SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) hsv:(Systemvetenskap informationssystem och informatik) ;lar1:(ltu)"

Sökning: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) hsv:(Systemvetenskap informationssystem och informatik) > Luleå tekniska universitet

  • Resultat 1-10 av 160
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Kebande, Victor R., 1985-, et al. (författare)
  • A blockchain-based multi-factor authentication model for a cloud-enabled internet of vehicles
  • 2021
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 21:18
  • Tidskriftsartikel (refereegranskat)abstract
    • Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
  •  
2.
  • Nordlander, Johan, et al. (författare)
  • Unambiguous Semantics In Automotive Timing Modeling
  • 2010
  • Ingår i: Proceedings of the 1st Workshop on Critical Automotive applications: Robustness & Safety (CARS '10) in Conjunction With The 8th European Dependable Computing Conference (EDCC-8), Valencia, Spain, 2010.. - New York, New York, USA : ACM Press. - 9781605589152 ; , s. 39-42
  • Konferensbidrag (refereegranskat)abstract
    • This paper shows how the ITEA2 research project TIMMO has chosen to model timing constraints for delays and for synchronization in an unambiguous way. The shown timing model is valid even in systems where jitter and over- and under-sampling appears. These timing constraints can be used to model timing by augmenting both the AUTOSAR and EAST-ADL2 languages. The unambiguous semantics enables the use of timing models for building safety cases and for precise communication between different parties involved in safety-critical automotive applications. © 2010 ACM.
  •  
3.
  • Eriksson, Darek M., et al. (författare)
  • A framework for the modelling of tempo-spatial enterprise
  • 2007
  • Ingår i: International Journal of Applied Systemic Studies. - 1751-0589 .- 1751-0597. ; 1:3, s. 231-247
  • Tidskriftsartikel (refereegranskat)abstract
    • A framework for the modelling of enterprise operations is presented, aiming at enabling a conception of enterprise operations in three explicitly aligned perspectives: its what, or morphology; its when, or temporal position; its where, or spatial position. It is derived from the precepts of a General Systems Theory and its General Process Theory. The practical and empirical benefit of this framework is indicated by a real-life case, a so-called 'Transatlantic Shopping Process', where the models constructed enable management of complexities emerging from enterprise operations.
  •  
4.
  • Runardotter, Mari, et al. (författare)
  • Being an Archivist in our Times - Trying to Manage Long-Term Digital Preservation
  • 2007
  • Ingår i: International Journal of Public Information Systems. - Sundsvall : Mittuniversitetet. - 1653-4360. ; 3:2, s. 47-61
  • Tidskriftsartikel (refereegranskat)abstract
    • Information technology offers the possibility to produce and archive more recorded information than ever before. Thus it is has become feasible to preserve and have access to information in almost unlimited amounts. In sharp contrast, the situation today suggests that societal data has become significantly less accessible than was previously the case. This is both ironic and tragic. In this paper, we recognize that the cultural heritage is at risk, given current circumstances as revealed through observation and dialogue with an archivist. While there are many projects, cultural heritage institutions, government agencies and private enterprises involved in an ambitious research agenda, the majority of these are focussed on technical solutions. In contrast, we provide an indepth point of view of an archivist who is expected to preserve information in order to safeguard the long-term preservation of the cultural heritage. This report reveals the challenges as well as the systemic implications related to the full implementation of the Archival Information Systems guidelines, that fully involve archivists and users in systems design features and functionalities, in order to enable the advancement of longterm digital preservation.
  •  
5.
  • Stuedahl, Dagny, et al. (författare)
  • Attachments to Participatory Digital Infrastructures in the Cultural Heritage Sector
  • 2016
  • Ingår i: Science & Technology Studies. - Turku : Finnish Society for Science and Technology Studies. - 2243-4690. ; 29:4, s. 50-69
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper explores knowledge infrastructures developed with the aim of opening cultural heritage institutions for public access and involvement. We concentrate on the new modes of knowledge production of professionals and amateur experts involved in the design and use of open archives and wiki communities as a part of transformations towards participatory digital public infrastructures. Ideas of crowdsourcing, policies of open data and engagements in community-based cultural heritage influence participants’ visions of future ways of generating, sharing and maintaining their knowledge. The paper identifies how the concept of attachments may help us analytically to understand the dynamics of multiple situated knowledges that are played out when people embrace digital technologies and open-data policies to connect past, present and future orientation of cultural heritage engagements.
  •  
6.
  • Booth, Todd, 1959-, et al. (författare)
  • Stronger Authentication for Password Credential Internet Services
  • 2017
  • Ingår i: Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV). - Piscataway, NJ : IEEE conference proceedings. - 9781509036325 ; , s. 41-45
  • Konferensbidrag (refereegranskat)abstract
    • Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or email) and password (ID/PW) credential authentication. However, there are numerous vulnerabilities concerning ID/PW credentials. Scholars and the industry have proposed several improved security solutions, such as MFA, however most of the Internet Services have refused to adopt these solutions. Mobile phones are much more sensitive to these vulnerabilities (so this paper focuses on mobile phones). Many users take advantage of password managers, to keep track of all their Internet Service profiles. However, the Internet Service profiles found in password managers, are normally kept on the PC or mobile phone’s disk, in an encrypted form. Our first contribution is a design guideline, whereby the Internet Service profiles never need to touch the client’s disk. Most users would benefit, if they had the ability to use MFA, to login to a legacy Internet Service, which only supports ID/PW credential authentication. Our second contribution is a design guideline, whereby users can choose, for each legacy ID/PW Internet Service, which specific MFA they wish to use. We have also presenting conceptual design guidelines, showing that both of our contributions are minor changes to existing password managers, which can be implemented easily with low overhead.
  •  
7.
  • Booth, Todd, 1959-, et al. (författare)
  • DNS DDoS Mitigation, via DNS Timer Design Changes
  • 2017
  • Ingår i: Future Network Systems and Security. - Cham : Springer. - 9783319655475 - 9783319655482 ; , s. 43-55
  • Konferensbidrag (refereegranskat)abstract
    • DDoS attacks have been a problem since 2000. In October 2016, there was a major DDoS attack against the service provider Dyn’s DNS service, which took the service down. This was one of the largest bandwidth DDoS attack ever documented, with attack bandwidth over 650 Gbps. By taking down just Dyn’s DNS service, clients could not obtain the IP addresses, of the organizations hosting their DNS with Dyn, such as Twitter. Our contribution is that we have found a way to mitigate the effect of DDoS attacks against DNS services. We only require some very small algorithm changes, in the DNS protocol. More specifically, we propose to add two additional timers. Even if the end DNS clients don’t support these timers, they will receive our new functionality via the DNS resolvers and recursive servers. In summary, our contributions give much more control to the organizations, as to under which specific conditions the DNS cache entries should be aged or used. This allows the organization to (1) much more quickly expire client DNS caches and (2) to mitigate the DDoS DNS attack effects. Our contributions are also helpful to organizations, even if there are no DDoS DNS attack.
  •  
8.
  • Elragal, Rawan, et al. (författare)
  • Healthcare analytics—A literature review and proposed research agenda
  • 2023
  • Ingår i: Frontiers in Big Data. - : Frontiers Media S.A.. - 2624-909X. ; 6
  • Forskningsöversikt (refereegranskat)abstract
    • This research addresses the demanding need for research in healthcare analytics, by explaining how previous studies have used big data, AI, and machine learning to identify, address, or solve healthcare problems. Healthcare science methods are combined with contemporary data science techniques to examine the literature, identify research gaps, and propose a research agenda for researchers, academic institutions, and governmental healthcare organizations. The study contributes to the body of literature by providing a state-of-the-art review of healthcare analytics as well as proposing a research agenda to advance the knowledge in this area. The results of this research can be beneficial for both healthcare science and data science researchers as well as practitioners in the field.
  •  
9.
  • Kasurinen, Jussi, et al. (författare)
  • Foreword
  • 2023
  • Ingår i: TKTP 2023; Annual Symposium of Computer Science 2023. - : CEUR-WS Team. ; , s. 6-
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
10.
  • Lundgren, Martin, et al. (författare)
  • Security and Privacy of Smart Homes : Issues and Solutions
  • 2021
  • Ingår i: Security and Privacy in the Internet of Things. - : John Wiley & Sons. - 9781119607748 - 9781119607755 - 9781119607762 - 9781119607779 ; , s. 235-260
  • Bokkapitel (refereegranskat)abstract
    • The current discussion and adoption of new technologies such as Internet of Things and smart technologies, like smart homes, have blossomed over the last decade. The user-centric aspect plays a vital role in the development of smart homes, since its spread and usage is fundamentally depending on people adopting new technologies into their normal everyday lives. This chapter contributes to raising our understanding of the security and privacy challenges and solutions that exist within smart homes. It first investigates various dimensions of information security and privacy in order to build a framework to analyze actual or perceived security and privacy issues that can arise from new technologies like smart homes. The chapter presents what security techniques and mechanisms are available to address these. Finally, it discusses what the future might hold in terms of security and privacy of smart homes, followed by a section highlighting the contributions of this chapter.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 160
Typ av publikation
tidskriftsartikel (71)
konferensbidrag (53)
bokkapitel (14)
forskningsöversikt (7)
rapport (6)
doktorsavhandling (4)
visa fler...
annan publikation (3)
proceedings (redaktörskap) (1)
licentiatavhandling (1)
visa färre...
Typ av innehåll
refereegranskat (134)
övrigt vetenskapligt/konstnärligt (21)
populärvet., debatt m.m. (5)
Författare/redaktör
Bergvall-Kåreborn, B ... (11)
Elragal, Ahmed (10)
Ericson, Åsa (9)
Ståhlbröst, Anna (8)
Awad, Ali Ismail (7)
Oyelere, Solomon Sun ... (7)
visa fler...
Ståhlbröst, Anna, 19 ... (7)
Lundgren, Martin (7)
Andersson, Karl, 197 ... (6)
Andersson, Karl (6)
Parida, Vinit (6)
Vyatkin, Valeriy (5)
Chronéer, Diana (5)
Parnes, Peter (4)
Schelén, Olov (4)
Runardotter, Mari (4)
Agbo, Friday Joseph (3)
Jansson, Maria (3)
Hossain, Mohammad Sh ... (3)
Alawadi, Sadi, 1983- (3)
Ikuesan, Richard A. (3)
Bodin, Ulf (3)
Kyösti, Petter (3)
Ferreira, Caitlin (3)
Bergström, Erik, 197 ... (3)
Ihlström Eriksson, C ... (3)
Sierla, Seppo (2)
Liwicki, Marcus (2)
Kovács, György, Post ... (2)
Johansson, Jeaneth (2)
Kebande, Victor R. (2)
Suhonen, Jarkko (2)
Laine, Teemu H. (2)
Tedre, Matti (2)
Kebande, Victor R., ... (2)
Awaysheh, Feras M. (2)
Alani, Mohammed M. (2)
Wiberg, Mikael, 1974 ... (2)
Broberg, Anders (2)
Mikalef, Patrick (2)
Wiberg, Mikael (2)
Wennberg, Paula (2)
Johansson, Dan, 1977 ... (2)
Apiola, Mikko (2)
Temiz, Serdar (2)
Päivärinta, Tero (2)
Furnell, Steven (2)
Pitt, Leyland (2)
Yang, Chen-Wei (2)
Robertson, Jeandri (2)
visa färre...
Lärosäte
Linnéuniversitetet (13)
Högskolan i Skövde (9)
Umeå universitet (6)
Uppsala universitet (6)
Högskolan i Halmstad (6)
visa fler...
Jönköping University (4)
Kungliga Tekniska Högskolan (3)
Stockholms universitet (3)
Malmö universitet (3)
Mittuniversitetet (2)
Chalmers tekniska högskola (2)
RISE (2)
Blekinge Tekniska Högskola (2)
Göteborgs universitet (1)
Högskolan Kristianstad (1)
Högskolan Väst (1)
Linköpings universitet (1)
Lunds universitet (1)
visa färre...
Språk
Engelska (155)
Svenska (5)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (160)
Samhällsvetenskap (78)
Teknik (25)
Medicin och hälsovetenskap (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy