Filters








214,709 Hits in 4.4 sec

Efficiency of the GSI Secured Network Transmission [chapter]

Bartosz Baliś, Marian Bubak, Wojciech Rza̧sa, Tomasz Szepieniec
2004 Lecture Notes in Computer Science  
Network protocols used in the Internet and local networks were not designed to meet high security demands of current applications.  ...  Though cryptography algorithms enabled security of data transfer over insecure network protocols, they introduce additional overhead.  ...  Application of security aspects to network communication results in noticeable overhead.  ... 
doi:10.1007/978-3-540-24685-5_14 fatcat:skvmw6q3njgfphsysbqiedn534

ANALYSIS AND STUDY OF SECURITY ASPECT AND APPLICATION RELATED ISSUES AT THE JUNCTION OF MANET AND IOT

Mamata Rath .
2015 International Journal of Research in Engineering and Technology  
In this paper major security aspects are discussed due to handshaking of IoT with MANET and issues related to IoT based applications in MANET are analysed with special focus on need of smart protocols  ...  Internet of things (IoT) and ubiquitous computing, such as MANET becomes increasingly popular in current technology.  ...  a complete study and analysis of security aspects at the cross roads of both MANET and IoT and other application based Issues.  ... 
doi:10.15623/ijret.2015.0425063 fatcat:eyusm547pnap7p7owobxq6vacu

On confidentiality-preserving real-time locking protocols

M. Volp, B. Engel, C. Hamann, H. Hartig
2013 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS)  
Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system.  ...  We introduce a transformation for standard real-time resource locking protocols and show that protocols transformed in this way preserve the confidentiality guarantees of the schedulers on which they are  ...  the QuaOS project and by the State Saxony and the European Union through the ESF young researcher group IMData.  ... 
doi:10.1109/rtas.2013.6531088 dblp:conf/rtas/VolpEHH13 fatcat:2fgnmqxi4fexndpvleicrhki4q

Survey on security issues in file management in cloud computing environment [article]

Udit Gupta
2015 arXiv   pre-print
This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.  ...  But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another.  ...  In this case it is better to use a protocol which has less delay time and consumes less network resources.  ... 
arXiv:1505.00729v2 fatcat:bsagnyjrpncchbg3ky5qfoqy5m

A Secure Task Delegation Model for Workflows

Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy
2008 2008 Second International Conference on Emerging Security Information, Systems and Technologies  
The novel part of this model is separating the various aspects of delegation with regards to users, tasks, events and data, portraying them in terms of a multilayered state machine.  ...  The delegation of a task from one principal to another, however, has to be managed and executed in a secure way, in this context implying the presence of a fixed set of delegation events.  ...  The delegation protocol will support the defined Control Layer with regards to the aspects of users, tasks, events and resources. A.  ... 
doi:10.1109/securware.2008.21 dblp:conf/securware/GaaloulSFC08 fatcat:by6t5z237rg2bfqebnmy5i6aee

An architecture for policy-based security management for distributed multimedia services

Sandrine Duflos, Brigitte Kervella, Eric Horlait
2002 Proceedings of the tenth ACM international conference on Multimedia - MULTIMEDIA '02  
In this paper, I will describe my Ph.D. research work on a multi level architecture to manage security for distributed multimedia services through the use of policies.  ...  We want to adapt the policies and the security parameters to configure other protocols, in order to provide a choice between security protocols in function of the service used, the security required, etc  ...  This architecture highlights the usefulness of policies, for the expression, the set up and the enforcement of the security in a distributed system.  ... 
doi:10.1145/641135.641138 fatcat:7sruallbkfhkzhap43yqcvn53i

An architecture for policy-based security management for distributed multimedia services

Sandrine Duflos, Brigitte Kervella, Eric Horlait
2002 Proceedings of the tenth ACM international conference on Multimedia - MULTIMEDIA '02  
In this paper, I will describe my Ph.D. research work on a multi level architecture to manage security for distributed multimedia services through the use of policies.  ...  We want to adapt the policies and the security parameters to configure other protocols, in order to provide a choice between security protocols in function of the service used, the security required, etc  ...  This architecture highlights the usefulness of policies, for the expression, the set up and the enforcement of the security in a distributed system.  ... 
doi:10.1145/641007.641138 dblp:conf/mm/DuflosKH02 fatcat:m4rw6frimrcbxin4uecf3bl4uy

Reference Monitors for Security and Interoperability in OAuth 2.0 [chapter]

Ronan-Alexandre Cherrueau, Rémi Douence, Jean-Claude Royer, Mario Südholt, Anderson Santana de Oliveira, Yves Roudier, Matteo Dell'Amico
2014 Lecture Notes in Computer Science  
Our main contribution consists in a framework that harnesses a type-based policy language and aspect-based support for protocol adaptation through flexible reference monitors in order to handle security  ...  As we show in this paper, there are indeed multiple reasons that make this protocol hard to implement and impede interoperability in the presence of different kinds of client.  ...  Monitors and Aspects The implementation of both the type system and of policy enforcement at the protocol level can be done with reference monitors [18, 8] .  ... 
doi:10.1007/978-3-642-54568-9_15 fatcat:afbuvylnhnfhfomtjj4ind3btq

Security Aware Routing Protocol for Intelligent Transportation Distributed Multi-Agent System

Ma'en Saleh
2018 International Journal of Computer Applications  
Most recent VANETs routing protocols have neither taken into consideration security aspects nor the available resources at the mobile node.  ...  Compared to the insecure road-side (IRSR) and secure road-side (SRSR) protocols, extensive simulation results show the highest capability of the proposed protocol (SRSR_RE) in maximizing the secure delivery  ...  However, they are inefficient in modelling and analyzing complicated heterogeneous environments such as our highly-dynamic topology real-time VANET network with QoS guarantees and security aspects.  ... 
doi:10.5120/ijca2018916153 fatcat:3zfm6rr2wjaxrjhz2r5stv7pni

"A Novel MQTT Security framework In Generic IoT Model"

Chintan Patel, Nishant Doshi
2020 Procedia Computer Science  
MQTT based device authentication, access control of resources, and security of communicated data over the insecure channel are some of the significant challenges that are discussed in depth.  ...  IoT on industry 4.0, MQTT Protocol, MQTT security aspects, Survey on various protocols used for to make MQTT Communication in a secured manner.  ...  , on-time supply of medication, and on-time availability of the human resource is a significant challenge that needs to tackle.  ... 
doi:10.1016/j.procs.2020.04.150 fatcat:qufz24dlave4rope2qiig7qgum

Study of Denial of Service (DoS) Attack in Wireless Sensor Networks with Power Constraints

K Prashanth, S S Nagamuthu Krishnan
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Power consumption attributes affects the efficiency of nodes during the time of attacks.  ...  This study could contribute to the aspect of extending the activity of the sensor in various applications such as whether monitoring and recording of wildlife movement.  ...  The time taken for computing and complexity of computing is an aspect which is to be considered.  ... 
doi:10.35940/ijitee.d8482.0210421 fatcat:iy7obtcg7feqfg23hsukuetosm

Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network

Alma E. Guerrero-Sanchez, Edgar A. Rivas-Araiza, Jose Luis Gonzalez-Cordoba, Manuel Toledano-Ayala, Andras Takacs
2020 Sensors  
To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system.  ...  The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20102798 pmid:32423025 pmcid:PMC7287648 fatcat:a3g6tpm47bc7jnlravokelklq4

Communication Infrastructure Requirements in a VE [chapter]

A. Luís Osório, Manuel M. Barata, Pierre Gibon
1999 IFIP Advances in Information and Communication Technology  
From those characteristics the most relevant are: • communication availability and quality; • communication resources availability and communication costs; • information security/privacy and integrity;  ...  This chapter intends to clarify some important aspects of the Internet protocol suit arguing in favor of its adoption as PRODNET low level communication stack.  ...  Acknowledgements This work was done in the context of the PRODNET II project, partially funded by the European Commission.  ... 
doi:10.1007/978-0-387-35577-1_5 fatcat:rigdtmjtpfg5pgqmegokapquey

Security Challenges in the IP-based Internet of Things

Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle
2011 Wireless personal communications  
In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things.  ...  We then present challenges and requirements for IP-based security solutions and highlight specific technical limitations of standard IP security protocols.  ...  Security protocols should further take into account the resource-constrained nature of things and heterogeneous communication models.  ... 
doi:10.1007/s11277-011-0385-5 fatcat:qgq2ahp7qbhgnb43mlayxgnjty

Quantum Key Distribution Secured Optical Networks: A Survey

Purva Sharma, Anuj Agrawal, Vimal Bhatia, Shashi Prakash, Amit Kumar Mishra
2021 IEEE Open Journal of the Communications Society  
We elucidate the methods and protocols used in QKD secured optical networks, and describe the process of key establishment.  ...  Increasing incidents of cyber attacks and evolution of quantum computing poses challenges to secure existing information and communication technologies infrastructure.  ...  In dynamic time window plane based SBPP algorithm, the concepts of time window (having a certain number of continuous time-slots) and time window plane (that reports the status of resource occupancy in  ... 
doi:10.1109/ojcoms.2021.3106659 fatcat:tshdrc2ayjf4bgtziz7cg6eio4
« Previous Showing results 1 — 15 out of 214,709 results