United Arab Emirates Computer Emergency Response Team

Displaying 1-12 of 12 results

  • White Papers // Feb 2014

    Cloud Computing Security: A Survey

    Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Sep 2013

    Privacy in the Age of Big Data: Exploring the Role of Modern Identity Management Systems

    In today's digital world, the authors' ability to better understand data is seen as fundamental to addressing complex economical and societal challenges. The massive amounts of digital data that governments and businesses collect as well as the technological tools they use for analyzing disparate data are referred to as big...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2013

    A Framework for Software-as-a-Service Selection and Provisioning

    As cloud computing is increasingly transforming the information technology landscape, organizations and businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them increase business agility and reduce their operational costs. They increasingly demand services that can meet their functional and non-functional requirements. Given the plethora and the...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Feb 2013

    Database Systems for the Smart Grid

    Since the smart grid reply on modern Information and Communication Technology (ICT) infrastructure, database systems, which are one of the vital components of ICT, are indispensable in the smart grid. In this paper, two aspects of database systems, namely database management and data mining, for the smart grid are covered....

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    An MDP-Based Model for Optimal Relay Selection in OFDMA Cooperative Networks

    In this paper, the authors present a joint resource allocation and optimal relay selection scheme that meets the data rate QoS requirement of traffic in OFDMA networks. The proposed scheme selects the relay that best utilizes the attainable data rate for all subcarriers, as opposed to existing works which are...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    A Robust Mechanism for Resource Allocation With Interference Mitigation in Femtocellular Networks

    Interference mitigation can be particularly challenging in hybrid 4G cellular networks employing a femtocellular tier, especially given the ad hoc nature in which femtocells are deployed. So far, mitigation mechanisms have been based on simplified models assuming regular (grid-based) deployment, using average interference characterization or satisfying the SINR requirements while...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    Multilevel Early Packet Filtering Technique Based on Traffic Statistics and Splay Trees for Firewall Performance Improvement

    This paper presents a mechanism to improve firewall packet filtering time through optimizing the order of security policy filtering fields for early packet rejection. The proposed mechanism is based on the optimization of the filtering fields order according to traffic statistics. Furthermore, the mechanism uses multilevel packet filtering, and in...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    The Cloud: Requirements for a Better Service

    Cloud computing has rapidly made it to the top of the list of considerations for IT strategies in various organizations. However, there are many unanswered requirements delaying the complete adoption of this paradigm. As a result, it is essential to identify the organizations' wish-list for Cloud services. In this paper,...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Jan 2012

    SMEs Amidst Global Technological Changes

    SMEs contribute significantly to the national economies and to the employment levels of different countries and represent a viable source for inventions and innovations. The emergence of EC in the early 1990s could provide different opportunities to the small business sector to overcome its inadequacies. However, in review of the...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Oct 2009

    MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks

    Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Aug 2009

    A Survey of Security Middleware for Pervasive and Ubiquitous Systems

    Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved....

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Apr 2008

    A Secure Mobile Agents Platform

    Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In this paper, the authors propose protection mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents and the access control to...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Feb 2014

    Cloud Computing Security: A Survey

    Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    The Cloud: Requirements for a Better Service

    Cloud computing has rapidly made it to the top of the list of considerations for IT strategies in various organizations. However, there are many unanswered requirements delaying the complete adoption of this paradigm. As a result, it is essential to identify the organizations' wish-list for Cloud services. In this paper,...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2013

    A Framework for Software-as-a-Service Selection and Provisioning

    As cloud computing is increasingly transforming the information technology landscape, organizations and businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them increase business agility and reduce their operational costs. They increasingly demand services that can meet their functional and non-functional requirements. Given the plethora and the...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Feb 2013

    Database Systems for the Smart Grid

    Since the smart grid reply on modern Information and Communication Technology (ICT) infrastructure, database systems, which are one of the vital components of ICT, are indispensable in the smart grid. In this paper, two aspects of database systems, namely database management and data mining, for the smart grid are covered....

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    An MDP-Based Model for Optimal Relay Selection in OFDMA Cooperative Networks

    In this paper, the authors present a joint resource allocation and optimal relay selection scheme that meets the data rate QoS requirement of traffic in OFDMA networks. The proposed scheme selects the relay that best utilizes the attainable data rate for all subcarriers, as opposed to existing works which are...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    A Robust Mechanism for Resource Allocation With Interference Mitigation in Femtocellular Networks

    Interference mitigation can be particularly challenging in hybrid 4G cellular networks employing a femtocellular tier, especially given the ad hoc nature in which femtocells are deployed. So far, mitigation mechanisms have been based on simplified models assuming regular (grid-based) deployment, using average interference characterization or satisfying the SINR requirements while...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // May 2012

    Multilevel Early Packet Filtering Technique Based on Traffic Statistics and Splay Trees for Firewall Performance Improvement

    This paper presents a mechanism to improve firewall packet filtering time through optimizing the order of security policy filtering fields for early packet rejection. The proposed mechanism is based on the optimization of the filtering fields order according to traffic statistics. Furthermore, the mechanism uses multilevel packet filtering, and in...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Oct 2009

    MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks

    Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Aug 2009

    A Survey of Security Middleware for Pervasive and Ubiquitous Systems

    Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to facilitate their development, integration and security also evolved....

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Sep 2013

    Privacy in the Age of Big Data: Exploring the Role of Modern Identity Management Systems

    In today's digital world, the authors' ability to better understand data is seen as fundamental to addressing complex economical and societal challenges. The massive amounts of digital data that governments and businesses collect as well as the technological tools they use for analyzing disparate data are referred to as big...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Apr 2008

    A Secure Mobile Agents Platform

    Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In this paper, the authors propose protection mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents and the access control to...

    Provided By United Arab Emirates Computer Emergency Response Team

  • White Papers // Jan 2012

    SMEs Amidst Global Technological Changes

    SMEs contribute significantly to the national economies and to the employment levels of different countries and represent a viable source for inventions and innovations. The emergence of EC in the early 1990s could provide different opportunities to the small business sector to overcome its inadequacies. However, in review of the...

    Provided By United Arab Emirates Computer Emergency Response Team