Filters








8,580 Hits in 4.2 sec

A Distributed Real-Time Event Correlation Architecture for SCADA Security [chapter]

Yi Deng, Sandeep Shukla
2013 IFIP Advances in Information and Communication Technology  
The architecture employs a publish/subscribe mechanism, which decentralizes limited computing resources to distributed field agents in order to enhance real-time attack detection while limiting unnecessary  ...  Supervisory control and data acquisition (SCADA) systems require realtime threat monitoring and early warning systems to identify cyber attacks.  ...  Publish/Subscribe Paradigm This section describes the publish/subscribe paradigm used for event correlation.  ... 
doi:10.1007/978-3-642-45330-4_6 fatcat:7bfefo7hn5ejnn6llirzvdqzym

Access control enforcement delegation for information-centric networking architectures

Nikos Fotiou, Giannis F. Marias, George C. Polyzos
2012 Computer communication review  
Such an approach has multiple merits: it enables the interoperability of various stakeholders, it protects user identity and it can set the basis for a privacy preserving mechanism.  ...  Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies dispersed in various network locations, including caches and content replication servers  ...  Upon such a match the rendezvous point will notify the publisher to publish information data to the subscriber.  ... 
doi:10.1145/2377677.2377773 fatcat:zshzpvrqtnazrfzesokhykh46u

SkyCDS: A resilient content delivery service based on diversified cloud storage

J.L. Gonzalez, Jesus Carretero Perez, Victor J. Sosa-Sosa, Luis M. Sanchez, Borja Bergua
2015 Simulation modelling practice and theory  
In SkyCDS, the content dispersion is performed on the publisher side and the content retrieving process on the end-user side (the subscriber), which reduces the load on the organization side only to metadata  ...  The metadata flow layer is based on publish-subscribe patterns for insourcing the metadata control back to content owner.  ...  Acknowledgment The work presented in this paper has been partially supported by EU under the COST programme Action IC1305, Network for Sustainable Ultrascale Computing (NESUS).  ... 
doi:10.1016/j.simpat.2015.03.006 fatcat:j274u32czrgxfftba6bgyfsrv4

EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services

Willem-Jan van den Heuvel, Kees Leune, Mike P. Papazoglou
2005 Distributed and parallel databases  
This novel security model is entitled the Event-driven Framework for Service Oriented Computing (EFSOC).  ...  In this paper, we address the problem of defining and enforcing access control rules for securing service invocations in the context of a business process.  ...  For reasons of simplicity, the business process service is omitted from the figure. The protocol for publishing and subscribing events may be organized as a series of thirteen steps.  ... 
doi:10.1007/s10619-005-1400-1 fatcat:mg2x6qkjdrgtrbpvwdx4zn3qcq

Security Services Using Crowdsourcing

Rohit Verma, Sushmita Ruj
2014 Procedia Computer Science  
Dispersed computing power of devices is used to perform security verifications. This is done by subscribers in a collaborative way, using their idle resources, in exchange of certain incentives.  ...  Moreover, we propose an approach for managing these security verification jobs, subscribers in a fault tolerant manner.  ...  All the security computation tasks would be performed by the subscribers (computing systems).  ... 
doi:10.1016/j.procs.2014.05.454 fatcat:ptbbdbaw35gntnsvs6ftfxdz3u

EIPP Data Management Task Team Architecture

Paul Myrda, Erich Gunther, Mel Gehrs, Jerry Melcher
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
operations environment using new inter-regional information and measurement systems. .  ...  This paper will describe both the current and future states of data management and especially how the future state will support the long term vision of the EIPP that calls for delivering value within the  ...  System Design Figure 2 -NAPDN Architecture This entity is actually a distributed computing / communications environment that is geographically dispersed but still serves as the hub for the purposes of  ... 
doi:10.1109/hicss.2007.197 dblp:conf/hicss/MyrdaGGM07 fatcat:frb4hoys6vhrtmkkbjkdjmss5q

Access control enforcement delegation for information-centric networking architectures

Nikos Fotiou, Giannis F. Marias, George C. Polyzos
2012 Proceedings of the second edition of the ICN workshop on Information-centric networking - ICN '12  
Such an approach has multiple merits: it enables the interoperability of various stakeholders, it protects user identity and it can set the basis for a privacy preserving mechanism.  ...  Defining access control policies in an ICN is a non-trivial task as an information item may exist in multiple copies dispersed in various network locations, including caches and content replication servers  ...  Upon such a match the rendezvous point will notify the publisher to publish information data to the subscriber.  ... 
doi:10.1145/2342488.2342507 dblp:conf/acmicn/FotiouMP12 fatcat:drg6p6mgmreipntd3ndntzb5si

Amazon, Google and Microsoft Solutions for IoT: Architectures and a Performance Comparison

Paola Pierleoni, Roberto Concetti, Alberto Belli, Lorenzo Palma
2019 IEEE Access  
Cloud Computing (CC) has virtually unlimited capacity in terms of storage and computing power, and is based on sharing resources.  ...  Devices, in general, have limited computational power and limited storage capacity.  ...  The security system has to consider identity and access management (IAM), data protection, security monitoring, analysis and response.  ... 
doi:10.1109/access.2019.2961511 fatcat:r2ipgoqx4zg7nbooyczlqgdht4

MIDDLEWARE FOR SMART HETEROGENEOUS CRITICAL INFRASTRUCTURE NETWORKS INTERCOMMUNICATION

Titus Okathe, Shahram Shah Heydari, Vijay Sood, Orane Cole, Khalil El-Khatib
2016 International Journal on Smart Sensing and Intelligent Systems  
In this paper, a publish/subscribe-based communication system among dissimilar (heterogeneous) CIs is presented.  ...  The proposed system improves the manageability of CIs by providing an exchange medium for status information and alerts.  ...  SYSTEM ARCHITECTURE The proposed publish-subscribe middleware for CI communication (PSMCC) uses a content based publish-subscribe with a type based system.  ... 
doi:10.21307/ijssis-2017-917 fatcat:53ajsdmbdfgadeokzrqnvlu3qe

Access control in publish/subscribe systems

Jean Bacon, David M. Eyers, Jatinder Singh, Peter R. Pietzuch
2008 Proceedings of the second international conference on Distributed event-based systems - DEBS '08  
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to the system by applications  ...  We discuss how a publish/subscribe service can be secured; firstly by specifying and enforcing access control policy at the service API, and secondly by enforcing the security and privacy aspects of these  ...  Our approach for securing publish/subscribe applies to both cases.  ... 
doi:10.1145/1385989.1385993 dblp:conf/debs/BaconESP08 fatcat:e4rrf2ih6red7izmzowe6ju24y

Dynamic Threshold for Monitor Systems on Grid Service Environments [chapter]

E. N. Huh
2004 Lecture Notes in Computer Science  
Thus monitoring itself may cause system overhead.  ...  By employing the new feature (dynamic threshold), we find out unnecessary system overhead is significantly reduced and accuracy of events is still acquired.  ...  Proposed Monitoring Architecture and Dynamic Threshold The resource of computing systems is changed very often during run-time as general processes and system processes (e.g., daemon) can be executed at  ... 
doi:10.1007/978-3-540-24688-6_150 fatcat:fsiebylm7vhfdcvsquzj7ibvt4

Secured and Provisioned Access Authentication using Subscribed user Identity in Federated Clouds

Sudan Jha, Sultan Ahmad, Meshal Alharbi, Bader Alouffi, Shoney Sebastian
2021 International Journal of Advanced Computer Science and Applications  
security authentication is subscribed account in the federated cloud.  ...  Pearson, "Privacy, security and trust in cloud computing," in Privacy on-progress tasks corresponding to the number of UidVM, as and Security for Cloud Computing (S.  ... 
doi:10.14569/ijacsa.2021.0121121 fatcat:cnaklx2rrrhcbdzo4t254jpjvy

Security and Reliability [chapter]

2008 The Service-Oriented Media Enterprise  
Security and reliability are the crucial features of distributed computing, of which one of the key enabling technologies is Web Service.  ...  The benchmark results are presented to illustrate that the utilized reliability and security mechanisms for the handler distribution are reasonable and efficient.  ...  NaradaBrokering utilizes an authentication mechanism for the publishers and subscribers, which are the computing nodes for the distributed handler execution.  ... 
doi:10.1016/b978-0-240-80977-9.50015-1 fatcat:c5xjg3gu2nfp5gsvt34sm4rsfu

SECURITY AND RELIABILITY [chapter]

1980 Automatic Control in Power Generation, Distribution and Protection  
Security and reliability are the crucial features of distributed computing, of which one of the key enabling technologies is Web Service.  ...  The benchmark results are presented to illustrate that the utilized reliability and security mechanisms for the handler distribution are reasonable and efficient.  ...  NaradaBrokering utilizes an authentication mechanism for the publishers and subscribers, which are the computing nodes for the distributed handler execution.  ... 
doi:10.1016/b978-0-08-026709-8.50078-1 fatcat:xmygfx33sbcifaeggjosatqzzi

A Sensor Data Stream Collection Scheme Considering Phase Differences for Load Balancing

Tomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi
2021 International Journal on Mobile Computing and Multimedia Communications  
In the internet of things (IoT), various devices (things) including sensors generate data and publish them via the internet.  ...  In this paper, the authors describe a skip graph-based collection scheme for sensor data streams considering phase differences.  ...  These systems have a broker server for managing topics. The broker gathers all the published messages and forwards them to the corresponding subscribers.  ... 
doi:10.4018/ijmcmc.20210401.oa1 fatcat:bbjy4ab74zbpdghjhb5gbhn26e
« Previous Showing results 1 — 15 out of 8,580 results