نتایج جستجو برای: security constrained unitcommitment
تعداد نتایج: 252998 فیلتر نتایج به سال:
Most of the current Internet of Things (IoT) security work focuses on either end-to-end or hop-by-hop security. Keeping in view the current suggestions and standards, we take a look at external threats that might still be possible even if both types of security measures are taken. We particularly focus on DoS attacks from outside the 6LowPan network directed at constrained devices
Review, Excerpts A Reference Monitor for Workflow Systems with Constrained Task Execution Jason Crampton, Information Security Group Royal Holloway, University of London
In this paper we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users. keywords: Key assignment, Access control.
We present an overview of how the need for security will impact the design of embedded systems and the ICs they contain. After a brief introduction to security, we discuss the challenges security processing poses to embedded system architects, integrators, HW designers, and SW engineers. These challenges, as well as current and emerging solutions to address them, are discussed in the context of...
The Internet of things (IoT) has become a significant element of next generation. IoT is a proposed development of the internet in which the objects have network connectivity able to transmit and receive data. The IoT applications such as smart homes, smart cities and health care. WSN is an important technology of IoT. Typically sensor nodes are considered resource constrained device with limit...
This article considers the synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is an approach to supporting multilevel and multilateral security for a wide class of enterprise applications, those of concurrent transactional applications. The approach extends nested transactions with ret...
Recently, in Journal of Security and Communication Networks (5(12):1363-1374, DOI: 10.1002/ sec.429), Wang et al. proposed a group key distribution scheme with self-healing property for wireless networks in which resource is constrained. They claimed that their key distribution scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some sec...
We consider a sequential object-oriented language with pointers and mutable state, private fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts and type tests, and recursive methods. Programs are annotated with security levels, constrained by security typing rules. A noninterference theorem shows how the rules ensure pointer confinement and secure informat...
Modern automotive Cyber-Physical Systems (CPS) are increasingly adopting wireless communications for Intra-Vehicular, Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols as a promising solution for challenges such as the wire harnessing problem, collision detection, and collision avoidance, traffic control, and environmental hazards. Regrettably, this new trend results in new...
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید