4 research outputs found

    Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

    Get PDF
    Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked Data, Social Network Data, etc. These data are scattered in different sources, which suppose a mix that respond to diverse philosophies, great diversity of structures, different denominations, etc. Its management faces great technological and methodological challenges: The discovery and selection of data, its extraction and final processing, preservation, visualization, access possibility, greater or lesser structuring, between other aspects, which allow showing a huge domain of study at the level of analysis and implementation in different knowledge domains. However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects

    Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review

    Get PDF
    Within scientific community, there is a certain consensus to define "Big Data" as a global set, through a complex integration that embraces several dimensions from using of research data, Open Data, Linked Data, Social Network Data, etc. These data are scattered in different sources, which suppose a mix that respond to diverse philosophies, great diversity of structures, different denominations, etc. Its management faces great technological and methodological challenges: The discovery and selection of data, its extraction and final processing, preservation, visualization, access possibility, greater or lesser structuring, between other aspects, that allow showing a huge domain of study at the level of analysis and implementation in different knowledge domains. However, given the data availability and its possible opening: What problems do the data opening face? This paper shows a literature review about these security aspects

    A Secured Service Level Negotiation In Ubiquitous Environments

    Get PDF
    International audienceThe goal of the ubiquitous connectivity is to enable mobile users to be permanently and transparently connected to the Internet. These mobile users are often connected via wireless networks like Wi-Fi or WiMax and consuming services that require a high Quality of Service (QoS) level such as video on demand or voice over IP. The wireless access to these services may make the concerned communications vulnerable to security attacks because of the open medium on which these access technologies are based. Hence, in ubiquitous environments, we need to guarantee both QoS and security for mobile users' communications. In such an environment, it becomes very difficult for service providers to satisfy these users' needs. A solution is to assign a profile to each user in order to optimize and automate the process of service level negotiation which enables guaranteeing QoS and security. In this paper, we present a protocol for service level negotiation which uses Web Services and includes both QoS and security in its negotiation. Then, we propose to adapt it to ubiquitous environments by basing its processing on the user profile and by specifying collaboration with the IEEE 802.21 standard, which manages the mobility of users and participates in the creation of theirs profiles. After that, we provide the negotiation flow of this protocol with security features using WSS, SSL and IPSec. Since, these security protocols may have an impact on the negotiation protocol performances; we will also evaluate this impact. Test results and implementation aspects are also shown in this paper
    corecore