8,430 research outputs found

    Secure Recording of Itineraries Through Cooperating Agents

    Get PDF
    Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and operations on mutually supporting agents which migrate in disjunct host domains. In order to attack agents, hosts must form coalitions. Proper selection of itineraries can minimize the risk of such coalitions being formed

    Australian commercial-critical infrastructure management protection

    Full text link
    Secure management of Australia\u27s commercial critical infrastructure presents ongoing challenges to owners and the government. Although managed via a high-level information sharing collaboration of government and business, critical infrastructure protection is further complicated by the lack of a lower-level scalable model exhibiting its various levels, sectors and sub-sectors. This research builds on the work of Marasea (2003) to establish a descriptive critical infrastructure model and also considers the influence and proposed modelling of critical infrastructure dependency inter-relationships.<br /

    Security models for trusting network appliances

    Get PDF
    A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Can mobile eco-systems for technical innovations be standardized? The case of mobile wallets and contactless communication

    Get PDF
    This paper puts focus on the application of Near Field Communication technology (NFC) to mobile payments. Uncertainties about global policies open for a variety of local business policies. Taking into account different representations of actor interaction as described by different eco-systems by different policy forums the main research question to be discussed in the paper is: Can policies or standards describing actor roles and responsibilities for technical innovations like mobile payments remove obstacles for introduction of the innovation? Different types of industry forums are not only involved in strictly technical matters but also discuss and describe visions about how a new technique might be applied in business life. They suggest different business architectures, (not only a technical architecture), where roles of different type of actors and relations between actors are outlined based on ideas about so called eco-systems. Against this background the paper first discusses how NFC enabled mobile payments currently attracts a lot of attention and identifies four possible development paths making it happen. The paper discusses and compares how global policy networks describe the technical and business architectures for mobile payments. The paper uses a business practice analytical framework and an industrial network framework to identify major problems in connecting global and local policies. Some comments on further research finalize the paper. --Near Field Communication,mobile payments,global policy,business architecture,policy forum,industrial networks,practice

    Threats and countermeasures for network security

    Get PDF
    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented

    Information technology networked system for student mobility support

    Get PDF
    Purpose - This paper presents an IT system - Student Connectivity Module (SCM) - designed for support of administration of student exchange between universities in different countries, developed under the EU 7th Framework Programme. This paper aims to share the acquired knowledge on existing difficulties in mobility management, propose solutions to those problems, and present results of system validation using its prototype deployed at two universities. Design/methodology/approach - Prior to the system design, the needs, plans and expectations concerning the academic IT services were surveyed among 100 universities. On this basis, in close with prospective system users, an original peer-to-peer system was developed using top-down model-driven and agile software development techniques. Findings - The barriers to effective interoperation of academic information systems were revealed: 1) diversity and heterogeneity of campus IT solutions, 2) differences in patterns of international student mobility flow, 3) diversity in national personal data protection policies, 4) lack of standards for e-data exchange. The SCM system overcomes these problems by adopting platform-independent IT solutions, Web-Services, a network of trusted authority servers, and a novel “quasi-standard” solution for e-data exchange, with the use of home university campus cards to access facilities at host institutions. Originality - The management of foreign student exchange is a complicated process. It involves students, faculty, administrative staff and external institutions. To our knowledge, there is no other comprehensive networked IT system available to facilitate administration of student mobility, make it better controlled, less laborious and faster, in a secure way. Our IT solution contributes to overcoming the current barriers to academic mobility within Europe and elsewhere

    Secure and Private Cloud Storage Systems with Random Linear Fountain Codes

    Full text link
    An information theoretic approach to security and privacy called Secure And Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to distributed data storage systems. In this approach, random combinations of all contents are stored across the network. Our coding approach is based on Random Linear Fountain (RLF) codes. To retrieve a content, a group of servers collaborate with each other to form a Reconstruction Group (RG). SAPIR achieves asymptotic perfect secrecy if at least one of the servers within an RG is not compromised. Further, a Private Information Retrieval (PIR) scheme based on random queries is proposed. The PIR approach ensures the users privately download their desired contents without the servers knowing about the requested contents indices. The proposed scheme is adaptive and can provide privacy against a significant number of colluding servers.Comment: 8 pages, 2 figure
    • 

    corecore