Pub Date : 2020-10-12DOI: 10.1109/ISSE49799.2020.9272218
R. Broas
This research applies a systems thinking approach to better understand the complexity of upgrading modular systems through the incorporation of new technologies or innovations. Systems thinking concepts of stakeholder, shaping forces, conceptigan, and systemigram analyses are employed to identify the critical factors involved in a modular system upgrade. The central role of the systems engineer in balancing various stakeholder interests is presented.
{"title":"An Application of Systems Thinking: Upgrading Modular Systems through the Incorporation of New Technologies or Innovations","authors":"R. Broas","doi":"10.1109/ISSE49799.2020.9272218","DOIUrl":"https://doi.org/10.1109/ISSE49799.2020.9272218","url":null,"abstract":"This research applies a systems thinking approach to better understand the complexity of upgrading modular systems through the incorporation of new technologies or innovations. Systems thinking concepts of stakeholder, shaping forces, conceptigan, and systemigram analyses are employed to identify the critical factors involved in a modular system upgrade. The central role of the systems engineer in balancing various stakeholder interests is presented.","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-01DOI: 10.1109/ISSE46696.2019.8984592
M. B. Mansour
Recently, a special type of edge computing, known as Mobile Edge Computing (MEC), has emerged to satisfy various demands of different user types with minimum latency and high mobility support. Whereas, vehicle users are still in need to have a similar technology that would help them to receive more efficient services. In this paper, we adopt an edge computing paradigm for vehicular users, known as Vehicular Edge Computing (VEC). Our proposed architecture, called "SCPP", is composed of multiple layers interconnected by a network infrastructure that is used for secure credential provisioning for vehicles. However, since Road Side Units (RSUs) are deployed in dense traffic areas due to their high cost of installation, it is an important issue to consider the scenario where there are no RSUs deployed especially in rural areas. Hence, in our architecture, we use cellular vehicles that are equipped with 5G technology which make them able to communicate directly with a 5G base station without the need of an access point such as a RSU. Also, we include in our architecture a novel VEC server in each 5G base station, known as 5G-based VEC, which is used for providing security services for vehicles at the edge of mobile network. Besides that, the proposed protocol adopts a novel way that uses base station-to-base station (BS-to-BS) communication to account for high mobility of vehicles and guarantee message delivery for vehicles. Finally, we discuss the different security services provided by our system to overcome most of the state-of-the-art attacks and also we evaluate our system performance.
{"title":"SCPP: Secure Credential Provisioning Protocol for Cellular Vehicles","authors":"M. B. Mansour","doi":"10.1109/ISSE46696.2019.8984592","DOIUrl":"https://doi.org/10.1109/ISSE46696.2019.8984592","url":null,"abstract":"Recently, a special type of edge computing, known as Mobile Edge Computing (MEC), has emerged to satisfy various demands of different user types with minimum latency and high mobility support. Whereas, vehicle users are still in need to have a similar technology that would help them to receive more efficient services. In this paper, we adopt an edge computing paradigm for vehicular users, known as Vehicular Edge Computing (VEC). Our proposed architecture, called \"SCPP\", is composed of multiple layers interconnected by a network infrastructure that is used for secure credential provisioning for vehicles. However, since Road Side Units (RSUs) are deployed in dense traffic areas due to their high cost of installation, it is an important issue to consider the scenario where there are no RSUs deployed especially in rural areas. Hence, in our architecture, we use cellular vehicles that are equipped with 5G technology which make them able to communicate directly with a 5G base station without the need of an access point such as a RSU. Also, we include in our architecture a novel VEC server in each 5G base station, known as 5G-based VEC, which is used for providing security services for vehicles at the edge of mobile network. Besides that, the proposed protocol adopts a novel way that uses base station-to-base station (BS-to-BS) communication to account for high mobility of vehicles and guarantee message delivery for vehicles. Finally, we discuss the different security services provided by our system to overcome most of the state-of-the-art attacks and also we evaluate our system performance.","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-08DOI: 10.1007/978-3-658-06708-3_9
S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier
{"title":"Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats","authors":"S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier","doi":"10.1007/978-3-658-06708-3_9","DOIUrl":"https://doi.org/10.1007/978-3-658-06708-3_9","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-01DOI: 10.1007/978-3-658-00333-3_30
C. Vishik, R. Lee, Fred Chong
{"title":"Building Technologies that Help Cyber-Defense: Hardware-enabled Trust","authors":"C. Vishik, R. Lee, Fred Chong","doi":"10.1007/978-3-658-00333-3_30","DOIUrl":"https://doi.org/10.1007/978-3-658-00333-3_30","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-09-01DOI: 10.1007/978-3-8348-9418-2_41
Michel Gaude
{"title":"Future Diffusion of PK1-Technology - A German Delphi Study","authors":"Michel Gaude","doi":"10.1007/978-3-8348-9418-2_41","DOIUrl":"https://doi.org/10.1007/978-3-8348-9418-2_41","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116070626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-8348-9283-6_8
J. L. Muñoz
{"title":"Information Security Industry: State of the Art","authors":"J. L. Muñoz","doi":"10.1007/978-3-8348-9283-6_8","DOIUrl":"https://doi.org/10.1007/978-3-8348-9283-6_8","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-8348-9195-2_20
Marc Sel, B. V. Rompay
{"title":"Identity and Access Control - Demonstrating Compliance","authors":"Marc Sel, B. V. Rompay","doi":"10.1007/978-3-8348-9195-2_20","DOIUrl":"https://doi.org/10.1007/978-3-8348-9195-2_20","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117259968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-8348-9418-2_30
Jon Ølnes, Anette Andresen, L. Buene, Olga Cerrato, Håvard Grindheim
{"title":"Making Digital Signatures Work across National Borders","authors":"Jon Ølnes, Anette Andresen, L. Buene, Olga Cerrato, Håvard Grindheim","doi":"10.1007/978-3-8348-9418-2_30","DOIUrl":"https://doi.org/10.1007/978-3-8348-9418-2_30","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}