581,345 research outputs found
Embedded Trusted Monitoring and Management Modules for Smart Solar Panels
This paper investigates developing a prototype of smart solar panels. This architecture consists of a panel monitoring module and the central management unit. The monitoring module is to be embedded inside each PV panel making it secure to transfer the trusted data via Wi-Fi to the central Management unit (which can accommodate an array of PV panels in an installation). This module is required for data storage and provides the ability to upload secure data to the cloud. This platform presents the ability to securely manage large numbers of rooftop solar panels in a distributed ledger by implementing block chain algorithm. For achieving this purpose, Module 400 is envisaged to be turned into a Blockchain node as it provides the infrastructure to implement this technology
Survey on security issues in file management in cloud computing environment
Cloud computing has pervaded through every aspect of Information technology
in past decade. It has become easier to process plethora of data, generated by
various devices in real time, with the advent of cloud networks. The privacy of
users data is maintained by data centers around the world and hence it has
become feasible to operate on that data from lightweight portable devices. But
with ease of processing comes the security aspect of the data. One such
security aspect is secure file transfer either internally within cloud or
externally from one cloud network to another. File management is central to
cloud computing and it is paramount to address the security concerns which
arise out of it. This survey paper aims to elucidate the various protocols
which can be used for secure file transfer and analyze the ramifications of
using each protocol.Comment: 5 pages, 1 tabl
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Cloud computing is significantly reshaping the computing industry built
around core concepts such as virtualization, processing power, connectivity and
elasticity to store and share IT resources via a broad network. It has emerged
as the key technology that unleashes the potency of Big Data, Internet of
Things, Mobile and Web Applications, and other related technologies, but it
also comes with its challenges - such as governance, security, and privacy.
This paper is focused on the security and privacy challenges of cloud computing
with specific reference to user authentication and access management for cloud
SaaS applications. The suggested model uses a framework that harnesses the
stateless and secure nature of JWT for client authentication and session
management. Furthermore, authorized access to protected cloud SaaS resources
have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component
and a Policy Activity Monitor (PAM) component have been introduced. In
addition, other subcomponents such as a Policy Validation Unit (PVU) and a
Policy Proxy DB (PPDB) have also been established for optimized service
delivery. A theoretical analysis of the proposed model portrays a system that
is secure, lightweight and highly scalable for improved cloud resource security
and management.Comment: 6 Page
Achieving Secure and Transparent Supply Chains With Blockchain Technology
The advent of Industry 5.0 has introduced unprecedented challenges for organizations in maintaining the effectiveness, transparency, and security of their operations, leading to disruptions in supply chain management. The traditional methods of managing transactions and data sharing in supply chain networks are proving inadequate in the face of these complexities. The need for a comprehensive solution that addresses these issues has become critical.
In response, editors Mustafa Khan, Naveed R. Khan, and Arsalan Ghouri present Achieving Secure and Transparent Supply Chains With Blockchain Technology, a groundbreaking edited collection that offers a compelling solution. This book provides a thorough overview of blockchain technology and its potential to enhance supply chain efficiency, security, and resilience. By leveraging its decentralized and secure platform, blockchain emerges as a game-changing technology that can transform supply chain management.
By delving into contemporary theoretical frameworks and the latest empirical findings, this book equips academics, practitioners, policymakers, researchers, professionals, and students with the necessary knowledge and understanding to harness the power of blockchain technology for supply chain management. From exploring the applications of blockchain in traceability and resilience to examining its impact on sustainability and ethical sourcing, this book covers a wide range of topics critical to achieving secure and transparent supply chains
Next-Generation EU DataGrid Data Management Services
We describe the architecture and initial implementation of the
next-generation of Grid Data Management Middleware in the EU DataGrid (EDG)
project.
The new architecture stems out of our experience and the users requirements
gathered during the two years of running our initial set of Grid Data
Management Services. All of our new services are based on the Web Service
technology paradigm, very much in line with the emerging Open Grid Services
Architecture (OGSA). We have modularized our components and invested a great
amount of effort towards a secure, extensible and robust service, starting from
the design but also using a streamlined build and testing framework.
Our service components are: Replica Location Service, Replica Metadata
Service, Replica Optimization Service, Replica Subscription and high-level
replica management. The service security infrastructure is fully GSI-enabled,
hence compatible with the existing Globus Toolkit 2-based services; moreover,
it allows for fine-grained authorization mechanisms that can be adjusted
depending on the service semantics.Comment: Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla,Ca, USA, March 2003 8 pages, LaTeX, the file contains all
LaTeX sources - figures are in the directory "figures
SECURE CONTENT MANAGEMENT & MONITORING
The Secure Content Management & Monitoring solution is a robust and efficient information
security software solution developed for document distribution oversight and governance. This
solution is on the cutting edge of security monitoring technology in the information security
industry by leveraging key innovation such Document Capture, Security, Big Data Analytics and
customer DLP integration. It’s the first product to provide capture, archive, and audit capabilities
of device activities such as print, scan, fax, copy, and send jobs.
The Secure Content Management & Monitoring solution deters intentional or unintentional data
leaks of important and valuable information processed through MFP or printing devices. If such
data leakage does occur, crucial information such as who, what, when, and where this event
occurred as well as key words within the data can be quickly retrieved and appropriate personnel
notified
Practice Safe Science: Five reasons to protect your scientific data
Research data management is quickly becoming one of the most pressing issues facing the scientific community, not just for university management teams, but for every individual researcher. The tech company Digital Science produced an infographic that captures five reasons why more attention is needed to attain a more secure system. Nathan Westgarth elaborates on the points presented and on how the research process can be made more efficient through the better use of technology
- …