IARIA

Displaying 1081-1120 of 1223 results

  • White Papers // Jul 2011

    Collaborative Digital Library Services in a Cloud

    The authors have developed a web-based system that allows users to collaboratively organize large online image collections according to an evolving faceted classification schema. One of the major issues identified in the early deployment and evaluation in a university setting is the scalability of the system on traditional server implementations....

    Provided By IARIA

  • White Papers // Jul 2011

    Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments

    Industrial control networks, e.g., for factory, process or energy automation and smart metering, are increasingly based on IT communication technologies like Ethernet, IP, and Web-Services. Security measures as authentication or cryptographic VPNs are used to protect communication links to supervising control stations and for remote service. While standard communication technologies...

    Provided By IARIA

  • White Papers // Jul 2011

    Data Mining Governance for Service Oriented Architecture

    In recent years, data mining has attracted a great deal of attention in the information industry, as well as in society as a whole. This is due to the wide availability of huge amounts of data and the imminent need for converting such data into useful information and knowledge. The...

    Provided By IARIA

  • White Papers // Jul 2011

    MBPR'A Business Process Repository Supporting Multi-Granularity Process Model Retrieval

    Business process repository aims at business process model discovery and reusing. However, most of current approaches for process matchmaking have the limitation that the process models should be in the same granularity, whereas a process repository with good support for multi-granularity business process retrieval is still rare. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    Critical Information Infrastructures Management System and Security Issues Focusing on the Public Administrative Sector

    The IT society is absolutely reliant on communications infrastructure. Social infrastructures, including administration, transportation, healthcare and education, rely on the communications infrastructure to function. A breakdown of the communications infrastructure due to destruction or malfunction will result in other social infrastructures malfunctioning. Thus it can be said that the information...

    Provided By IARIA

  • White Papers // Jan 2013

    Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems

    Considering security as an afterthought and adding security aspects to a system late in the development process has now been realized to be an inefficient and bad approach to security. The trend is to bring security considerations as early as possible in the design of systems. This is especially critical...

    Provided By IARIA

  • White Papers // Jan 2013

    Securing Access to Data in Business Intelligence Domains

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Jan 2013

    Verification with AVISPA to Engineer Network Security Protocols

    This paper summarizes work on formal mechanized verification of security protocols using Avispa, a model checker dedicated to security protocols. Avispa has been successfully used in various Master's projects. In this paper, the authors present two outstanding projects of quite different nature that highlight the spectrum of formal security protocol...

    Provided By IARIA

  • White Papers // Jan 2013

    Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles

    Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that diminish their effectiveness as a DoS mitigation solution. First, the DoS-resilience that these schemes provide is minimized when there is a large disparity between the computational power...

    Provided By IARIA

  • White Papers // Jan 2013

    A Distributed Hash Table Assisted Intrusion Prevention System

    Using collaborative intrusion detection to sense network intrusions comes at a price of handling an enormous amount of data generated by detection probes, and the problem of properly correlating the evidence collected at different parts of the network. The correlation between the recorded events has to be revealed, as it...

    Provided By IARIA

  • White Papers // Apr 2012

    Preventing Protocol Switching Covert Channels

    Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques arose which are based on the capability of protocol switching. Such protocol switching covert channels operate within overlay networks and can (as a special case) contain their own internal control protocols....

    Provided By IARIA

  • White Papers // Apr 2012

    CincoSecurity: Automating the Security of Java EE Applications with Fine-Grained Roles and Security Profiles

    Almost every software system must include a security module to authenticate users and to authorize what elements of the system can be accessed by each user. This paper describes a security model called \"Cinco-Security\" that follows the Role Based Access Control model (RBAC), but implementing fine-grained roles that can be...

    Provided By IARIA

  • White Papers // Apr 2012

    Advancement Towards Secure Authentication in the Session Initiation Protocol

    The digest access authentication method used in the voice over IP signaling protocol, SIP, is weak. This authentication method is the only method with mandatory support and widespread adoption in the industry. At the same time, this authentication method is vulnerable to a serious real-world attack. This poses a threat...

    Provided By IARIA

  • White Papers // Jul 2012

    Advances in Protecting Remote Component Authentication

    Component authentication allows verifying the originality of various components being part of a machine or a system, or being connected to control equipment. Various technologies are available, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical applied cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These...

    Provided By IARIA

  • White Papers // Jul 2012

    A Scalability Analysis of an Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA

  • White Papers // Jun 2010

    A Distributed Identity Handling Approach Enriched with Identity Semantics

    People rely on many forms of identities to access offline and online services. The inconvenience of possessing and using identities creates significant security vulnerability. This paper proposes an identity handling mechanism enriched with identity semantics which is believed to ease and secure identity usage. In this regard, user's identities are...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2012

    Sensor Based Risk Assessment for the Supply of Dangerous Products

    As a consequence of globalization, supply chain systems recently evolved toward a dynamic network of firms and industries. This complexification of supply chain processes raises several challenges in particular with respect to compliance to regulations (e.g., safety, security). With the multiplication of intermediate actors, a single non-compliant actor might jeopardize...

    Provided By IARIA

  • White Papers // Aug 2012

    Linking Sensor Data to a Cloud-based Storage Server Using a Smartphone Bridge

    There is a need for systems that unify the processes of collecting, storing and analyzing long-term sensor data in multi-user contexts. The ubiquity and communication features of Smartphone make them suitable as data aggregation platforms for standalone sensors. Cloud-based servers are advantageous for their centralization and scalability in the storage...

    Provided By IARIA

  • White Papers // Aug 2012

    Towards Intelligent Sensor Evolution: A Holonic-Based System Architecture

    Rapid developments of smart sensor technologies envisage a new era where information handling and knowledge sharing will play a crucial role. Traditional sensors were conceived as simple hardware transducers of physical quantities into measurable signals, eventually requiring an analogue/digital conversion to make data available for software applications. IEEE-1451 family of...

    Provided By IARIA

  • White Papers // Aug 2012

    Cluster-based Energy-efficient Composite Event Detection for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs), well known communicating architectures today, are often used to detect the occurrence of some environmental events, such as pollution monitoring, forest fires detection, location and tracking, etc. In order to reduce irrelevant alarms, multiple attributes are used in the event detection process. In WSNs, communication is...

    Provided By IARIA

  • White Papers // Aug 2012

    Solving Hidden Terminal Problem in Cognitive Networks Using Cloud Technologies

    Hidden terminal problem is one of the well-known problems when a node is visible from the access point but cannot communicate through it. The problem occurs in ad hoc networks as well as cognitive networks. The clear solution is not discussed in cognitive networks. In this paper, the authors proposed...

    Provided By IARIA

  • White Papers // Aug 2012

    Distributed Compromised Nodes Detection Scheme at First Stage for SurvSec Security Architecture

    SurvSec is a novel security architecture for reliable network recovery from base station BS failure of surveillance wireless sensor network WSN in hostile environment. Compromised nodes detection is a very important security mechanism in surveillance WSN to detect compromised nodes before they destroy the security of the WSN. Node compromise...

    Provided By IARIA

  • White Papers // Aug 2012

    Certificates Shared Verification Key Management for SurvSec Security Architecture

    SurvSec is a novel security architecture for reliable network recovery from base station BS failure of surveillance Wireless Sensor Network (WSN) in hostile environment. Key management is the fundamental security mechanism in WSN which is needed for secure localization, secure clustering, secure data aggregation, secure authenticated broadcasting and secure routing....

    Provided By IARIA

  • White Papers // Aug 2011

    A Pairing-Free ID-based One-Pass Authenticated Key Establishment Protocol for Wireless Sensor Networks

    Due to resource constraints and unique features of Wireless Sensor Networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, the authors propose a new efficient and secure ID-based one-pass authenticated key establishment protocol between an outside user...

    Provided By IARIA

  • White Papers // Aug 2011

    End-to-End Secure Data Delivery in Wireless Sensor Networks

    Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of...

    Provided By IARIA

  • White Papers // Mar 2013

    QoS-Aware Component for Cloud Computing

    Providing dedicated cloud services that ensure user's QoS requirements is a big challenge in cloud computing. Currently, cloud services are provisioned according to resources availability without ensuring the expected performances. The cloud provider should happen to evolve its ecosystem in order to meet QoS-awareness requirements of each cloud component. In...

    Provided By IARIA

  • White Papers // Jul 2013

    Experiments in Collaborative Cloud-Based Distance Learning

    Mobile devices have revolutionary changed the process of multimedia consumption in distance learning systems and provide flexible user-oriented experience. M-learning systems typically include different kinds of multimedia resources helping learners to be more interactive and interested in collaboration. The proposed multi-tenancy group collaboration within the cloud-based learning platform (as a...

    Provided By IARIA

  • White Papers // May 2013

    Deploying a Multipoint Control Unit in the Cloud: Opportunities and Challenges

    A Multipoint Control Unit (MCU) is a software component that manages different aspects of multimedia systems: mixing, forwarding, recording or transcoding media streams. This paper shows how cloud infrastructures offer new opportunities to MCUs in a range of scenarios, scaling to a variable number of users. However, this deployment also...

    Provided By IARIA

  • White Papers // Oct 2013

    Pricing the Cloud: An Adaptive Brokerage for Cloud Computing

    Using a multi-agent social simulation model to predict the behavior of cloud computing markets, Rogers & Cliff (R&C) demonstrated the existence of a profitable cloud brokerage capable of benefitting cloud providers and cloud consumers alike. Functionally similar to financial market brokers, the cloud broker matches provider supply with consumer demand....

    Provided By IARIA

  • White Papers // Jul 2012

    Facilitating Bioinformatics Research Through a Mobile Cloud with Trusted Data Provenance

    Cloud provides a cheap yet reliable outsourcing model for anyone who needs scalable computing resources. Together with the cloud, Service Oriented Architecture (SOA) allows the construction of scientific workflows to bring together various scientific computing tools offered as services in the cloud, to answer complex research questions. In those scientific...

    Provided By IARIA

  • White Papers // Aug 2013

    Policy-Aware Provisioning of Cloud Applications

    The automated provisioning of complex composite cloud applications is a major issue and of vital importance in cloud computing. It is key to enable cloud properties such as pay-as-you-go pricing, on-demand self-service, and elasticity. The functional aspects of provisioning such as instantiating virtual machines or installing software components are covered...

    Provided By IARIA

  • White Papers // Oct 2013

    Towards a Smart City Security Model

    Even though concepts related to smart cities are well established and spread, those concepts are still very thin when related to Information Security. This paper will present some studies on smart cities, and will show that those studies are based on three macro concepts, system interoperability, applications and frameworks/platforms. Solutions...

    Provided By IARIA

  • White Papers // Jul 2013

    Maximizing Utilization in Private IaaS Clouds with Heterogenous Load Through Time Series Forecasting

    In this paper, the authors present ongoing work on creating a computing system that can run two types of workloads on a private cloud computing cluster, namely web servers and batch computing jobs, in a way that would maximize utilization of the computing infrastructure. To this end, a queue engine...

    Provided By IARIA

  • White Papers // Oct 2013

    Kongdroid: A Proposal for a Cloud Service for Stress Testing on Android Applications

    In this paper, the authors propose a new and scalable service for stress testing on Android applications. This tool is available through cloud computing resources to support developers in their applications validation, aiming robustness, stability and compatibility, in different devices before commercial deployment. The solution focuses on the generation of...

    Provided By IARIA

  • White Papers // Mar 2013

    A Large-Scale Power-Saving Cloud System Composed of Multiple Data Centers

    A large-scale power-saving cloud system-composed of multiple Data Centers (DCs) and a Wide-Area Network (WAN) connecting them is proposed. In this system, to reduce power consumption of the DCs and the WAN, Virtual Machines (VMs) are migrated and data routing paths are optimized under the condition that Quality of Service...

    Provided By IARIA

  • White Papers // Oct 2013

    Commercialized Practical Network Service Applications From the Integration of Network Distribution and High-Speed Cipher Technologies in Cloud Environments

    In this paper, the authors present the evaluation results of the commercialization of High Security Disaster Recovery Technology (HS-DRT) that uses network distribution and high-speed strong cipher technologies to realize efficient and secure network services. They have commercialized a disaster recovery system and evaluated the performance of the distributed engines...

    Provided By IARIA