3 research outputs found

    Anonymity and Confidentiality in Secure Distributed Simulation

    Full text link
    Research on data confidentiality, integrity and availability is gaining momentum in the ICT community, due to the intrinsically insecure nature of the Internet. While many distributed systems and services are now based on secure communication protocols to avoid eavesdropping and protect confidentiality, the techniques usually employed in distributed simulations do not consider these issues at all. This is probably due to the fact that many real-world simulators rely on monolithic, offline approaches and therefore the issues above do not apply. However, the complexity of the systems to be simulated, and the rise of distributed and cloud based simulation, now impose the adoption of secure simulation architectures. This paper presents a solution to ensure both anonymity and confidentiality in distributed simulations. A performance evaluation based on an anonymized distributed simulator is used for quantifying the performance penalty for being anonymous. The obtained results show that this is a viable solution.Comment: Proceedings of the IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT 2018

    e-Government security implications

    Get PDF
    The electronic government (eGovernment) is mainly concerned with providing quality services and value added information to citizens, and it has potentials to build better relationships between government and the public by making interactions between citizens and government agencies smoother, easier, and more efficient. The use of Internet medium has helped government organisations and nongovernment organisations to increase their productivity, reduce costs and also improve services. The most security implications in egovernment is the protection of the data security, whereby the privacy of the citizens are not guaranteed, because the access to the data are not controlled by authorised agents, and due to human interaction it is vulnerable to so many attacks. Hackers developed sneaky ways attacking the digital communicating system by phishing into the information systems. There are problems about security vulnerability in government websites, which has made the public to be extremely concerned, and third party routinely invade government websites for fraudulent purposes. Attitudes of people interrogating this system will go a long way by having a strong principle of sincerity and honesty so as to help rectifying the security issues and strict legislative rule cannot be undermined in dealing with offenders. This paper proposed a model of five blocks of steps to bring security in eGovernment systems

    SECURITY ISSUES IN HIGH LEVEL ARCHITECTURE BASED DISTRIBUTED SIMULATION

    No full text
    the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Distributed simulation introduces an information assurance challenge and details of a simulation must be guarded from unauthorized access. The High Level Architecture (HLA) and its Run-Time Interface (RTI) do not define support of mandatory access controls (MACs) or discretionary access controls (DACs) required to provide necessary protection levels. We review of some current MLS approaches for HLA/RTI simulations to illustrate the deficient Multi-Level Secure (MLS) components in HLA and present options for a secure HLA interface built at the network layer. An initial implementation of a proposed solution is presented. We discuss experimental results, limitation
    corecore