32,029 Hits in 5.5 sec

High-Level Architecture for a Single Location Surveillance Point

Tomi Raty
2007 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07)  
The Single Location Surveillance Point (SLSP) is a distributed multi-sensor surveillance software system.  ...  The session server routes the crude sensor information to the logical decision making service.  ...  Reviewing these image processing tasks, it has discriminated research areas that need to be scrutinized further, such as adaptation, data fusion, and tracking methods in a co-operative multi-sensor environment  ... 
doi:10.1109/icwmc.2007.46 fatcat:dx2a4easyzcttbxa3uoh7vojkq

Cost based Selection of Cloud Providers using Broker in Multi Cloud Environment

P. Padma Sri
2017 International Journal for Research in Applied Science and Engineering Technology  
Here we are generating a link between user and provider for making the services secure till the session expires.  ...  In cloud computing resources are provided to customers based on their priorities and their requests, but sometimes non-cloud provider organizations also want to share their unused resources through cloud  ...  PROPOSED WORK In Cloud Computing environment the main feature is security [5] that must be available in all the scenarios whether it is cloud monitoring, cloud governance, cloud distribution or cloud  ... 
doi:10.22214/ijraset.2017.4199 fatcat:2zkfnhgwsvgodb4gv6t4p5gvpa

Design and development of context- Aware and context- Adaptable system with session handling mechanism for ubiquitous computing

S. Sahana, A.B. Karthick Anand Babu, G. Kumaravelan
2021 Malaya Journal of Matematik  
These mechanisms will play a significant role to offer valuable services to the end users, it will also provides ample of challenges and opportunities for the application developers to increase the system  ...  An extension based on Ubiquitous computing in smart environment and future of this smart environment is to be enhanced by two mechanisms namely Context-awareness and Context-adaptability.  ...  In this type of environment, an important task is the recognition process of a resident's activity in the environment to anticipate the needs of occupants and to adapt to such a intelligent environment  ... 
doi:10.26637/mjm0901/0013 fatcat:iu5mttmsujcvbfhj22pd6ggly4

Multi-domain Security Authentication Protocol for Hybrid Cloud

Qikun Zhang, Lei Zhang, Yong Gan, Zhaolei Duan, Jun Zheng
2015 International Journal of Security and Its Applications  
This paper provides a security authentication protocol among multiple domains.  ...  The paper proposed a multi-domain authentication protocol in hybrid cloud network environment, which ensure the security mutual authentication among entities that from different cloud networks or different  ...  While there are multiple service providers in a hybrid cloud, it is much more difficult to assure its security for key distribution and mutual authentication.  ... 
doi:10.14257/ijsia.2015.9.8.29 fatcat:jxdskvywyfd2hd27z4ufbuwkgi

An End-to-End Security Auditing Approach for Service Oriented Architectures

Mehdi Azarmi, Bharat Bhargava, Pelin Angin, Rohit Ranchal, Norman Ahmed, Asher Sinclair, Mark Linderman, Lotfi Ben Othmane
2012 2012 IEEE 31st Symposium on Reliable Distributed Systems  
In this paper, we provide an efficient solution for end-to-end security auditing in SOA.  ...  Although the establishment of trust across all involved partners is required as a prerequisite to ensure secure interactions, still a new end-to-end security auditing mechanism is needed to verify the  ...  ACKNOWLEDGMENT We would like to thank Bala Gnanasekaran, Guneshi Wickramaarachchi, Ranjitkumar Sivakumar, Bill Pfeifer and Nwokedi Idika for their contributions to this project.  ... 
doi:10.1109/srds.2012.5 dblp:conf/srds/AzarmiBARASLO12 fatcat:cj4bgwkrqfdnrawmaxgsmx46ua

A Flexible and Reliable Architecture for Mobile Agent Security

2009 Journal of Computer Science  
Interaction with security agent is multi-mode providing hassle-free access to the user.  ...  Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and  ...  It is obvious that security issues have to be taken care of in the gateway to ensure a secure transmission in the end-to-end system, as shown in Fig. 1 .  ... 
doi:10.3844/jcssp.2009.270.274 fatcat:4aozu4jp65eg5efugjntcqwp4a

An Improved Outlier Detection Mechanism for Hierarchical Key Management in Hierarchical Mobile Ad-hoc Networks (MANETs)

2019 International journal of recent technology and engineering  
The proposed method requires four sequential analysis of outlier detection schemes at different layers of MANET protocol stack because single scheme per layer is not efficient in identifying outliers in  ...  The proposed key management method is useful for MANETs in group authentication and implementation of lightweight cryptographic primitives with secure key.  ...  Key management process using cryptography primitives helps in providing security to gathering information, secure key distribution and re-generation.  ... 
doi:10.35940/ijrte.c4187.098319 fatcat:q35t3wsjf5bsxizp3jwdna2u2m

Next generation session management for 3D teleimmersive interactive environments

Klara Nahrstedt, Zhenyu Yang, Wanmin Wu, Ahsan Arefin, Raoul Rivas
2010 Multimedia tools and applications  
However, when we investigate the emerging teleimmersive environments closer, we realize that their overall session management, including end-to-end session setup, establishment and run-time management  ...  In the recent past we have seen a boom of distributed interactive multimedia environments which use multiple correlated media sensors, multi-view displays, and advanced haptic-audio-visual user interfaces  ...  In the teleimmersion system developed at UNC Chapel Hill, a coordination protocol is proposed to monitor multi-stream traffic between two ends [20] .  ... 
doi:10.1007/s11042-010-0629-5 fatcat:r26eu2zj7zblfhmpr3apsygkmi

Object-Oriented Internet Reactive Interoperability [chapter]

Mariusz Postół
2020 Lecture Notes in Computer Science  
This article addresses research results on the systematic approach to the design of the meaningful Machine to Machine (M2M) communication targeting distributed mobile applications in the context of new  ...  Information and Communication Technology has provided society with a vast variety of distributed applications.  ...  Again, this procedure must be precisely described by an interoperability standard in the multi-vendor environment.  ... 
doi:10.1007/978-3-030-50426-7_31 fatcat:u4nvnapqrvdh7i7n4ewbhhfg4y

Integral Federated Identity Management for Cloud Computing

Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr., Joni da Silva Fraga
2012 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)  
On this paper we describe a new architecture offering integral federated identity management, to support multi-domain clients in a multi-provider environment.  ...  , and enables the implementation of multi-provider environments through account data replication.  ...  It also enabled the data replication to other IaaS providers with native protocols.  ... 
doi:10.1109/ntms.2012.6208751 dblp:conf/ntms/StihlerSMF12 fatcat:ahhvqpfgdvawzfukxzpgo5witq

Summary of the first network-centric sensing community workshop, 'netted sensors: a government, industry, and academia dialogue'

Laurens D. Tromp, Garry M. Jacyna, David P. Allen, Raja Suresh
2006 Defense Transformation and Network-Centric Systems  
), Department of Homeland Security (DHS), and Environmental sensing problems.  ...  The MITRE Corporation recently hosted the first Netted Sensors Community Workshop in McLean, Virginia, on 24 October -26 October 2005.  ...  In addition, they would like to thank all of the speakers, participants, and members of the MITRE staff who helped to make this workshop a successful event.  ... 
doi:10.1117/12.670550 fatcat:vydxtxq2fbddhcre6f5jmaqyey

A Survey on User Authentication Techniques and Attack Taxonomy in Cloud Computing

Madhuri Dhange, Rajani Sajjan, Vijay Ghorpade
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In recent years, a lot of research on cloud security has been carried out and many more techniques and methods are proposed to overcome cloud security issues.  ...  One such security measure we are focusing here is user authentication. This paper identifies different authentication attacks and techniques approached to improve authentication in Cloud.  ...  WS-Security permits web browsers to use XML encryption to provide end-to-end encryption in SOAP messages which prevents sniffing of messages.  ... 
doi:10.23956/ijarcsse/v7i2/0122 fatcat:wmczq24evnaaroc63xk4n3pnbu

LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network

Ganesh R Pathak, M.S.Godwin Premi, Suhas H.
2019 International Journal of Advanced Computer Science and Applications  
The work focuses on secured data aggregation in wireless sensor network with the help of symmetric and session key generation technique.  ...  The performance of LSSCW is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.  ...  The schemes presented in [16] , [17] , [41] , [42] do not use session key thereby providing a less secure environment compared to LSSCW for data communication in WSN. VIII.  ... 
doi:10.14569/ijacsa.2019.0101062 fatcat:4uedwi3t6nbufmcc2z4dfdj7eu

Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity [chapter]

Hector B. Hougaard, Atsuko Miyaji
2020 Lecture Notes in Computer Science  
As part of Internet of Things (IoT), RFID technology ensures an efficient, secure and reliable system to identify tagged objects in supply chain environment such as manufacturing, automotive and healthcare  ...  In contrast to typical RFID authentication system, we consider the channel between the reader and back-end server insecure.  ...  It provides secure multi-party− tag, reader, and server communication.  ... 
doi:10.1007/978-3-030-61078-4_6 fatcat:u7s5aupi6bagbpvkrgoqd63lri

A Flexible and Reliable Architecture for Mobile Agent Security

Ghossoon M.W. Al-Saadoon
2009 Journal of Computer Science  
Interaction with security agent is multi-mode providing hassle-free access to the user.  ...  Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and  ...  It is obvious that security issues have to be taken care of in the gateway to ensure a secure transmission in the end-to-end system, as shown in Fig. 1 .  ... 
doi:10.3844/jcs.2009.270.274 fatcat:rvpwd7zbnjfencdbj7ydpvea2a
« Previous Showing results 1 — 15 out of 32,029 results