نتایج جستجو برای: heterogeneous security complex
تعداد نتایج: 1059368 فیلتر نتایج به سال:
A heterogeneous location network is one that derives location information from multiple sources and provides various location based services to users irrespective of the device used. User privacy is an important issue that needs to be addressed for the growth of heterogeneous location networks. We propose a secure framework for assuring user privacy in heterogeneous location networks. We also p...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a ...
There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security literature and in empirical data from an e-Science project. From this model, we present five concepts, which have differing effects on security cu...
Industrial plants are heterogeneous networks with different computation and communication capabilities along with different security properties. The optimal operation of a plant requires a balance between communication capabilities and security features. A secure communication data flow with high latency and low bandwidth does not provide the required efficiency in a plant. Therefore, we focus ...
Internet of Things (IoT) is a network of physical objects connected to internet. Physical objects embedded with RFID, sensor and so on which allows object to communicate with each other. The physical objects are provided with unique identifier. Since the IoT is highly heterogeneous, security is a big challenge in IoT. In this paper we analyzed the various security requirements and challenges in...
Radio Frequency Identification (RFID) systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats ...
As home network is expanding into ubiquitous computing environment and a variety of services are realized, requirements and interests on security for smart home network are increasing. In order to make home network safe and stable, some security technologies including authentication, authorization, and security policy technology are needed. So, in this paper, we propose a light-weight access co...
Virtual supercomputing, (i.e., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, s...
The messiahs project is investigating the construction of a set of mechanisms to support task placement in autonomous, heterogeneous, distributed systems. In this paper we explore aspects of the messiahs system that support security in distributed systems. In particular, we will concentrate on aspects of messiahs that defeat denial of service attacks, provide firewalls, protect private system d...
Advances in pervasive system are rapidly taking us to a novel frontier in security, revealing a whole new landscape of threats. In open and dynamic environments, malicious terminals may enter a network without being detected, and various malwares may invisibly install themselves on a device. While roaming between heterogeneous networks which are adjusted for their own protection requirements, a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید