3 research outputs found
Anonymity and Confidentiality in Secure Distributed Simulation
Research on data confidentiality, integrity and availability is gaining
momentum in the ICT community, due to the intrinsically insecure nature of the
Internet. While many distributed systems and services are now based on secure
communication protocols to avoid eavesdropping and protect confidentiality, the
techniques usually employed in distributed simulations do not consider these
issues at all. This is probably due to the fact that many real-world simulators
rely on monolithic, offline approaches and therefore the issues above do not
apply. However, the complexity of the systems to be simulated, and the rise of
distributed and cloud based simulation, now impose the adoption of secure
simulation architectures. This paper presents a solution to ensure both
anonymity and confidentiality in distributed simulations. A performance
evaluation based on an anonymized distributed simulator is used for quantifying
the performance penalty for being anonymous. The obtained results show that
this is a viable solution.Comment: Proceedings of the IEEE/ACM International Symposium on Distributed
Simulation and Real Time Applications (DS-RT 2018
e-Government security implications
The electronic government (eGovernment)
is mainly concerned with providing quality
services and value added information to citizens, and it has potentials to build better relationships
between government and the public by making interactions between citizens and government agencies
smoother, easier, and more efficient. The use of Internet medium has helped government
organisations and nongovernment
organisations to increase their productivity, reduce costs and also
improve services. The most security implications in egovernment
is the protection of the data
security, whereby the privacy of the citizens are not guaranteed, because the access to the data are not
controlled by authorised agents, and due to human interaction it is vulnerable to so many attacks.
Hackers developed sneaky ways attacking the digital communicating system by phishing into the
information systems. There are problems about security vulnerability in government websites, which
has made the public to be extremely concerned, and third party routinely invade government websites
for fraudulent purposes. Attitudes of people interrogating this system will go a long way by having a
strong principle of sincerity and honesty so as to help rectifying the security issues and strict
legislative rule cannot be undermined in dealing with offenders. This paper proposed a model of five
blocks of steps to bring security in eGovernment
systems
SECURITY ISSUES IN HIGH LEVEL ARCHITECTURE BASED DISTRIBUTED SIMULATION
the past several years, emphasized the need to employ simulation based acquisition (SBA) in engineering and development. Distributed simulation introduces an information assurance challenge and details of a simulation must be guarded from unauthorized access. The High Level Architecture (HLA) and its Run-Time Interface (RTI) do not define support of mandatory access controls (MACs) or discretionary access controls (DACs) required to provide necessary protection levels. We review of some current MLS approaches for HLA/RTI simulations to illustrate the deficient Multi-Level Secure (MLS) components in HLA and present options for a secure HLA interface built at the network layer. An initial implementation of a proposed solution is presented. We discuss experimental results, limitation