Results 31 to 40 of about 6,779,765 (359)
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations." The dynamic and multi-institutional nature of these environments introduces challenging security issues that demand new technical approaches.
Carl Kesselman+9 more
openaire +3 more sources
Assessing the security of VoIP Services [PDF]
VoIP networks are in a major deployment phase and are becoming widely spread out due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality.
Humberto Abdelnur+3 more
openalex +5 more sources
Secure sessions for web services [PDF]
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Ricardo Corin+3 more
openaire +5 more sources
Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern- and behavior-based statistical methods.
Chang Choi, Junho Choi
semanticscholar +1 more source
A Dynamic Composition Mechanism of Security Service Chaining Oriented to SDN/NFV-Enabled Networks
With the large-scale commercial application of data center networks, the security problem of data center network is attracting more and more attention.
Yicen Liu+3 more
semanticscholar +1 more source
Предлагается вариант решения задачи выбора пропускных способностей цифровых каналов связи транспортной сети, учитывающий разбалансировку трафика данных по приоритетам.
Sergej Jur'evich Andreev+2 more
doaj +1 more source
Secure OM2M Service Platform [PDF]
Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical fragmentation of current M2M markets and lacks of standards, the European Telecommunications Standards Institute (
Sicari, Sabrina+4 more
openaire +3 more sources
Исследование структурных свойств сети Интернет на основе метаграфовых моделей
При исследовании сети Интернет ее структуру разделяют на уровни: уровень автономных систем, уровень точек присутствия операторов связи, уровень оборудования и так далее.
Maxim Vladimirovich Ivanov+2 more
doaj +1 more source
Abstract : We examine the concept of security as a dimension of Quality of Service in distributed systems. Implicit to the concept of Quality of Service is the notion of choice or variation. Security services also offer a range of choice both from the user perspective and among the underlying resources.
Irvine, Cynthia E., Levin, Timothy E.
openaire +3 more sources
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Mobile-Edge Computing (MEC) is a novel and sustainable network architecture that enables energy conservation with cloud computing and network services offloading at the edge of mobile cellular networks.
Guanwen Li+6 more
semanticscholar +1 more source