نتایج جستجو برای: heterogeneous security complex

تعداد نتایج: 1059368  

2004
Harikrishna Vasanta Yiu Shing Terry Tin Colin Boyd Mark Looi Juan Manuel González Nieto

A heterogeneous location network is one that derives location information from multiple sources and provides various location based services to users irrespective of the device used. User privacy is an important issue that needs to be addressed for the growth of heterogeneous location networks. We propose a secure framework for assuring user privacy in heterogeneous location networks. We also p...

1999
Cynthia Irvine Timothy Levin Robert C. Chaplin R Elster Neil Rowe

A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a ...

2010
Shamal Faily Ivan Flechais

There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security literature and in empirical data from an e-Science project. From this model, we present five concepts, which have differing effects on security cu...

2015
Apala Ray Johan Åkerberg Mats Björkman Mikael Gidlund

Industrial plants are heterogeneous networks with different computation and communication capabilities along with different security properties. The optimal operation of a plant requires a balance between communication capabilities and security features. A secure communication data flow with high latency and low bandwidth does not provide the required efficiency in a plant. Therefore, we focus ...

2016

Internet of Things (IoT) is a network of physical objects connected to internet. Physical objects embedded with RFID, sensor and so on which allows object to communicate with each other. The physical objects are provided with unique identifier. Since the IoT is highly heterogeneous, security is a big challenge in IoT. In this paper we analyzed the various security requirements and challenges in...

Journal: :Inf. Sec. Techn. Report 2004
Heiko Knospe Hartmut Pohl

Radio Frequency Identification (RFID) systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats ...

2008
Geon-Woo Kim Jong-Wook Han

As home network is expanding into ubiquitous computing environment and a variety of services are realized, requirements and interests on security for smart home network are increasing. In order to make home network safe and stable, some security technologies including authentication, authorization, and security policy technology are needed. So, in this paper, we propose a light-weight access co...

2001
Jalal Al-Muhtadi Wu-chun Feng Mike Fisk

Virtual supercomputing, (i.e., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, s...

1994
Steve J. Chapin Eugene H. Spafford

The messiahs project is investigating the construction of a set of mechanisms to support task placement in autonomous, heterogeneous, distributed systems. In this paper we explore aspects of the messiahs system that support security in distributed systems. In particular, we will concentrate on aspects of messiahs that defeat denial of service attacks, provide firewalls, protect private system d...

2010
Ruan He

Advances in pervasive system are rapidly taking us to a novel frontier in security, revealing a whole new landscape of threats. In open and dynamic environments, malicious terminals may enter a network without being detected, and various malwares may invisibly install themselves on a device. While roaming between heterogeneous networks which are adjusted for their own protection requirements, a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید