|Total results: 1,426||
|Architectures and Protocols for Secure Information Technology Infrastructures
Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez-Garcia.
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers.
Architectures and Protocols for Secure...
Network Security Technologies: Design and Applications
Abdelmalek Amine, Otmane Ait Mohamed, Boualem Benatallah.
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels....
Analyzing Security, Trust, and Crime in the Digital World
Hamid R. Nemati.
In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations.
Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual...
Security and Privacy Issues in Cloud Computing
Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during...
Towards a Certified Electronic Mail System
Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber.
Most of the existent certified electronic mail proposals (found in scientific papers) have been designed without considering their deployment into traditional e-mail infrastructure (e.g., Internet mail system). In fact, there is not any implementation used for commercial purposes of those proposals. On...
Mobile IPv6: Mobility Management and Security Aspects
Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel.
Mobile Internet Protocol (MIP) enables a mobile node to be recognized via a single IP address while the node moves between different networks. MIP attains the connectivity to nodes everywhere without user intervention. One general improvement in Mobile IPv6 (MIPv6) compared to MIPv4 is the enhanced...
A New Encryption Algorithm based on Chaotic Map for Wireless Sensor Network
Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet.
A new and secure chaos-based block cipher for image encryption in wireless sensor networks is proposed. The security analysis and the performances of the proposed algorithm have been investigated. The statistical analysis includes the histograms and correlation coefficients of adjacent pixels. In the...
A Polling Booth-Based Electronic Voting Scheme
Md. Abdul Based.
A Polling booth-based Electronic Voting Scheme (PEVS) is presented in this chapter. The scheme allows only eligible voters to cast their ballots inside polling booths, and the ballots cast by the eligible voters are inalterable and non-reusable. The scheme provides vote-privacy and receipt-freeness....
Challenges and Solutions for DNS Security in IPv6
Hosnieh Rafiee, Martin von Löwis, Christoph Meinel.
The Domain Name System (DNS) is a necessary component of the Internet that allows hosts on the Internet to communicate with other hosts without needing to know their cryptic IP addresses. When this protocol was first introduced it did not contain robust security features because scalability was an...
Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges
Vít Bukac, Vashek Matyáš.
In this chapter, the reader explores both the founding ideas and the state-of-the-art research on host-based intrusion detection systems. HIDSs are categorized by their intrusion detection method. Each category is thoroughly investigated, and its limitations and benefits are discussed. Seminal research...
A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management
Alexandre B. Augusto, Manuel E. Correia.
The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even...
The Austrian Identity Ecosystem: An E-Government Experience
Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer.
Architectures and protocols for secure information technology are crucial to satisfy security requirements of current e-government solutions. Identity plays a central role in most e-government solutions, as users typically need to be reliably identified and authenticated. User identification and...
Securing XML with Role-Based Access Control: Case Study in Health Care
Alberto De la Rosa Algarín, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sánchez, Robert Kuykendall.
Today’s applications are often constructed by bringing together functionality from multiple systems that utilize varied technologies (e.g. application programming interfaces, Web services, cloud computing, data mining) and alternative standards (e.g. XML, RDF, OWL, JSON, etc.) for communication. Most...
Advances in Secure Computing, Internet Services, and Applications
B.K. Tripathy, D.P. Acharjya.
Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems.
Advances in Secure Computing...
Multi-Granular Computing through Rough Sets
B. K. Tripathy.
Granular Computing has emerged as a framework in which information granules are represented and manipulated by intelligent systems. Granular Computing forms a unified conceptual and computing platform. Rough set theory put forth by Pawlak is based upon single equivalence relation taken at a time....
Pattern Recognition and Robotics
During the last few decades, there has been a considerable growth of interest in pattern recognition in the field of robotics. An application of pattern recognition in robotics includes mobile robots and service robots. Visual and signal recognition of patterns enables the robots to perform a variety...
Privacy Preservation in Information System
D. P. Acharjya, Geetha Mary A.
The information technology revolution has brought drastic change in the way data is collected or generated for decision mining. The accumulated data has no relevance unless it provides certain useful information pertaining to the interest of an organization. The real challenge lies in converting high...
Predictive Analytics and Data Mining: A Framework for Optimizing Decisions with R Tool
Ritu Chauhan, Harleen Kaur.
High dimensional databases are proving to be a major concern among the researches to extract relevant information for futuristic decision making. Real world data is high dimensional in nature and comprises of irrelevant features, missing values, and redundancy, which requires serious concerns....
Characterizing Intelligent Intrusion Detection and Prevention Systems Using Data Mining
Mrutyunjaya Panda, Manas Ranjan Patra.
Intrusion Detection and Prevention Systems (IDPS) are being widely implemented to prevent suspicious threats in computer networks. Intrusion detection and prevention systems are security systems that are used to detect and prevent security threats to computer networks. In order to understand the...
The Role of Knowledge Management on Job Satisfaction: A Systematic Framework
This chapter introduces the framework and causal model of organizational culture, organizational learning, knowledge management, and job satisfaction. It argues that dimensions of organizational culture, organizational learning, and knowledge management have mediated positive effect on job...
Detection of Non-Technical Losses: The Project MIDAS
Juan I. Guerrero, Íñigo Monedero, Félix Biscarri, Jesús Biscarri, Rocío Millán, Carlos León.
The MIDAS project began in 2006 as collaboration between Endesa, Sadiel, and the University of Seville. The objective of the MIDAS project is the detection of Non-Technical Losses (NTLs) on power utilities. The NTLs represent the non-billed energy due to faults or illegal manipulations in clients’...