نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2005
SEUNG YI Albert Harris Luiz Magalhaes Cigdem Sengul Yaling Yang

Newly emerging ad hoc networking technology has enormous potential benefit for many missioncritical applications. However, providing adequate security required for the target applications presents many new challenges due to the unique nature of ad hoc environments. Complete decentralization and the absence of any support infrastructure in ad hoc environments effectively eliminates the possibili...

Journal: :Security and Communication Networks 2015
Sang-Ho Na Eui-nam Huh

An underlying cloud computing feature, outsourcing of resources, makes the service-level agreement (SLA) a critical factor for quality of service (QoS), and many researchers have addressed the question of how an SLA can be evaluated. Lately, security SLAs have also received much attention to guarantee security in a user perspective and provide optimal and efficient security service in the secur...

Journal: :Information & Management 2005
Min-Hua Shao Jing-Jang Hwang Soushan Wu

Dispute resolution, a necessary function in electronic commerce, must rely on evidence that includes mechanisms to ensure non-repudiation of actions by the participants. In open systems comprising computer networks, this ‘‘non-repudiation service’’ is one type of security service defined in the ISO/IEC standards. These, as well as other literature, have defined a system framework for such a ser...

2015
Andreas Fischer Thomas Kittel Bojan Kolosnjaji Tamas K. Lengyel Waseem Mandarawi Hermann de Meer Tilo Müller Mykola Protsenko Hans P. Reiser Benjamin Taubmann Eva Weishäupl

Due to the proliferation of cloud computing, cloud-based systems are becoming an increasingly attractive target for malware. In an Infrastructure-as-a-Service (IaaS) cloud, malware located in a customer’s virtual machine (VM) affects not only this customer, but may also attack the cloud infrastructure and other co-hosted customers directly. This paper presents CloudIDEA, an architecture that pr...

2012
Ruo Hu

Providing stable compositions of Wireless Sensor Network Service (WSNS) is a challenging issue since the data stream architect often has only a limited control over the stability of the composed services. The architect can instead achieve stability by properly planning the data stream architecture. In this paper, we propose a formal approach which allows a data stream architect to perform stabi...

Journal: :Computers and Artificial Intelligence 2005
Zhengyou Xia Jian Wang Yichuan Jiang

With future network equipment the security service becomes a critical and serious problem. Especially in the network, users do not want to expose their message to others or to be forged by others. They make extensive use of cryptography and integrity algorithms to achieve security. The sender can achieve the high quality of security service (high security level), only if the receivers and route...

Journal: :Electronic Commerce Research and Applications 2004
Jose Antonio Onieva Jianying Zhou Javier López Mildrey Carbonell Castro

Non-repudiation is a security service that provides cryptographic evidence to support the settlement of disputes in electronic commerce. In commercial transactions, an intermediary (or agent) might be involved to help transacting parties to conduct their business. Nevertheless, such an intermediary may not be fully trusted. In this paper, we propose agent-mediated non-repudiation protocols, and...

Journal: :Computer Networks 2017
Madhusanka Liyanage An Braeken Anca Delia Jurcut Mika Ylianttila Andrei V. Gurtov

A Software-Defined Mobile Network (SDMN) architecture is proposed to enhance the performance, flexibility, and scalability of today’s telecommunication networks. However, SDMN features such as centralized controlling, network programmability, and virtualization introduce new security challenges to telecommunication networks. In this article, we present security challenges related to SDMN commun...

2005
Seung Yi Albert F. Harris Robin Kravets

With the emergence of ad hoc networking technology came efforts to provide necessary security support for ad hoc networks. However, due to challenging characteristics of ad hoc environments, providing the same level of security as in wired networks is often very difficult if not impossible. A more viable way to approach this challenge is to maximize the utility of the achievable security instea...

2015
S. Monikandan

Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs) by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید