5,831 research outputs found
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil
and military jobs. However, security is one of the significant challenges for
sensor network because of their deployment in open and unprotected environment.
As cryptographic mechanism is not enough to protect sensor network from
external attacks, intrusion detection system needs to be introduced. Though
intrusion prevention mechanism is one of the major and efficient methods
against attacks, but there might be some attacks for which prevention method is
not known. Besides preventing the system from some known attacks, intrusion
detection system gather necessary information related to attack technique and
help in the development of intrusion prevention system. In addition to
reviewing the present attacks available in wireless sensor network this paper
examines the current efforts to intrusion detection system against wireless
sensor network. In this paper we propose a hierarchical architectural design
based intrusion detection system that fits the current demands and restrictions
of wireless ad hoc sensor network. In this proposed intrusion detection system
architecture we followed clustering mechanism to build a four level
hierarchical network which enhances network scalability to large geographical
area and use both anomaly and misuse detection techniques for intrusion
detection. We introduce policy based detection mechanism as well as intrusion
response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap
with arXiv:1111.1933 by other author
JISC Preservation of Web Resources (PoWR) Handbook
Handbook of Web Preservation produced by the JISC-PoWR project which ran from April to November 2008.
The handbook specifically addresses digital preservation issues that are relevant to the UK HE/FE web management community”.
The project was undertaken jointly by UKOLN at the University of Bath and ULCC Digital Archives department
Memories for Life: A Review of the Science and Technology
This paper discusses scientific, social and technological aspects of memory. Recent developments in our understanding of memory processes and mechanisms, and their digital implementation, have placed the encoding, storage, management and retrieval of information at the forefront of several fields of research. At the same time, the divisions between the biological, physical and the digital worlds seem to be dissolving. Hence opportunities for interdisciplinary research into memory are being created, between the life sciences, social sciences and physical sciences. Such research may benefit from immediate application into information management technology as a testbed. The paper describes one initiative, Memories for Life, as a potential common problem space for the various interested disciplines
The ethics of forgetting in an age of pervasive computing
In this paper, we examine the potential of pervasive computing to create widespread
sousveillance, that will complement surveillance, through the development of lifelogs;
socio-spatial archives that document every action, every event, every
conversation, and every material expression of an individual’s life. Examining lifelog
projects and artistic critiques of sousveillance we detail the projected mechanics
of life-logging and explore their potential implications. We suggest, given that lifelogs
have the potential to convert exterior generated oligopticons to an interior
panopticon, that an ethics of forgetting needs to be developed and built into the
development of life-logging technologies. Rather than seeing forgetting as a
weakness or a fallibility we argue that it is an emancipatory process that will free
pervasive computing from burdensome and pernicious disciplinary effects
Analog Solutions: E-discovery Spoliation Sanctions and the Proposed Amendments to FRCP 37(e)
The ever-increasing importance of digital technology in today’s commercial environment has created several serious problems for courts operating under the Federal Rules of Civil Procedure’s (FRCP) discovery regime. As the volume of discoverable information has grown exponentially, so too have the opportunities for abuse and misinterpretation of the FRCP’s outdated e-discovery rules. Federal courts are divided over the criteria for imposing the most severe discovery sanctions as well as the practical ramifications of the preservation duty as applied to electronically stored information. As a result, litigants routinely feel pressured to overpreserve potentially discoverable data, often at great expense.
At a conference at the Duke University School of Law in 2010, experts from all sides of the civil-litigation system concluded that the e-discovery rules were in desperate need of updating. The subsequent four years saw a flurry of rulemaking efforts. In 2014, a package of proposed FRCP amendments included a complete overhaul of Rule 37(e), the provision governing spoliation sanctions for electronically stored information. This Note analyzes the proposed Rule and argues that the amendment will fail to accomplish the Advisory Committee’s goals because it focuses too heavily on preserving the trial court’s discretion in imposing sanctions and focuses too little on incentivizing efficient and cooperative pretrial discovery. The Note concludes by offering revisions and enforcement mechanisms that would allow the new Rule 37(e) to better address the e-discovery issues identified at the Duke Conference
Cloud technology options towards Free Flow of Data
This whitepaper collects the technology solutions that the projects in the Data Protection, Security and Privacy Cluster propose to address the challenges raised by the working areas of the Free Flow of Data initiative. The document describes the technologies, methodologies, models, and tools researched and developed by the clustered projects mapped to the ten areas of work of the Free Flow of Data initiative. The aim is to facilitate the identification of the state-of-the-art of technology options towards solving the data security and privacy challenges posed by the Free Flow of Data initiative in Europe. The document gives reference to the Cluster, the individual projects and the technologies produced by them
Video Surveillance and the GDPR
Purpose – to present some recommendations that would help organizations to compliance
video surveillance under GDPR.
Design/methodology/approach – analysis and synthesis of scientific literature and legal
documents, generalization.
Finding – after analyzing the theoretical aspects of video surveillance compliance under GDPR,
there were introduced the main recommendations that would reduce the risk of GDPR noncompliance.
Research limitations/implications – The main limitation of this study is that the research is
based on scientific literature review.
Practical implications – the present research allows to identify the challenges of GDPR
implementation for video surveillance.
Originality/Value – On May 25, 2018, the General Data Protection Regulation or GDPR officially
took effect, requiring better protection of personal data across the EU region. In this regard, making
video surveillance GDPR compliant has become critical
Digital provenance - models, systems, and applications
Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this thesis, we propose a such a comprehensive provenance model and present an abstract schema of the model. ^ We further explore the secure provenance solutions for distributed systems, namely streaming data, wireless sensor networks (WSNs) and virtualized environments. We design a customizable file provenance system with an application to the provenance infrastructure for virtualized environments. The system supports automatic collection and management of file provenance metadata, characterized by our provenance model. Based on the proposed provenance framework, we devise a mechanism for detecting data exfiltration attack in a file system. We then move to the direction of secure provenance communication in streaming environment and propose two secure provenance schemes focusing on WSNs. The basic provenance scheme is extended in order to detect packet dropping adversaries on the data flow path over a period of time. We also consider the issue of attack recovery and present an extensive incident response and prevention system specifically designed for WSNs
- …