نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
This paper describes security failure-tolerant requirements, which tolerate the failures of security services that protect applications from security attacks. A security service, such as authentication, confidentiality or integrity security service, can be always broken down as advanced attack skills are coined. There is no security service that is forever secure. This paper describes an approa...
As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like “improving the” or “figuring out how to use the” future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Intern...
This research is supported by the U.S. Department of Defense Advanced Research Projects Agency under contract DABT63-97-C-0045. Abstract Many security mechanisms and protocols have been developed to handle security problems in various circumstances. This trend has created a heterogeneous security environment for today's global Internet. Although most of security functions and modules can be man...
Because of the features of pseudo randomness, noise-like behaviour, and the sensitivity of initial values and control parameters, chaotic mapping has widely been applied in the field of security telecommunication and video/image encryption. Additionally, in the past few decades the technology of chaotic mapping in security applications has made great progress, yet it has not become popular for ...
Executive Summary The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emerge...
This paper reports the findings of recent studies on the impact of intelligence in modern/future-oriented telecom networks. The ICT/ telecommunication market evolution and future trends are presented. Subsequently, the business opportunities are also discussed. The main drivers for the evolution as well as market success are mobility, security, and intelligence in the network. Though the global...
Web-based systems like enterprise and e-government portals pose special requirements to information security. Today’s portal platforms provide some security functionality, mainly targeting at supporting a single-sign-on for the underlying applications. We argue that singlesign-on is not sufficient, but rather a mature security service is needed as a central authorization instance. As access con...
OpenID has found its usage on the Internet for Web Single Sign-On. Simple Authentication and Security Layer (SASL) and the Generic Security Service Application Program Interface (GSS-API) are application frameworks to generalize authentication. This memo specifies a SASL and GSS-API mechanism for OpenID that allows the integration of existing OpenID Identity Providers with applications using SA...
Disaster management using mobile telecommunication networks provides a new and attractive possibility to save human lives in emergencies. With this contribution, we present a possible disaster management system based on mobile telecommunication. In order to use such a system in the real world, security requirements such as availability, accountability, integrity and confidentiality have to be e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید