SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Brunstrom Anna 1967 ) "

Sökning: WFRF:(Brunstrom Anna 1967 )

  • Resultat 1-10 av 87
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Faigl, Zoltán, et al. (författare)
  • Providing Tunable Security in IEEE 802.11i Enabled Networks
  • 2006
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • The basic idea of QoS is to provide mechanisms that can offer different service levels, which are expressed through well-defined parameters that are specified at run-time on the basis of need. Bit rate, throughput, delay, jitter, and packet loss rate are all examples of common QoS parameters suggested for packet networks. These parameters are all aimed to express(and guarantee) a certain service level with respect to reliability and/or performance. In this report, we investigate how security can be treated as yet another QoS parameter through the use of tunable security services. The main idea with this work is to let users specify a trade-off between security and performance through the choice of available security configuratio (s). The performance metric used is latency. The concept is illustrated using the IEEE 802.11i wireless local area networking standard.
  •  
2.
  • Lindskog, Stefan, 1967-, et al. (författare)
  • A Conceptual Model of Tunable Security Services
  • 2006
  • Ingår i: Wireless Communication Systems, 2006.. - Piscataway, NJ : IEEE. - 9781424403981 ; , s. 531-535
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we propose a conceptual model for tunable security services. The aim of the model is to provide a tool that can be used to describe and analyze such services in a structured and consistent way. The proposed model can thus serve as a basis to examine the possibilities available for constructing tunable security services based on current and future networking standards and to identify missing requirements. It can also be used to describe and compare previous research results. In the paper, four different use cases are presented that illustrates the powerfulness of the proposed model.
  •  
3.
  • Lindskog, Stefan, 1967-, et al. (författare)
  • Data Protection based on Physical Separation : Concepts and Application Scenarios
  • 2005
  • Ingår i: Computational Science and Its Applications. - Berlin : Springer. - 9783540258636 ; , s. 1331-1340
  • Konferensbidrag (refereegranskat)abstract
    • Data protection is an increasingly important issue in today's communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusively based on cryptography. As a complement, we propose the use of multiple physically separate paths to accomplish data protection. A general concept for providing physical separation of data streams together with a threat model is presented. The main target is delay-sensitive applications such as telephony signaling, live TV, and radio broadcasts that require only lightweight security. The threat considered is malicious interception of network transfers through so-called eavesdropping attacks. Application scenarios and techniques to provide physically separate paths are discussed
  •  
4.
  • Lindskog, Stefan, 1967-, et al. (författare)
  • Middleware Support for Tunable Encryption
  • 2006
  • Ingår i: Wireless Information Systems. - Setubal , Portugal : INSTICC Press. - 9789728865481 ; , s. 36-46
  • Konferensbidrag (refereegranskat)abstract
    • To achieve an appropriate tradeoff between security and performance for wireless applications, a tunable and differential treatment of security is required.In this paper, we present a tunable encryption service designed as a middleware that is based on a selective encryption paradigm. The core component of the middleware provides block-based selective encryption. Although the selection of which data to encrypt is made by the sending application and is typically content-dependent, the representation used by the core component is application and content-independent. This frees the selective decryption module at the receiver from the need for application or content-specific knowledge. The sending application specifies the data to encrypt either directly or through a set of highlevel application interfaces. A prototype implementation of the middleware isdescribed along with an initial performance evaluation. The experimental results demonstrate that the generic middleware service offers a high degree of security adaptiveness at a low cost. 
  •  
5.
  • Lindskog, Stefan, 1967-, et al. (författare)
  • Physical Separation for Data Protection based on SCTP Multihoming
  • 2004
  • Ingår i: Proceedings of the Second Swedish National Computer Networking Workshop. - Karlstad.
  • Konferensbidrag (refereegranskat)abstract
    • Network security is an increasingly important issue. Traditional solutions for protecting data when transferred over the network are almost exclusively based on cryptography. As a complement, we propose the use of SCTP and its support for physically separate paths to accomplish protection against eavesdropping attacks near the end points.
  •  
6.
  • Lundin, Reine, 1974-, et al. (författare)
  • A Model-based Analysis of Tunability in Privacy Services
  • 2008
  • Ingår i: The Future of Identity in the Information Society. - Boston, MA : Springer-Verlag New York. - 9780387790251 ; , s. 343-356
  • Bokkapitel (refereegranskat)abstract
    • In this paper, we investigate the tunable privacy features provided by Internet Explorer version 6 (IE6), Mix Net and Crowds, by using a conceptual model for tunable security services. A tunable security service is defined as a service that has been explicitly designed to offer various security configurations that can be selected at run-time. Normally, Mix Net and Crowds are considered to be static anonymity services, since they were not explicitly designed to provide tunability. However, as discussed in this paper, they both contain dynamic elements that can be used to utilize the trade-off between anonymity and performance. IE6, on the other hand, was indeed designed to allow end users to tune the level of privacy when browsing the Internet
  •  
7.
  • Lundin, Reine, 1974-, et al. (författare)
  • Analysis of Anonymity Services from a Tunable Perspective
  • 2007
  • Ingår i: The Future of Identity in the Information Society. - Boston : IFIP. - 9780387790268
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we investigate the tunable features provided by Mix-Nets and Crowds using a conceptual model for tunable secu- rity services. A tunable security service is deflned as a service that has been explicitly designed to ofier various security levels that can be se- lected at run-time. Normally, Mix-Nets and Crowds are considered to be static anonymity services, since they were not explicitly designed to provide tunability. However, as discussed in this paper, they both con- tain dynamic elements that can be used to achieve a tradeofi between anonymity and performance
  •  
8.
  • Lundin, Reine, 1974-, et al. (författare)
  • Measuring Confidentiality of Selectively Encrypted Messages Using Guesswork
  • 2005
  • Ingår i: Proceeding of the Third Swedish National Computer Networking Workshop (SNCNW 2005). - Halmstad : Högskolan i Halmstad. ; , s. 99-102
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker performs in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are only investigated for zero-order languages, and we give some basic initial results. The work is in progress and later papers will examine higher order of languages.
  •  
9.
  • Lundin, Reine, 1974-, et al. (författare)
  • Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages
  • 2006
  • Ingår i: Quality of Protection. - Boston : Springer. ; , s. 173-184
  • Bokkapitel (refereegranskat)abstract
    • n this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are investigated for zero-order languages. We also introduce the concept of reduction chains to describe how the message (or rather search) space changes for an attacker with different levels of encryption.
  •  
10.
  • Wennström (Klockar), Annika, 1967-, et al. (författare)
  • TCP over Wireless Networks
  • 2004
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This report provides an overview of common wireless network technologies used today, with emphasis on data transmission. Wireless networks are becoming increasingly used for Internet communications. As discussed in the report, the TCP protocol may experience performance degradations over wireless networks, due to non-congestion related packet loss and varying round trip times. To this end, many enhancements for TCP to the link and transport layer have been proposed. A selection of these are presented and discussed in relation to the wireless network technologies.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 87
Typ av publikation
konferensbidrag (59)
tidskriftsartikel (13)
rapport (7)
annan publikation (4)
bokkapitel (3)
licentiatavhandling (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (70)
övrigt vetenskapligt/konstnärligt (16)
populärvet., debatt m.m. (1)
Författare/redaktör
Brunstrom, Anna, 196 ... (87)
Grinnemo, Karl-Johan ... (29)
Alfredsson, Stefan, ... (13)
Garcia, Johan, 1970- (11)
Hurtig, Per, 1980- (10)
Kassler, Andreas, 19 ... (9)
visa fler...
Lindskog, Stefan, 19 ... (9)
Karlsson, Jonas, 197 ... (9)
Eklund, Johan, 1966- (7)
Caso, Giuseppe (7)
Alay, Özgü (7)
Mikael, Sternad (5)
Rajiullah, Mohammad, ... (4)
Taheri, Javid (4)
De Nardis, Luca (4)
Neri, Marco (4)
Di Benedetto, Maria- ... (4)
Kousias, Konstantino ... (3)
Usman, Muhammad (3)
Brouer, Jesper Danga ... (3)
Ali, Usman (3)
Rabitsch, Alexander (2)
Fischer-Hübner, Simo ... (2)
Pieskä, Marcus, 1985 ... (2)
Del Giudice, Giacomo (2)
De Cicco, Luca (2)
Mascolo, Saverio (2)
Andersson, Torbjörn (1)
Kassler, Andreas (1)
Hidell, Markus (1)
Ramaswamy, Arunselva ... (1)
Nilsson, Jan (1)
Agüero, Ramón (1)
Grinnemo, Karl-Johan (1)
Hansson, Anders (1)
Ahmed, Bestoun S., 1 ... (1)
Koumaras, Harilaos (1)
Bosneag, Anne-Marie (1)
McNamara, Joseph (1)
Diaz-Zayas, Almudena (1)
Frascolla, Valerio (1)
Merino, Pedro (1)
Alfredsson, Freystei ... (1)
Hoiland-Jorgensen, T ... (1)
Amend, Markus (1)
Petlund, Andreas (1)
Halvorsen, Pål (1)
Hurtig, Per (1)
John, Wolfgang, 1978 (1)
Bogenfeld, Eckard (1)
visa färre...
Lärosäte
Karlstads universitet (87)
Kungliga Tekniska Högskolan (3)
Chalmers tekniska högskola (1)
Språk
Engelska (87)
Forskningsämne (UKÄ/SCB)
Teknik (68)
Naturvetenskap (26)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy