首页 > 最新文献

Information Security Solutions Europe最新文献

英文 中文
An Application of Systems Thinking: Upgrading Modular Systems through the Incorporation of New Technologies or Innovations 系统思维的应用:通过整合新技术或创新来升级模块化系统
Pub Date : 2020-10-12 DOI: 10.1109/ISSE49799.2020.9272218
R. Broas
This research applies a systems thinking approach to better understand the complexity of upgrading modular systems through the incorporation of new technologies or innovations. Systems thinking concepts of stakeholder, shaping forces, conceptigan, and systemigram analyses are employed to identify the critical factors involved in a modular system upgrade. The central role of the systems engineer in balancing various stakeholder interests is presented.
本研究采用系统思维方法,通过整合新技术或创新来更好地理解升级模块化系统的复杂性。系统思维概念的利益相关者,塑造力量,概念,和系统图分析被用来确定涉及到模块化系统升级的关键因素。提出了系统工程师在平衡各种利益相关者利益方面的核心作用。
{"title":"An Application of Systems Thinking: Upgrading Modular Systems through the Incorporation of New Technologies or Innovations","authors":"R. Broas","doi":"10.1109/ISSE49799.2020.9272218","DOIUrl":"https://doi.org/10.1109/ISSE49799.2020.9272218","url":null,"abstract":"This research applies a systems thinking approach to better understand the complexity of upgrading modular systems through the incorporation of new technologies or innovations. Systems thinking concepts of stakeholder, shaping forces, conceptigan, and systemigram analyses are employed to identify the critical factors involved in a modular system upgrade. The central role of the systems engineer in balancing various stakeholder interests is presented.","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SCPP: Secure Credential Provisioning Protocol for Cellular Vehicles 用于蜂窝车辆的安全凭证供应协议
Pub Date : 2019-10-01 DOI: 10.1109/ISSE46696.2019.8984592
M. B. Mansour
Recently, a special type of edge computing, known as Mobile Edge Computing (MEC), has emerged to satisfy various demands of different user types with minimum latency and high mobility support. Whereas, vehicle users are still in need to have a similar technology that would help them to receive more efficient services. In this paper, we adopt an edge computing paradigm for vehicular users, known as Vehicular Edge Computing (VEC). Our proposed architecture, called "SCPP", is composed of multiple layers interconnected by a network infrastructure that is used for secure credential provisioning for vehicles. However, since Road Side Units (RSUs) are deployed in dense traffic areas due to their high cost of installation, it is an important issue to consider the scenario where there are no RSUs deployed especially in rural areas. Hence, in our architecture, we use cellular vehicles that are equipped with 5G technology which make them able to communicate directly with a 5G base station without the need of an access point such as a RSU. Also, we include in our architecture a novel VEC server in each 5G base station, known as 5G-based VEC, which is used for providing security services for vehicles at the edge of mobile network. Besides that, the proposed protocol adopts a novel way that uses base station-to-base station (BS-to-BS) communication to account for high mobility of vehicles and guarantee message delivery for vehicles. Finally, we discuss the different security services provided by our system to overcome most of the state-of-the-art attacks and also we evaluate our system performance.
最近出现了一种特殊类型的边缘计算,即移动边缘计算(MEC),以最小的延迟和高移动性支持满足不同用户类型的各种需求。然而,车辆用户仍然需要类似的技术来帮助他们获得更有效的服务。在本文中,我们为车辆用户采用了一种边缘计算范式,称为车辆边缘计算(VEC)。我们提出的体系结构称为“SCPP”,由多个由网络基础设施连接的层组成,该网络基础设施用于为车辆提供安全凭证。然而,由于安装成本高,路旁装置(rsu)部署在交通密集的地区,因此考虑没有部署路旁装置的情况是一个重要问题,特别是在农村地区。因此,在我们的架构中,我们使用配备5G技术的蜂窝车辆,这使得它们能够直接与5G基站通信,而无需RSU等接入点。此外,在我们的架构中,每个5G基站都包含一个新颖的VEC服务器,称为基于5G的VEC,用于为移动网络边缘的车辆提供安全服务。此外,该协议采用基站对基站(BS-to-BS)通信的方式,兼顾了车辆的高移动性,保证了车辆的消息传递。最后,我们讨论了我们的系统提供的不同安全服务,以克服大多数最先进的攻击,并评估了我们的系统性能。
{"title":"SCPP: Secure Credential Provisioning Protocol for Cellular Vehicles","authors":"M. B. Mansour","doi":"10.1109/ISSE46696.2019.8984592","DOIUrl":"https://doi.org/10.1109/ISSE46696.2019.8984592","url":null,"abstract":"Recently, a special type of edge computing, known as Mobile Edge Computing (MEC), has emerged to satisfy various demands of different user types with minimum latency and high mobility support. Whereas, vehicle users are still in need to have a similar technology that would help them to receive more efficient services. In this paper, we adopt an edge computing paradigm for vehicular users, known as Vehicular Edge Computing (VEC). Our proposed architecture, called \"SCPP\", is composed of multiple layers interconnected by a network infrastructure that is used for secure credential provisioning for vehicles. However, since Road Side Units (RSUs) are deployed in dense traffic areas due to their high cost of installation, it is an important issue to consider the scenario where there are no RSUs deployed especially in rural areas. Hence, in our architecture, we use cellular vehicles that are equipped with 5G technology which make them able to communicate directly with a 5G base station without the need of an access point such as a RSU. Also, we include in our architecture a novel VEC server in each 5G base station, known as 5G-based VEC, which is used for providing security services for vehicles at the edge of mobile network. Besides that, the proposed protocol adopts a novel way that uses base station-to-base station (BS-to-BS) communication to account for high mobility of vehicles and guarantee message delivery for vehicles. Finally, we discuss the different security services provided by our system to overcome most of the state-of-the-art attacks and also we evaluate our system performance.","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats 隐藏与失控——论网络隐写威胁的出现
Pub Date : 2014-07-08 DOI: 10.1007/978-3-658-06708-3_9
S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier
{"title":"Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats","authors":"S. Wendzel, W. Mazurczyk, L. Caviglione, M. Meier","doi":"10.1007/978-3-658-06708-3_9","DOIUrl":"https://doi.org/10.1007/978-3-658-06708-3_9","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Building Technologies that Help Cyber-Defense: Hardware-enabled Trust 构建有助于网络防御的技术:硬件支持的信任
Pub Date : 2012-12-01 DOI: 10.1007/978-3-658-00333-3_30
C. Vishik, R. Lee, Fred Chong
{"title":"Building Technologies that Help Cyber-Defense: Hardware-enabled Trust","authors":"C. Vishik, R. Lee, Fred Chong","doi":"10.1007/978-3-658-00333-3_30","DOIUrl":"https://doi.org/10.1007/978-3-658-00333-3_30","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Future Diffusion of PK1-Technology - A German Delphi Study pk1技术的未来扩散——德国德尔菲研究
Pub Date : 2007-09-01 DOI: 10.1007/978-3-8348-9418-2_41
Michel Gaude
{"title":"Future Diffusion of PK1-Technology - A German Delphi Study","authors":"Michel Gaude","doi":"10.1007/978-3-8348-9418-2_41","DOIUrl":"https://doi.org/10.1007/978-3-8348-9418-2_41","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116070626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IT Security Vulnerability and Incident Response Management IT安全漏洞和事件响应管理
Pub Date : 2006-10-01 DOI: 10.1007/978-3-8348-9195-2_41
Wim Hafkamp
{"title":"IT Security Vulnerability and Incident Response Management","authors":"Wim Hafkamp","doi":"10.1007/978-3-8348-9195-2_41","DOIUrl":"https://doi.org/10.1007/978-3-8348-9195-2_41","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"81 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Anonymity vs. Utility Dilemma 匿名与效用困境
Pub Date : 1900-01-01 DOI: 10.1007/978-3-8348-9283-6_10
M. Bezzi, Jean-Christophe R. Pazzaglia
{"title":"The Anonymity vs. Utility Dilemma","authors":"M. Bezzi, Jean-Christophe R. Pazzaglia","doi":"10.1007/978-3-8348-9283-6_10","DOIUrl":"https://doi.org/10.1007/978-3-8348-9283-6_10","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124281992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security Industry: State of the Art 信息安全产业:最新进展
Pub Date : 1900-01-01 DOI: 10.1007/978-3-8348-9283-6_8
J. L. Muñoz
{"title":"Information Security Industry: State of the Art","authors":"J. L. Muñoz","doi":"10.1007/978-3-8348-9283-6_8","DOIUrl":"https://doi.org/10.1007/978-3-8348-9283-6_8","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identity and Access Control - Demonstrating Compliance 身份和访问控制-证明合规性
Pub Date : 1900-01-01 DOI: 10.1007/978-3-8348-9195-2_20
Marc Sel, B. V. Rompay
{"title":"Identity and Access Control - Demonstrating Compliance","authors":"Marc Sel, B. V. Rompay","doi":"10.1007/978-3-8348-9195-2_20","DOIUrl":"https://doi.org/10.1007/978-3-8348-9195-2_20","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117259968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Digital Signatures Work across National Borders 使数字签名跨越国界
Pub Date : 1900-01-01 DOI: 10.1007/978-3-8348-9418-2_30
Jon Ølnes, Anette Andresen, L. Buene, Olga Cerrato, Håvard Grindheim
{"title":"Making Digital Signatures Work across National Borders","authors":"Jon Ølnes, Anette Andresen, L. Buene, Olga Cerrato, Håvard Grindheim","doi":"10.1007/978-3-8348-9418-2_30","DOIUrl":"https://doi.org/10.1007/978-3-8348-9418-2_30","url":null,"abstract":"","PeriodicalId":203482,"journal":{"name":"Information Security Solutions Europe","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Information Security Solutions Europe
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1