339,420 research outputs found

    Considering security and quality of service in SLS to improve policy-based management of multimedia services

    Full text link
    This paper proposes to improve policy-based management by integrating security parameters into the Service Level Specification (SLS). Integrating those parameters in the QoS part of the Service Level Agreement (SLA) specification is of particular importance for multimedia services requiring security since QoS is negotiated when the multimedia service is deployed. Security mechanisms need to be negotiated at that time when sensible multimedia information is exchanged. In this paper we show that including security parameters in SLA specification improves the negotiation and deployment of security and QoS policies for multimedia services. The parameters this paper proposes to integrate have the advantage to be understandable by end-users and service providers. © 2007 IEEE

    Improving the SLA-based management of QoS for secure multimedia services

    Full text link
    This paper proposes to integrate security parameters into the Service Level Specification (SLS) template proposed in the Tequila project to improve SLA-based management of QoS [8], [21]. Integrating those parameters in the QoS part of the Service Level Agreement (SLA) specification is essential in particular for secure multimedia services since the QoS is negotiated when the multimedia service is deployed. Security mechanisms need to be negotiated at deployment time when sensible multimedia information is exchanged. In this paper we show that including security parameters in the SLA specification improves the SLA-based management of QoS and therefore the negotiation, deployment and use of the secure multimedia service. The parameters this paper proposes to integrate have the advantage to be understandable by both the end-users and service providers. © IFIP International Federation for Information Processing 2005

    Hybrid information security system via combination of compression, cryptography, and image steganography

    Get PDF
    Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet

    Identifying the Effect of Data Breach Publicity on Information Security Awareness using Hierarchical Regression

    Get PDF
    © 2021 IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/The technological evolution has formed new challenges for organizations to safeguard their information as digital assets. Information Security Awareness (ISA) is the cognitive state where individuals comprehend information security, threats, and the capability to develop preventive strategies. Prior studies discovered that human mistakes or misbehavior is the most vulnerable link in information security due to insufficient security awareness. There were massive data breaches reported throughout the years globally. Literature shows that individuals will develop their evaluations of risks and sense of security awareness when receiving security risk information such as data breach incidents. These indications motivated us to examine the effect of an unexplored factor, that is, data breach publicity (DBR) on ISA. The purpose of this research is to discover if DBR significantly improves a model's ability to predict ISA and its magnitude in influencing ISA. A 3-stage hierarchical linear regression approach was used to build up the model with prior known influential factors to predict ISA. To the extent of our knowledge, there is no study reported to date regarding the implication of DBR on ISA. Our main findings reveal that DBR significantly explains 6.7% of ISA and achieves the highest coefficient comparing with prior known factors. Our research contributes to a novel discovery of a new factor that significantly influences ISA and its magnitude in increasing ISA. This discovery implies the need to incorporate the knowledge of data breach incidents into ISA-related educative programs or strategies to increase ISA.Peer reviewe

    AES 128 Feasibility at Dr.Mintoharjo for National Defense

    Get PDF
    Abstract—The research project creates a standard for applying the Advanced Encryption Standard (AES) 128 to the Dr. Mintoharjo Hospital database. Beginning with a hacking incident on the Health Social Security Administering Body (BPJS) website bpjs-kesehatan.go.id, which is expected to occur around the end of May 2021 and resulted in the leak and sale of data belonging to 279 million Indonesians on Raid Forums this demonstrates a vulnerabilities in national cyber protection, the author proposes a new storage method for the information technology division that is safer than traditional storage techniques. MYSQL uses the Advanced Encryption Standard (AES) 128 technique defined here. When the Dr. Mintoharjo Hospital management information system was built in MYSQL, security levels were assessed using Advanced Encryption Standard (AES) 128 encryption technology. The experimental results of this study show enhanced safety results from an efficiency aspect. The study's conclusion shows that the storage method studied improves the security system, hence it is strongly recommended that it be adopted at Dr. Mintoharjo

    Financial Expertise as an Arms Race

    Get PDF
    We show that firms intermediating trade have incentives to overinvest in financial expertise. In our model, expertise improves firms’ ability to estimate value when trading a security. Expertise creates asymmetric information, which, under normal circumstances, works to the advantage of the expert as it deters opportunistic bargaining by counterparties. This advantage is neutralized in equilibrium, however, by offsetting investments by competitors. Moreover, when volatility rises the adverse selection created by expertise triggers breakdowns in liquidity, destroying gains to trade and thus the benefits that firms hope to gain through high levels of expertise
    • …
    corecore