Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 7

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The subject of this study is the non-repudiation security service for network communication using TCP/IP stack. Generated evidence, as well as decision-making process of registering a given event, are context-aware. Non-repudiation is equipped with context-awareness by using widely utilized network tools. The aim of this paper is to present timing results for selected tools execution and to complete the evidence generation time. In some applications it is crucial to gather evidence data as fast as possible because of the rapidly changing network environment. For such situations, in case of prolonged execution time, an output from a tool might imprecisely describe the contextual situation from the time of the occurrence of an event.
PL
Praca opisuje implementację usługi niezaprzeczalności, która generuje dowody wzbogacone o dane dotyczące kontekstu podmiotów biorących udział w rejestrowanym zdarzeniu. Zaprezentowana została architektura implementacji i wykorzystane narzędzia. Zostały wykonane badania mające na celu wyznaczenie czasu w jakim generowany jest dowód oraz jego składowe zawierające dane kontekstowe.
EN
The paper presents implementation of non-repudiation security service. This service generates evidence enriched by contextual data about entities involved in an event being registered. The architecture of implementation and tools used are presented. The implementation was used to perform research on evidence generation time and contextual data delivery time.
PL
Usługi bezpieczeństwa stanowią bardzo ważny element architektury bezpieczeństwa systemów teleinformatycznych. Ewolucja tych usług jest wpisana w kierunki rozwoju definiowane przez instytucje państwowe i prywatne. Praca prezentuje koncepcję elastycznej usługi niezaprzeczalności, która dzięki świadomości kontekstu może dostarczać lepszy poziom ochrony niż standardowe usługi, które nie wykorzystują kontekstu. Zaprezentowane i przebadane zostały wybrane narzędzia, które mogą być wykorzystywane do określania kontekstu.
EN
Security services constitute very important element of IT systems security architecture. Evolution of these services is defined by directions presented by government as well as business sector. This paper presents the concept of flexible non-repudiation security service, which uses context awareness to provide better security level in comparison with standard services, not utilizing context. Selected tools were studied to indicate to what extent they can be used for context recognition purposes.
PL
Przedstawiono nowy schemat zarządzania kontekstem w systemach ochrony informacji umożliwiających skalowanie poziomu zabezpieczeń w zależności od stopnia zagrożenia wraz z przykładam zastosowań.
EN
In the paper we present a new framework for context management in information security systems which makes posible graduation of protection level depending on security threats Examples of applications are also presented.
5
Content available Vector Approach to Context Data Reliability
EN
Context-aware processing is a part of intensively developed ubiquitous computing andmobile systems. Surrounding awareness is used to introduce new functions and solutions. Some categories of the context data are taken for security purposes in the context-aware security implementations.This kind of data has to meet some conditions since it is used for decision making about security mechanisms adaptation and configuration. One of these conditions is reliability. The paper presents vector approach to context data reliability assessment introducing mechanism which allows to assess reliability parameters for further usage in context aware security processing. The following aspects of the context data are taken into account: interface reliability, data quality, data source reliability and security level. Introducing reliability metric for context data may be beneficial to other mechanisms which utilize context data. The vector form of reliability may be even more flexible than the scalar value.
EN
Last decades the contextual approach became an important methodology of analysing information processes in the dynamic environment. In this paper we propose a context management framework suitable for secure network services. The framework allows tracking the contextual information from its origin, through all stages of its processing up to application in security services protecting the secure network application. Besides the framework's description, an example of its application in constructing secure voice call network service is given.
7
Content available Distributed social network - data security
EN
The present day Internet provides a wide range of services users can benefit from. Some of the services require gathering, processing and presenting data that come from many users in order to deliver additional information. The suitable example can be social networking service. The more valuable data it stores and processes, the more profitable it can become. Users’ personal data can constitute significant value. One of the issues of social networking is storing and processing data by only one entity. Users cannot choose the most suitable security policy because there is only one provided for certain social network. Being part of it, means accepting the risk of unauthorized data distribution and data leakage because of application vulnerabilities. This paper presents new architecture of social network, which provides mechanisms for dividing data between more than one entity and combining independent data repositories in order to deliver one social network with clearly defined interfaces used to connect new data sources.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.