نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mech...
Due to the development of information technology (IT), it has been applied to various fields such as the smart home, medicine, healthcare, and the smart car. For these fields, IT has been providing continuous prevention and management, including health conditions beyond the mere prevention of disease, improving the quality of life. e-Healthcare is a health management and medical service to prov...
Security has become an important requirement for HA systems. To address this, the SA Forum Security service (SEC) Specifications have been recently published [6]. This paper presents an use case of using SEC to enforce and improve the security of a GGSN node. The goal of the paper is not a detailed study of security in GGSN applications but rather show through a simple use case the place of SEC...
The growing demand for mobile Internet, and the increasing number of connected devices, has required significant advancements in radio technology and networks compared to the previous generations of mobile telecommunication. Security however has only seen incremental changes to the previous mobile telecommunication generation, with enhancements that mitigate new threats and address revealed wea...
This article presents a security architecture suitable for implementation of the security services and mechanisms selected by the security policies defined by the ACTS TRUMPET project for an appropriate protection of the external interfaces of TMNs. These security policies define the protection measures to use for communication in the inter-domain management case. These measures need to be impl...
In this paper, we investigate the tunable privacy features provided by Internet Explorer version 6 (IE6), Mix Net and Crowds, by using a conceptual model for tunable security services. A tunable security service is defined as a service that has been explicitly designed to offer various security configurations that can be selected at run-time. Normally, Mix Net and Crowds are considered to be st...
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and retrieving security information is illustrated. We describe a security model for tasks, which incorporates the ideas of variant security services invoked by the task, dynamic network modes, abstract security level choice...
This paper addresses the design of the DOK security service allowing the enforcement of both local and federated policies. The former are those policies which relate to local databases, whereas the latter speci es the aggregation rules that govern the access to data aggregates which reside in di erent databases. In this paper we describe the component of the DOK security service which enforces ...
Cloud computing technologyhas opened an avenue tomeet the critical need to securely share distributedresourcesandwebservices,andespeciallythosethatbelongtoclientswhohavesensitive dataandapplications.However,implementingcrosscuttingconcernsforcloud-basedapplicationsis achallenge.ThischallengestemsfromthenatureofdistributedWeb-basedtechnologyar...
With the evolution of IoT embedded devices and their broad application, security has become crucial. Security comes at a cost to these limited devices in terms of energy. However, evaluating security cost is not straightforward, as there are many factors involved, such as the employed security services and type of hardware. This research studies the impact of duty cycle protocols on security co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید