7,629 Hits in 3.6 sec

The proactive security toolkit and applications

Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai
1999 Proceedings of the 6th ACM conference on Computer and communications security - CCS '99  
The toolkit also addresses other critical Implementation issues, such as the initialization of the proactwe secure system We describe the toolkit and discuss some of the potential applications Some applications  ...  critical issues (for actual use) were not addressed In this work we report on a practical toolkit implementmg the key proacttve security mechanisms The toolkit provides secure interfaces to make it easy  ...  It is written as a Java applet and can be downloaded throught the browser The main request it supports is the "View PServer's Status and information.  ... 
doi:10.1145/319709.319713 dblp:conf/ccs/BarakHNS99 fatcat:6hmvurp7urdgff6tg4tnplsj4q

Hermes -- A Context-Aware Application Development Framework and Toolkit for the Mobile Environment

Senaka Buthpitiya, Faisal Luqman, Martin Griss, Bo Xing, Anind K. Dey
2012 2012 26th International Conference on Advanced Information Networking and Applications Workshops  
not be secure. 4) Usability issues: Context-aware applications are becoming extremely complex where the reasons and logic behind proactive application actions may not be intelligible to users causing  ...  In parallel, we use the toolkit to build a variety of mobile context-aware applications. The field experience allows us to further refine the toolkit APIs.  ... 
doi:10.1109/waina.2012.43 dblp:conf/aina/ButhpitiyaLGXD12 fatcat:242a3wf42vdiri6dvlbwqe6n6a

Toward an Effective Information Security Risk Management of Universities' Information Systems Using Multi Agent Systems, Itil, Iso 27002,Iso 27005

2014 International Journal of Advanced Computer Science and Applications  
The purpose of this paper is to propose an information security toolkit namely URMIS (University Risk Management Information System) based on multi agent systems and integrating with existing information  ...  security frameworks and standards, to enhance the security of universities information systems.  ...  Implementing this toolkit involves taking a proactive, strategic and measured approach that is more efficient than the reactive one used in many universities.  ... 
doi:10.14569/ijacsa.2014.050617 fatcat:g6dtwicigfe5bgoykkewjy6l64

Cyberthreats to Hospitals: Panacea, a Toolkit for People-Centric Cybersecurity

2021 Journal of Strategic Innovation and Sustainability  
The purpose of this work is to present a cybersecurity toolkit for connected devices and people.  ...  Concrete measures strengthening a healthcare setting must take into account number and diversity of hospital basic components and existing security policies.  ...  two sub-sets: • The Solution Toolkit, used to provide cyber security assessment and preparedness of Healthcare ICT infrastructures and connected devices.  ... 
doi:10.33423/jsis.v16i3.4449 fatcat:33dhm7ghprc7jkjxmua3y6trle

CitySCAPE Brochure [article]

2020 Zenodo  
The traditional security controls and security assurance arguments are becoming increasingly inefficient in supporting the emerging needs and applications of the multimodal transport systems, allowing  ...  assess the impact of a potential attack. • Improve the proactive approach of handling cybersecurity challenges and actively contribute to the predictability of threats in (regional) multimodal transport  ... 
doi:10.5281/zenodo.5898257 fatcat:jwjuojemi5bf3knox6nfnazmle

Overcoming Channel Bandwidth Constraints in Secure SIM Applications [chapter]

John A. MacDonald, William Sirett, Chris J. Mitchell
2005 IFIP Advances in Information and Communication Technology  
Our methodology overcomes the bandwidth constraints of the SIM Toolkit Security scheme described in GSM standard 03.48.  ...  In this paper we present an architecture based on a Java (J2SE, J2EE, J2ME and Java Card) platform supporting a secure channel from a Mobile Operator to the SIM card.  ...  The work of the second author was funded by the Smart Card Centre, Royal Holloway, University of London. This support is gratefully acknowledged.  ... 
doi:10.1007/0-387-25660-1_35 fatcat:em6worudnndwznhx427comvi3y

ProActive Parallel Suite: From Active Objects-Skeletons-Components to Environment and Deployment [chapter]

Denis Caromel, Mario Leyton
2009 Lecture Notes in Computer Science  
The Proactive Parallel Suite offers multiple layers of abstraction for parallel and distributed applications which include both programming and the environment/deployment abstraction layers.  ...  A deployment descriptor and a super-scheduler abstractions manage deployment of application on distributed resources, while the IC2D tool provides an abstraction to monitor debug and profile parallel and  ...  Basic non-functional concerns such as security and faulttolerance are handled both at the ProActive middleware and scheduler levels.  ... 
doi:10.1007/978-3-642-00955-6_48 fatcat:jcpe42i4n5hnxacsitg7qmkfwq

Roles of Participatory Action-oriented Programs in Promoting Safety and Health at Work

Kogi Kazutaka
2012 Safety and Health at Work  
With the adequate support of networks of trainers trained in the use of these toolkits, participatory approaches will continue to be the key factor for proactive risk management in various work settings  ...  The design and use of locally adjusted action toolkits play a key role in facilitating these improvements in each local situation.  ...  These trends are reinforced by the awareness of the need to secure the safety and health of all workers.  ... 
doi:10.5491/shaw.2012.3.3.155 pmid:23019528 pmcid:PMC3443691 fatcat:45ojtcpdzzcxtmfrk22cnnx3b4

FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats

David J. Musliner, Jeffrey M. Rye, Dan Thomsen, David D. McDonald, Mark H. Burstein, Paul Robertson
2011 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops  
FUZZBUSTER reacts to observed attacks and proactively searches for never-before-seen vulnerabilities.  ...  Today's computer systems are under relentless attack from cyber attackers armed with sophisticated vulnerability search and exploit development toolkits.  ...  The Exemplar Generator implementation also synthesizes exemplar test cases from application models for proactive exploration.  ... 
doi:10.1109/sasow.2011.26 dblp:conf/saso/MuslinerRTMBR11 fatcat:mgxyqcl7pzc3fakveddqkir2te

Implementing Trustworthy Services Using Replicated State Machines

F.B. Schneider, Lidong Zhou
2005 IEEE Security and Privacy  
Treating these as though they were independent leads to one interfering with the other, and "divide and be conquered" perhaps better characterizes the consequences.  ...  The fault-tolerance of the ensemble thus exceeds the fault-tolerance of any individual state machine, and a distributed fault-tolerance is the result.  ...  Proactive security This is a toolkit for maintaining proactively secure communication links, private keys, and data storage in toolkit (IBM) 36 synchronous systems.  ... 
doi:10.1109/msp.2005.125 fatcat:e3mnqp4aqrbrxloyxfhi4nz4ci

Implementing Trustworthy Services Using Replicated State Machines [chapter]

Fred B. Schneider, Lidong Zhou
2005 Lecture Notes in Computer Science  
Treating these as though they were independent leads to one interfering with the other, and "divide and be conquered" perhaps better characterizes the consequences.  ...  The fault-tolerance of the ensemble thus exceeds the fault-tolerance of any individual state machine, and a distributed fault-tolerance is the result.  ...  Proactive security This is a toolkit for maintaining proactively secure communication links, private keys, and data storage in toolkit (IBM) 36 synchronous systems.  ... 
doi:10.1007/978-3-642-11294-2_8 fatcat:pjsapx7n4fgv5ms7v2fhvg4yjq

Informing Proactive integrated virtual healthcare resource use in primary care

Jolie N. Haun, Bridget A. Cotner, Christine Melillo, Vanessa Panaite, William Messina, Shilpa Patel-Teague, Brian Zilka
2021 BMC Health Services Research  
Expert informant interviews identified a list of VHR tools that could be proactively integrated across the healthcare continuum.  ...  Though recent requirements for reducing contact create an intrinsic motivation, cultural change through education and best practices of proactive integrated use across the healthcare continuum is needed  ...  Proactive integrated VHR use is defined as a selfinitiated approach to coordinated use of applicable VHR systems for the purposes of coordinating and delivering timely high-quality patient-centered care  ... 
doi:10.1186/s12913-021-06783-9 pmid:34384405 pmcid:PMC8358911 fatcat:mq3mdtlapjefbex5ehkef24hay

Middleware for Smart Cards [chapter]

Harald Vogt, Michael Rohs, Roger Kilian-Kehr
2005 Middleware for Communications  
Application Layer On the application layer, requests and responses between card and card reader are exchanged in so-called application protocol data units (APDUs).  ...  The downside of this approach is that JavaCard developers have to deal with APDUs. For each application, the developer needs to specify an APDU protocol, and manually encode and decode APDUs.  ...  This response is intercepted by the proactive command manager that in turn resumes the applet and passes the user's selection back to the SIM toolkit application.  ... 
doi:10.1002/0470862084.ch15 fatcat:linagtbqhvdite4cv4iw724oay

Towards forensic-ready software systems

Liliana Pasquale, Dalal Alrajeh, Claudia Peersman, Thein Tun, Bashar Nuseibeh, Awais Rashid
2018 Proceedings of the 40th International Conference on Software Engineering New Ideas and Emerging Results - ICSE-NIER '18  
In this paper, we consider the meaning of forensic readiness of software, define forensic readiness requirements, and highlight some of the open software engineering challenges in the face of forensic  ...  However, little or no attention has been given to how well-suited existing software engineering methodologies and practices are for the systematic development of such systems.  ...  ACKNOWLEDGEMENTS This work is supported by EPSRC Grant: EP/N028112/1, EU Safer Internet Programme project SI 2601002, and SFI Grants 10/CE/I1855, 13/RC/2094 and 15/SIRG/3501.  ... 
doi:10.1145/3183399.3183426 dblp:conf/icse/PasqualeAPTNR18 fatcat:ov2ahsthkneavewsjmrf26hklq

18: Plethora of Cyber Forensics

N Sridhar, Dr.D.Lalitha Bhaskari, Dr.P.S. Avadhani
2011 International Journal of Advanced Computer Science and Applications  
Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena.  ...  As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called "cyber forensics."  ...  Some of tools used in the analysis phase are Coroner, Encase, FTK. The Coroner toolkit run under UNIX and EnCase is a toolkit that runs under Windows [7] .  ... 
doi:10.14569/ijacsa.2011.021118 fatcat:2ytpswmy7zbjrf4rr3st3pm7mq
« Previous Showing results 1 — 15 out of 7,629 results