Filters








530,445 Hits in 6.2 sec

Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems

Manjunath Kotari, Dr. Niranjan N. Chiplunkar, Dr. Nagesh H.R
2016 IOSR Journal of Computer Engineering  
Adaptive Distributed Systems (ADSs) are nodes in networked computers, which change itself according to changes in the environments.  ...  A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network.  ...  The security issues are main concerns irrespective of whether the system is adaptive or non-adaptive.  ... 
doi:10.9790/0661-1804012536 fatcat:keozhs43vjgltkrp5r23ahwe7y

Security Advanced Framework for the Robust Systems Monitoring

2020 International Journal of Engineering and Advanced Technology  
The significant worry of the present IT industry is that stability, adaptability and the complexities of the distributed systems are handled.  ...  Robust distributed system (RDS) are hubs in organized PCs, which changes itself as indicated by changes to conditions.  ...  The future work includes the use of collected information in functionalities of adaptive distributed systems such as adaptive charge balance and adaptive grid congestion.  ... 
doi:10.35940/ijeat.c5435.029320 fatcat:z2hcy3sncjb25lncrophmmgfve

Implementation of secure customized monitoring tool for adapative distributed systems

Manjunath Kotari, Niranjan N. Chiplunkar, H R Nagesh
2014 2014 International Conference on Contemporary Computing and Informatics (IC3I)  
by SUS and decrypt its values for the purpose of adaptation in the distributed systems.  ...  In the direction of cram the monitoring systems and identifying parameters that can be monitored with or without encrypting the data in an Adaptive Distributed System (ADS) which changes dynamically in  ...  In our proposed framework we are going to address these issues. Security Metrics for Adaptive Distributed Systems Sule Yildirim et al.  ... 
doi:10.1109/ic3i.2014.7019586 fatcat:ghtyluwaxndtljidzeyuwpsx7q

Introduction to Emerging Issues in Distributed Group Decision-Making: Opportunities and Challenges Minitrack

Anil K. Aggarwal, Doug Vogel, Sree Nilakanta
2012 2012 45th Hawaii International Conference on System Sciences  
This mini track addresses emerging issues, such as diversity, culture, adaptability and agility related to teams in distributed group decision-making, as well as the underlying theories of group dynamics  ...  Accepted papers study emerging issues of trust, non-trust, diversity and crowd sourcing in distributed group decision-making.  ...  This mini track addresses emerging issues, such as diversity, culture, adaptability and agility related to teams in distributed group decision-making, as well as the underlying theories of group dynamics  ... 
doi:10.1109/hicss.2012.349 fatcat:o27vzru4wvc5dm7atjkuxw4vgi

Guest Editorial Distributed Signal Processing for Security and Privacy in Networked Cyber-Physical Systems

A. MOHAMMADI, P. CHENG, V. PIURI, K. N. PLATANIOTIS, P. CAMPISI
2018 IEEE Transactions on Signal and Information Processing over Networks  
The articles appearing in the issue help illustrate the fundamental role that distributed signal processing plays for making networked CPSs secure and protect our privacy. A.  ...  The spirit and wide scope of distributed signal processing in revolutionized CPSs calls for novel and innovative techniques beyond conventional approaches to provide precise guarantees on security and  ...  The emphasis of this special issue is on distributed/network aspects of security and privacy in CPSs. II.  ... 
doi:10.1109/tsipn.2018.2801659 fatcat:26xxtv2tavdlzit5qgj5gky2le

Towards a Pervasive Access Control within Video Surveillance Systems [chapter]

Dana Al Kukhun, Dana Codreanu, Ana-Maria Manzat, Florence Sedes
2013 Lecture Notes in Computer Science  
The systems have to adapt, in real time, to the user's context and situation in order to provide him with relevant results without breaking the security and privacy policies.  ...  Distributed multimedia systems, such as the one proposed by the LINDO project, do not generally consider both issues.  ...  In this highly dynamic context, the multimedia database systems security becomes a critical issue.  ... 
doi:10.1007/978-3-642-40511-2_20 fatcat:6u7wnqjggndyzev6q7i5wom7p4

Editorial: Distributed intelligence and data fusion for sensor systems

L. Shu, M. Chen, J.J.P.C. Rodrigues, J. Lloret
2011 IET Communications  
storage, routing, security, mobility and distributed services.  ...  In this paper we summarise a Special Issue that tackles the distributed intelligence and data fusion for sensor systems from the perspective of coding and channel allocation, data aggregation and data  ...  Distributed intelligence and data fusion techniques have provided many benefits to the field of sensor systems, by making them more adaptable, flexible, smart, secure and scalable while improve their performance  ... 
doi:10.1049/iet-com.2011.0534 fatcat:gfwzyd6qcrgv7khzzdp6lkdpmy

Advances in infrastructures and tools for multiagent systems

Juan M. Alberola, Vicent Botti, Jose M. Such
2014 Information Systems Frontiers  
Acknowledgments The guest editors would like to express their deepest gratitude to the Editors-In-Chief of Information Systems Frontiers Journal for considering our proposal of this special issue and for  ...  In addition, we would like to thank all the reviewers for their hard work on the publication of this issue: Andrea Omicini, Tim Miller, Juan Botia, Michael Rovatsos, Javier Bajo, Nadia Erdogan, Isabel  ...  and distribution of control, flexibility, adaptation, trust, security, and openness (Boissier et al. 2013) .  ... 
doi:10.1007/s10796-014-9493-6 fatcat:ixacmthnvbgsblx2rtluosythm

Guest editorial: Special issue on the future of middleware

Valérie Issarny, Gordon Blair
2012 Journal of Internet Services and Applications  
In addition, users of distributed systems are often on the move resulting in significant context changes over time, which the system must adapt to.  ...  Dependability and security This topic is concerned with meeting dependability and security challenges in the complex distributed systems of today.  ... 
doi:10.1007/s13174-011-0058-3 fatcat:r7wdexkb2ndevmqruh3jktypzi

Adaptive Security Framework for the Blockchain on IOT

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Specifically, security solutions which are used by Blockchain in IoT domain lack support for adapting with different network resources, ranging from low power devices to high end servers.  ...  This paper presents an adaptive security framework for blockchain based IOT architectures.  ...  DESIGN OF THE DYNAMICALLY ADAPTABLE SECURITY FRAMEWORK FOR IOT Different nodes in a typical IOT network will have different resources such as CPU power, storage memory, system memory etc.  ... 
doi:10.35940/ijitee.i9009.078919 fatcat:mie55vn3djgm5mx56uep4ueiti

The Second-Order Security Dilemma [chapter]

Richard Baskerville
1996 IFIP Advances in Information and Communication Technology  
The paper discusses issues and aspects of managing adaptive systems security including adaptive safeguard techniques.  ...  Security is an important aspect of infonnation systems. However, much of the current work in this area is concerned with first-order issues of the security problem.  ...  Increasingly, security managers in distributed systems must consider the left hand side of the fonnula.  ... 
doi:10.1007/978-0-387-34872-8_15 fatcat:q7rjf6kk3rhqvk37zbz47m7obu

Adaptability of SOA in IoT Services – An Empirical Survey

Saravana Balaji, Amin Salih, Chiai Al-Atroshi
2018 International Journal of Computer Applications  
In this paper an empirical survey is presented which deal with the issues and challenges of adapting service oriented architecture methodologies in IoT kind services.  ...  Also, a few novel methods that proposed by adopting SOA in IoT services discussed.  ...  Security Any new emerging technology faces security issues as a great bottleneck for their adaptability in new domains.  ... 
doi:10.5120/ijca2018918249 fatcat:cddkl3ekjrdjlczru4bwkh45oy

Security and Privacy in Mobile Cloud Computing

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Versatile distributed computing is one of the advancement basic in the present portable condition kept running by utilizing cell phones in cloud condition.  ...  Versatile Cloud Computing is the most basic fields with creating age of the present fast web utilizing and Mobile world close-by its uses it needs to goes facing a fragment of the issues.  ...  An amazing improvement has showed up in the movement of cell phones, for example, Smartphone, PDA, and workstations with an assortment of adaptable enrolling, systems association and security impels.  ... 
doi:10.35940/ijitee.i3258.0789s319 fatcat:g7fkhpeqdvfk3hysrrq3qdj6o4

Advances in Security and Privacy in Sensor Networks

Fatos Xhafa, Jin Li, Duncan S. Wong, Francesco Palmieri
2014 International Journal of Distributed Sensor Networks  
There are many tools and primitives that have been used in the protection of secure and privacy-preserving in various real-world applications.  ...  Security and privacy are two important research topics in wireless sensor networks. Protocols or applications without security protection cannot be accepted by users.  ...  Finally, we appreciate all authors, reviewers, and editorial members for their invaluable contribution and support to this special issue.  ... 
doi:10.1155/2014/956265 fatcat:mtjzahm4yjcapbjax2lfxfewh4

Guest Editorial: Security in Distributed and Network-Based Computing

Igor V. Kotenko
2015 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Security should be a vitally important property of distributed and networked systems.  ...  While attack tools are becoming more powerful and easy-to-use, research and development of adaptive, active and intelligent security systems is required.  ...  The special issue aims to provide the latest developments in the area of security systems.  ... 
doi:10.22667/jowua.2015.06.31.001 dblp:journals/jowua/Kotenko15 fatcat:blmjtkuv4zesxc4s3qdl2xvujq
« Previous Showing results 1 — 15 out of 530,445 results