Filters








125,991 Hits in 8.8 sec

Extending user-controlled security domain with TPM/TCG in Grid-based virtual collaborative environment

Yuri Demchenko, Leon Gommans, Cees de Laat
2007 2007 International Symposium on Collaborative Technologies and Systems  
Solutions and implementation are proposed and discussed for the service/application authorisation session and security context management in multidomain applications based on the GAAA Authorisation Framework  ...  The CRP-UC is considered as comprising of three layers: trusted computing platform, secure virtualised workspace, and collaborative/application session.  ...  In the proposed architecture/model, the TPM with its hardware-based secure ID allows for "bootstrapping" a chain of trust to the TMP and hardware platform.  ... 
doi:10.1109/cts.2007.4621738 dblp:conf/cts/DemchenkoGL07 fatcat:rtqekeim7rgkvlb6wrdnvru3ci

Beyond Zero Trust: Trust Is a Vulnerability

Mark Campbell
2020 Computer  
Zero trust is a systemic approach to information security that trusts no user, transaction, or network traffic unless verified.  ...  Workers were restricted as to which huts they could enter, what they could access, and identity papers were checked frequently-no one was trusted. 1 Trust is a vulnerability and, like all vulnerabilities  ...  ASA, CARTA, and ZTNA In 2014, Gartner introduced its Adaptive Security Architecture (ASA) and extended it in 2017 with the continuous adaptive risk and trust assessment (CARTA) approach.  ... 
doi:10.1109/mc.2020.3011081 fatcat:7rx7zmzknzdd5bhy4h3wwklybu

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
The study finds context and trust as essential to develop adaptive and accurate security framework.  ...  Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.  ...  Hence, any model of its kind consumes more energy when it comes to adaptive trust evaluation for security design.  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

Mónica Pinto, Nadia Gámez, Lidia Fuentes, Mercedes Amor, José Horcas, Inmaculada Ayala
2015 Sensors  
In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies)  ...  Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications  ...  All the authors participates in the INTER-TRUST project.  ... 
doi:10.3390/s150305251 pmid:25746093 pmcid:PMC4435211 fatcat:5rj3ricyangrrbr6xab2aerlna

SECURITY BREACHES IN TRUST MANAGEMENT SCHEMES IN MOBILE AD-HOC NETWORKS

Bindiya Bhatia, MK Soni, Parul Tomar
2017 International Journal of Advanced Research  
Due to these characteristics, designing a security protocol is a challenging task in MANET for the security protocol Designers. Trust plays an important role to provide security to the network.  ...  Mobile Ad-Hoc Network (MANET) is a resource constrained network. The devices are mobile and having limited bandwidth, computing power, memory.  ...  [9] initially define the "Trust Management" and recognized it as a component of security in networks.  ... 
doi:10.21474/ijar01/4425 fatcat:aiikl7iutvbvla2jkpg3472nce

Dynamic Trust Management

Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee
2009 Computer  
Although the GIG is a DoD-specific project, many of the trust management problems it exposes also occur naturally in existing and emerging commercial and other public networked computing environments,  ...  Information security is, in principle, guaranteed with separated networks, since there is no network path from the more secure to the less secure network.  ...  In particular, KeyNote has been used as the basis for policy control in network-layer security (IPsec) and to control the interaction between application-and network-layer policies, as in the webserver  ... 
doi:10.1109/mc.2009.51 fatcat:po2ntel4nngnlc2rtzuxrszja4

A trust management model for Body Sensor Networks

Vinh T. Bui
2011 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks  
A foreseen usage scenario for a BSN is the installation of third-party monitoring applications. Existing applications can also be extended by downloading and installing new components dynamically.  ...  To that end we propose an efficient trust management model and we investigate policies and mechanisms to express and control the data usage.  ...  The author would like to thank to Johan Lukkien, Shudong Chen, and Richard Verhoeven, in developing the presented concepts and for their useful comments in improving the quality of this paper.  ... 
doi:10.1109/wowmom.2011.5986201 dblp:conf/wowmom/Bui11 fatcat:z7pbsfq5xbckrhyz3r3kck3tbi

A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Belal Ali, Simsam Hijjawi, Leith H. Campbell, Mark A. Gregory, Shuo Li
2022 Security and Communication Networks  
The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments.  ...  Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge.  ...  In this work, zero-trust dynamic access control was created, and it is composed of two engines and an access agent.  ... 
doi:10.1155/2022/3178760 doaj:8e6954631e4e4624b362a282a83209f6 fatcat:qanzit2m35en5mrmfljkyr25ju

Three Emerging Innovative Technologies Required for Cyber Operations to Execute Commander's Intent at Machine Speed

Andrew Stewart
2020 Military Cyber Affairs  
At the heart of the need for innovation is an increased demand for data and information, as well as the size and scale of networks and networking exploding without a proportionate growth in the IT resources  ...  in a zero trust architecture that operates at machine speed and ensures decision advantage for the DoD.  ...  "That weakness of the traditional hub-and-spoke network model lies in its architecture. Crossing the chasm from trust to distrust via a firewall is inherently risky.  ... 
doi:10.5038/2378-0789.4.2.1069 fatcat:6i7xw6awpbf7xdzm3iphuqtc2i

Re-thinking Grid Security Architecture

Yuri Demchenko, Cees de Laat, Oscar Koeroo, David Groep
2008 2008 IEEE Fourth International Conference on eScience  
Historically retrofitted to the distributed systems they are designed to protect and control, the security model is usually limited in scope and applicability, and its implementation tailored towards a  ...  Recent developments in open systems security, and revisiting basic security concepts in networking and computing including the OSI Security Architecture and the concepts used in the Trusted Computing Base  ...  The Trusted Network Connect (TNC) [26] is a part of the TCPA that specifies how the network Security services Security mechanisms OSI Reference Model Application layer Presentation layer  ... 
doi:10.1109/escience.2008.53 dblp:conf/eScience/DemchenkoLKG08 fatcat:b6l3sodzzbbe5b2sgs2j4ofoja

Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning

Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan A. Garcia-Espin
2010 2010 IEEE Second International Conference on Cloud Computing Technology and Science  
The proposed Security Services Lifecycle Management (SSLM) model extends the existing frameworks with additional stages such as "Reservation Session Binding" and "Registration and Synchronisation" that  ...  The paper provides a short overview of the existing standards and technologies and refers to the ongoing projects and experience in developing dynamic distributed security services.  ...  ACKNOWLEDGMENT This work is supported by the FP7 EU funded project GEANT3 (FP7-ICT-238875), and the FP7 EU funded Integrated project The Generalised Architecture for Dynamic Infrastructure Services (GEYSERS  ... 
doi:10.1109/cloudcom.2010.91 dblp:conf/cloudcom/DemchenkoLLG10 fatcat:3gnjrtv7mbgulos5ditiujahca

Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning

Yuri Demchenko, Leon Gommans, Cees de Laat
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborative applications and on-demand  ...  For the practical implementation, we investigate the use of two popular standards SAML and XACML for complex authorisation scenarios in dynamic resource provisioning across multiple administrative and  ...  to distributed hierarchically organised resources in dynamic/on-demand services provisioning.  ... 
doi:10.1109/ares.2007.157 dblp:conf/IEEEares/DemchenkoGL07 fatcat:yhuywigecfg6bbr235jjv4tcpu

A Survey on Trust Management for Mobile Ad Hoc Networks

Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen
2011 IEEE Communications Surveys and Tutorials  
In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource  ...  Finally, we discuss future research areas on trust management in MANETs based on the concept of social and cognitive networks.  ...  ACKNOWLEDGMENT This project is supported in part by an appointment to the U.S.  ... 
doi:10.1109/surv.2011.092110.00088 fatcat:nyo4a33trjh35ajvqlwlovomt4

An associative processing module for a heterogeneous vision architecture

R. Storer, M.R. Pout, A.R. Thomson, E.L. Dagless, A.W.G. Duller, A.P. Marriott, P.J. Hicks
1992 IEEE Micro  
In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource  ...  Finally, we discuss future research areas on trust management in MANETs based on the concept of social and cognitive networks.  ...  ACKNOWLEDGMENT This project is supported in part by an appointment to the U.S.  ... 
doi:10.1109/40.141602 fatcat:gk6w4la6zrb4jhaqtbieoytnzi

Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing

Songzhu Mei, Zhiying Wang, Yong Cheng, Jiangchun Ren, Jiangjiang Wu, Jie Zhou
2012 International Journal of Computational Intelligence Systems  
TBVMM uses Bayesian network and Kalman filter to solve the dynamicity of the trusted relationship. It is proposed to fill the trust gap between the infrastructure and upper software stacks.  ...  Cloud computing bring a tremendous complexity to information security. Remote attestation can be used to establish trust relationship in cloud.  ...  Acknowledgements This work was supported in part by the National Natural Science Foundation of China (NSFC) under grant No.60903204.  ... 
doi:10.1080/18756891.2012.733231 fatcat:qcco5nui4bg7jjvwmtou2oohcm
« Previous Showing results 1 — 15 out of 125,991 results