نتایج جستجو برای: heterogeneous security complex

تعداد نتایج: 1059368  

Journal: :IJCSE 2014
Luca Caviglione Mauro Coccoli Alessio Merlo

Social environments were already present in the original Web vision, but nowadays are mainly available through Online Social Networks (OSNs), which are a real cultural phenomenon. However, their actual deployment is very heterogeneous, reflecting into different development choices and functional architectures. Such aspects, jointly with the intrinsic sharing of personal information, lead to sev...

2014
Vincenzo Carletti Rosario Di Lascio Pasquale Foggia Mario Vento

Recently, the need of monitoring both real and virtual environments is growing up, especially in security contexts. Virtual environments are rich of data produced by human interactions that can not be extracted using classical physical sensors. Thus, new kind of sensors allow to obtain and collect a huge quantity of data from these virtual environment. In order to monitor complex environments, ...

Journal: :I. J. Comput. Appl. 2009
Guangzhi Qu Osamah A. Rawashdeh Salim Hariri

Computing systems have steadily evolved into more complex, interconnected, heterogeneous entities. Ad-hoc techniques are most often used in designing them. Furthermore, researchers and designers from both academia and industry have focused on vertical approaches to emphasizing the advantages of one specific feature such as fault tolerance, security or performance. Such approaches led to very sp...

1996
Wolfgang Eßmayr Fritz Kastner Günther Pernul A Min Tjoa

This paper describes the security architecture of the IRO-DB database federation, a system supporting interoperable access between relational and object-oriented databases. The security policy developed is a federated, administrative, discretionary access control policy supporting positive, negative, as well as implied authorizations. It includes a procedure for conflict resolution within the s...

2014
Khalid Zaman Bijon Ram Krishnan Ravi S. Sandhu

Datacenters for cloud infrastructure-as-a-service (IaaS) consist of a large number of heterogeneous virtual resources, such as virtual machines (VMs) and virtual local area networks (VLANs). It takes a complex process to manage and arrange these virtual resources to build particular computing environments. Misconfiguration of this management process increases possibility of security vulnerabili...

1999
Pierre Bieber

We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitability, binding and vulnerability of a set of security functions. We propose constraints that security functions should guarantee in order to interact consistently and securely with other functions. To illustrate these no...

2003
Hu Wang Anand R. Prasad

This paper presents solutions for security context transfer for vertical handover between heterogeneous networks. Seamless vertical handover is an important function of Beyond 3G systems. Context transfer can help support seamless vertical handover while maintaining required security level. So as to come to solutions for security context transfer, this paper first analyses trust relationship be...

Journal: :IEICE Transactions 2011
David G. Rosado Eduardo Fernández-Medina Javier López

The systematic processes exactly define the development cycle and help the development team follow the same development strategies and techniques, thus allowing a continuous improvement in the quality of the developed products. Likewise, it is important that the development process used integrates security aspects from the first stages at the same level as other functional and non-functional re...

Journal: :Applied sciences 2021

Nowadays, autonomous vehicles are incorporated into farms to facilitate manual labour. Being connected vehicles, as IoT systems, they susceptible cyber security attacks that try cause damage hardware, software or even living beings. Therefore, it is important provide sufficient mechanisms protect both the communications and data, mitigating any possible risk harm farmers, livestock crops. Techn...

2013
Jung Tae Kim

An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. Optimized security protocols and mechanisms are necessary for the high performance and security concerns. Finally, a challenge and requirement of adv...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید