10.35940/ijrte.c4187.098319
fatcat:q35t3wsjf5bsxizp3jwdna2u2m
Next generation session management for 3D teleimmersive interactive environments
2010
Multimedia tools and applications
However, when we investigate the emerging teleimmersive environments closer, we realize that their overall session management, including end-to-end session setup, establishment and run-time management ...
In the recent past we have seen a boom of distributed interactive multimedia environments which use multiple correlated media sensors, multi-view displays, and advanced haptic-audio-visual user interfaces ...
In the teleimmersion system developed at UNC Chapel Hill, a coordination protocol is proposed to monitor multi-stream traffic between two ends [20] . ...
doi:10.1007/s11042-010-0629-5
fatcat:r26eu2zj7zblfhmpr3apsygkmi
Object-Oriented Internet Reactive Interoperability
[chapter]
2020
Lecture Notes in Computer Science
This article addresses research results on the systematic approach to the design of the meaningful Machine to Machine (M2M) communication targeting distributed mobile applications in the context of new ...
Information and Communication Technology has provided society with a vast variety of distributed applications. ...
Again, this procedure must be precisely described by an interoperability standard in the multi-vendor environment. ...
doi:10.1007/978-3-030-50426-7_31
fatcat:u4nvnapqrvdh7i7n4ewbhhfg4y
Integral Federated Identity Management for Cloud Computing
2012
2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
On this paper we describe a new architecture offering integral federated identity management, to support multi-domain clients in a multi-provider environment. ...
, and enables the implementation of multi-provider environments through account data replication. ...
It also enabled the data replication to other IaaS providers with native protocols. ...
doi:10.1109/ntms.2012.6208751
dblp:conf/ntms/StihlerSMF12
fatcat:ahhvqpfgdvawzfukxzpgo5witq
Summary of the first network-centric sensing community workshop, 'netted sensors: a government, industry, and academia dialogue'
2006
Defense Transformation and Network-Centric Systems
), Department of Homeland Security (DHS), and Environmental sensing problems. ...
The MITRE Corporation recently hosted the first Netted Sensors Community Workshop in McLean, Virginia, on 24 October -26 October 2005. ...
In addition, they would like to thank all of the speakers, participants, and members of the MITRE staff who helped to make this workshop a successful event. ...
doi:10.1117/12.670550
fatcat:vydxtxq2fbddhcre6f5jmaqyey
A Survey on User Authentication Techniques and Attack Taxonomy in Cloud Computing
2017
International Journal of Advanced Research in Computer Science and Software Engineering
In recent years, a lot of research on cloud security has been carried out and many more techniques and methods are proposed to overcome cloud security issues. ...
One such security measure we are focusing here is user authentication. This paper identifies different authentication attacks and techniques approached to improve authentication in Cloud. ...
WS-Security permits web browsers to use XML encryption to provide end-to-end encryption in SOAP messages which prevents sniffing of messages. ...
doi:10.23956/ijarcsse/v7i2/0122
fatcat:wmczq24evnaaroc63xk4n3pnbu
LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network
2019
International Journal of Advanced Computer Science and Applications
The work focuses on secured data aggregation in wireless sensor network with the help of symmetric and session key generation technique. ...
The performance of LSSCW is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. ...
The schemes presented in [16] , [17] , [41] , [42] do not use session key thereby providing a less secure environment compared to LSSCW for data communication in WSN.
VIII. ...
doi:10.14569/ijacsa.2019.0101062
fatcat:4uedwi3t6nbufmcc2z4dfdj7eu
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity
[chapter]
2020
Lecture Notes in Computer Science
As part of Internet of Things (IoT), RFID technology ensures an efficient, secure and reliable system to identify tagged objects in supply chain environment such as manufacturing, automotive and healthcare ...
In contrast to typical RFID authentication system, we consider the channel between the reader and back-end server insecure. ...
It provides secure multi-party− tag, reader, and server communication. ...
doi:10.1007/978-3-030-61078-4_6
fatcat:u7s5aupi6bagbpvkrgoqd63lri
A Flexible and Reliable Architecture for Mobile Agent Security
2009
Journal of Computer Science
Interaction with security agent is multi-mode providing hassle-free access to the user. ...
Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and ...
It is obvious that security issues have to be taken care of in the gateway to ensure a secure transmission in the end-to-end system, as shown in Fig. 1 . ...
doi:10.3844/jcs.2009.270.274
fatcat:rvpwd7zbnjfencdbj7ydpvea2a
« Previous
Showing results 1 — 15 out of 32,029 results