Browse Results

Showing 16,101 through 16,125 of 54,064 results

Security and Privacy for Implantable Medical Devices

by Wayne Burleson Sandro Carrara

This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from Computer Security and Cryptography present new research which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs.

Security-aware Cooperation in Cognitive Radio Networks

by Ning Zhang Jon W. Mark

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An introduction to CRNs and literature survey enhance the discussion while numerical results are provided to demonstrate the viability of the proposed schemes. The brief is designed for researchers and professionals working with cognitive radio networks or interested in cooperation based access. Advanced-level students studying computer communication networks and communications engineering will also find this brief useful.

Security for Cloud Storage Systems

by Xiaohua Jia Kan Yang

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.

Security for Multi-hop Wireless Networks

by Mohamed M. E. A. Mahmoud Xuemin Sherman Shen

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

Security for Multihop Wireless Networks

by Shafiullah Khan Jaime Lloret Mauri

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies

Security for Service Oriented Architectures

by Walter Williams

This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the design of distributed and resilient applications, it provides an overview of the various standards that service oriented and distributed applications leverage to provide the understanding required to make intelligent decisions regarding their design. The book reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.

Security Management: A Critical Thinking Approach

by Michael Land Truett Ricks Bobby Ricks

Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organ

Security Management of Next Generation Telecommunications Networks and Services

by Stuart Jacobs

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications).<P><P> It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to encryption and associated credentials management/control. The book will highlight deficiencies in existing protocols used for management and the transport of management information.

Security Standardisation Research

by Lidong Chen David Mcgrew Chris Mitchell

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Selected Areas in Cryptography -- SAC 2013

by Tanja Lange Kristin Lauter Petr Lisoněk

This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.

Selected Areas in Cryptography -- SAC 2014

by Antoine Joux Amr Youssef

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

Selenium Design Patterns and Best Practices

by Dima Kovalenko

Whether you are an experienced WebDriver developer or someone who was newly assigned a task to create automated tests, this book is for you. Since the ideas and concepts are described in simple terms, no previous experience in computer coding or programming is required.

Selenium WebDriver Practical Guide

by Satya Avasarala

An easy- to- follow guide, featuring step-by-step practical tutorials to help you understand how to automate web applications for testing purposes. If you are a quality assurance / testing professional, a software developer, or a web application developer looking to create automation test scripts for your web applications, this is the perfect guide for you! As a pre-requisite, this book expects you to have a basic knowledge of Core Java, although any previous knowledge of WebDriver or Selenium-1 is not needed. By the end of this book, you will have acquired a comprehensive knowledge of WebDriver, which will help you in writing your automation tests.

Self-Healing Systems and Wireless Networks Management

by Junaid Ahsenali Chaudhry

Do you believe in open-source development? Would you like to see your security system grow and learn by itself? Are you sick of paying for software license fees every year that produce little return on investment? And, would you prefer to invest in something you could sell later on to other IT security departments? If you answered yes to these ques

The Self-Tracking

by Gina Neff Dawn Nafus

People keep track. In the eighteenth century, Benjamin Franklin kept charts of time spent and virtues lived up to. Today, people use technology to self-track: hours slept, steps taken, calories consumed, medications administered. Ninety million wearable sensors were shipped in 2014 to help us gather data about our lives. This book examines how people record, analyze, and reflect on this data, looking at the tools they use and the communities they become part of. Gina Neff and Dawn Nafus describe what happens when people turn their everyday experience -- in particular, health and wellness-related experience -- into data, and offer an introduction to the essential ideas and key challenges of using these technologies. They consider self-tracking as a social and cultural phenomenon, describing not only the use of data as a kind of mirror of the self but also how this enables people to connect to, and learn from, others.Neff and Nafus consider what's at stake: who wants our data and why; the practices of serious self-tracking enthusiasts; the design of commercial self-tracking technology; and how self-tracking can fill gaps in the healthcare system. Today, no one can lead an entirely untracked life. Neff and Nafus show us how to use data in a way that empowers and educates.

SELinux Cookbook

by Sven Vermeulen

If you are a Linux system administrator or a Linux-based service administrator and want to fine-tune SELinux to implement a supported, mature, and proven access control system, then this book is for you. Basic experience with SELinux enabled distributions is expected.

Semantic Acquisition Games

by Jakub Šimko Mária Bieliková

Many applications depend on the effective acquisition of semantic metadata, and this state-of-the-art volume provides extensive coverage of the field of semantics acquisition games (SAGs). SAGs are a part of the crowdsourcing approach family and the authors analyze their role as tools for acquisition of resource metadata and domain models. Three case studies of SAG-based semantics acquisition methods are shown, along with other existing SAGs: 1. the Little Search Game - a search query formulation game using negative search, serving for acquisition of lightweight semantics. 2. the PexAce - a card game acquiring annotations to images. 3. the CityLights - a SAG used for validation of music metadata. The authors also look at the SAGs from their design perspectives covering SAG design issues and existing patterns, including several novel patterns. For solving cold start problems, a "helper artifact" scheme is presented, and for dealing with malicious player behavior, a posteriori cheating detection scheme is given. The book also presents methods for assessing information about player expertise, which can be used to make SAGs more effective in terms of useful output.

Semantic Models for Adaptive Interactive Systems

by Tim Hussein Jürgen Ziegler Heiko Paulheim Stephan Lukosch Gaëlle Calvary

Providing insights into methodologies for designing adaptive systems based on semantic data, and introducing semantic models that can be used for building interactive systems, this book showcases many of the applications made possible by the use of semantic models. Ontologies may enhance the functional coverage of an interactive system as well as its visualization and interaction capabilities in various ways. Semantic models can also contribute to bridging gaps; for example, between user models, context-aware interfaces, and model-driven UI generation. There is considerable potential for using semantic models as a basis for adaptive interactive systems. A variety of reasoning and machine learning techniques exist that can be employed to achieve adaptive system behavior. The advent and rapid growth of Linked Open Data as a large-scale collection of semantic data has also paved the way for a new breed of intelligent, knowledge-intensive applications. Semantic Models for Adaptive Interactive Systems includes ten complementary chapters written by experts from both industry and academia. Rounded off by a number of case studies in real world application domains, this book will serve as a valuable reference for researchers and practitioners exploring the use of semantic models within HCI.

Semantic Multimedia Analysis and Processing (Digital Imaging and Computer Vision #9)

by Evaggelos Spyrou

Broad in scope, Semantic Multimedia Analysis and Processing provides a complete reference of techniques, algorithms, and solutions for the design and the implementation of contemporary multimedia systems. Offering a balanced, global look at the latest advances in semantic indexing, retrieval, analysis, and processing of multimedia, the book features the contributions of renowned researchers from around the world. Its contents are based on four fundamental thematic pillars: 1) information and content retrieval, 2) semantic knowledge exploitation paradigms, 3) multimedia personalization, and 4) human-computer affective multimedia interaction. Its 15 chapters cover key topics such as content creation, annotation and modeling for the semantic web, multimedia content understanding, and efficiency and scalability. Fostering a deeper understanding of a popular area of research, the text: Describes state-of-the-art schemes and applications Supplies authoritative guidance on research and deployment issues Presents novel methods and applications in an informative and reproducible way Contains numerous examples, illustrations, and tables summarizing results from quantitative studies Considers ongoing trends and designates future challenges and research perspectives Includes bibliographic links for further exploration Uses both SI and US units Ideal for engineers and scientists specializing in the design of multimedia systems, software applications, and image/video analysis and processing technologies, Semantic Multimedia Analysis and Processing aids researchers, practitioners, and developers in finding innovative solutions to existing problems, opening up new avenues of research in uncharted waters.

Semantic Technology

by Wooju Kim Ying Ding Hong-Gee Kim

This book constitutes the proceedings of the Third Joint International Semantic Technology Conference, JIST 2013, held in Seoul, South Korea, in November 2013. The 32 papers, included four tutorials and 5 workshop papers, in this volume were carefully reviewed and selected from numerous submissions. The contributions are organized in topical sections on semantic Web services, multilingual issues, biomedical applications, ontology construction, semantic reasoning, semantic search and query, ontology mapping, and learning and discovery.

Semantic Technology: Third Joint International Conference, JIST 2013, Seoul, South Korea, November 28--30, 2013, Revised Selected Papers (Lecture Notes in Computer Science #8388)

by Wooju Kim, Ying Ding and Hong-Gee Kim

This book constitutes the proceedings of the Third Joint International Semantic Technology Conference, JIST 2013, held in Seoul, South Korea, in November 2013.The 32 papers, included four tutorials and 5 workshop papers, in this volume were carefully reviewed and selected from numerous submissions. The contributions are organized in topical sections on semantic Web services, multilingual issues, biomedical applications, ontology construction, semantic reasoning, semantic search and query, ontology mapping, and learning and discovery.

The Semantic Web: ESWC 2014 Satellite Events

by Valentina Presutti Eva Blomqvist Raphael Troncy Harald Sack Ioannis Papadakis Anna Tordai

This book constitutes the thoroughly refereed post-conference proceedings of the Satellite Events of the 11th International Conference on the Semantic Web, ESWC 2014, held in Anissaras, Crete, Greece, in May 2014. The volume contains 20 poster and 43 demonstration papers, selected from 113 submissions, as well as 12 best workshop papers selected from 60 papers presented at the workshop at ESWC 2014. Best two papers from AI Mashup Challenge are also included. The papers cover various aspects of the Semantic Web.

The Semantic Web and Web Science

by Dongyan Zhao Jianfeng Du Haofen Wang Peng Wang Donghong Ji Jeff Z. Pan

This book constitutes the thoroughly refereed papers of the 8th Chinese Conference on The Semantic Web and Web Science, CSWS 2014, held in Wuhan, China, in August 2014. The 22 research papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as ontology reasoning and learning; semantic data generation and management; and semantic technology and applications.

The Semantic Web Explained

by Peter Szeredi Gergely Lukacsy Tamas Benko

The Semantic Web is a new area of research and development in the field of computer science that aims to make it easier for computers to process the huge amount of information on the web, and indeed other large databases, by enabling them not only to read, but also to understand the information. Based on successful courses taught by the authors, and liberally sprinkled with examples and exercises, this comprehensive textbook describes not only the theoretical issues underlying the Semantic Web, but also algorithms, optimisation ideas and implementation details. The book will therefore be valuable to practitioners as well as students, indeed to anyone who is interested in Internet technology, knowledge engineering or description logics. Supplementary materials available online include the source code of program examples and solutions to selected exercises.

Semantic Web Technologies and Legal Scholarly Publishing

by Silvio Peroni

This work deals with the applications of Semantic Publishing technologies in the legal domain, i. e. , the use of Semantic Web technologies to address issues related to the Legal Scholarly Publishing. Research in the field of Law has a long tradition in the application of semantic technologies, such as Semantic Web and Linked Data, to real-world scenarios. This book investigates and proposes solutions for three main issues that Semantic Publishing needs to address within the context of the Legal Scholarly Publishing: the need of tools for linking document text to a formal representation of its meaning; the lack of complete metadata schemas for describing documents according to the publishing vocabulary and the absence of effective tools and user interfaces for easily acting on semantic publishing models and theories. In particular, this work introduces EARMARK, a markup meta language that allows one to create markup documents without the structural and semantic limits imposed by markup languages such as XML. EARMARK is a platform to link the content layer of a document with its intended formal semantics and it can be used with the Semantic Publishing and Referencing (SPAR) Ontologies, another topic in this book. SPAR Ontologies are a collection of formal models providing an upper semantic layer for describing the publishing domain. Using EARMARK as a foundation for SPAR descriptions opens up to a semantic characterisation of all the aspects of a document and of its parts. Finally, four user-friendly tools are introduced: LODE, KC-Viz, Graffoo and Gaffe. They were expressly developed to facilitate the interaction of publishers and domain experts with Semantic Publishing technologies by shielding such users from the underlying formalisms and semantic models of such technologies.

Refine Search

Showing 16,101 through 16,125 of 54,064 results