نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

Journal: :J. Sensor and Actuator Networks 2014
Htoo Aung Maw Hannan Xiao Bruce Christianson James A. Malcolm

Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mech...

Journal: :Symmetry 2016
Jungho Kang Hague Chung Jeong Kyu Lee Jong Hyuk Park

Due to the development of information technology (IT), it has been applied to various fields such as the smart home, medicine, healthcare, and the smart car. For these fields, IT has been providing continuous prevention and management, including health conditions beyond the mere prevention of disease, improving the quality of life. e-Healthcare is a health management and medical service to prov...

2008
M. Pourzandi

Security has become an important requirement for HA systems. To address this, the SA Forum Security service (SEC) Specifications have been recently published [6]. This paper presents an use case of using SEC to enforce and improve the security of a GGSN node. The goal of the paper is not a detailed study of security in GGSN applications but rather show through a simple use case the place of SEC...

2016
Martin Svensson Nicolae Paladi Rosario Giustolisi

The growing demand for mobile Internet, and the increasing number of connected devices, has required significant advancements in radio technology and networks compared to the previous generations of mobile telecommunication. Security however has only seen incremental changes to the previous mobile telecommunication generation, with enhancements that mitigate new threats and address revealed wea...

1997
François Gagnon Dominique Maillot Jon Ølnes Lars Hofseth Lionel Sacks

This article presents a security architecture suitable for implementation of the security services and mechanisms selected by the security policies defined by the ACTS TRUMPET project for an appropriate protection of the external interfaces of TMNs. These security policies define the protection measures to use for communication in the inter-domain management case. These measures need to be impl...

2007
Reine Lundin Stefan Lindskog Anna Brunstrom

In this paper, we investigate the tunable privacy features provided by Internet Explorer version 6 (IE6), Mix Net and Crowds, by using a conceptual model for tunable security services. A tunable security service is defined as a service that has been explicitly designed to offer various security configurations that can be selected at run-time. Normally, Mix Net and Crowds are considered to be st...

2000
E. Spyropoulou Timothy E. Levin Cynthia E. Irvine

This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and retrieving security information is illustrated. We describe a security model for tasks, which incorporates the ideas of variant security services invoked by the task, dynamic network modes, abstract security level choice...

1996
Zahir Tari

This paper addresses the design of the DOK security service allowing the enforcement of both local and federated policies. The former are those policies which relate to local databases, whereas the latter speci es the aggregation rules that govern the access to data aggregates which reside in di erent databases. In this paper we describe the component of the DOK security service which enforces ...

Journal: :Int. J. Web Service Res. 2018
Anas M. R. Alsobeh Aws Abed Al Raheem Magableh Emad Alsukhni

Cloud computing technologyhas opened an avenue tomeet the critical need to securely share distributedresourcesandwebservices,andespeciallythosethatbelongtoclientswhohavesensitive dataandapplications.However,implementingcrosscuttingconcernsforcloud-basedapplicationsis achallenge.ThischallengestemsfromthenatureofdistributedWeb-basedtechnologyar...

2018
Sultan Alharby Jeff Reeve Alex Weddell Nick Harris

With the evolution of IoT embedded devices and their broad application, security has become crucial. Security comes at a cost to these limited devices in terms of energy. However, evaluating security cost is not straightforward, as there are many factors involved, such as the employed security services and type of hardware. This research studies the impact of duty cycle protocols on security co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید