The provision of services such as credit card facilities using Intelligent Networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not...
详细信息
The provision of services such as credit card facilities using Intelligent Networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not be able to function accurately. This paper examines INs and highlights their vulnerability to network delay attacks. In particular, the nature of rear-time communications and the main approach that has been developed to determine whether received data is being sent in real-time or not is discussed. The deficiencies in this approach in terms of its ability to counteract the different forms of a network delay attack are highlighted and an alternative method which addresses these drawbacks is presented. Finally, the results achieved following the implementation and subsequent testing of the alternative approach are discussed. (C) 1997 Elsevier science B.V.
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management system...
详细信息
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management systems. These are examined in tum to give the reader an overview of the state-of-the-art in security management. The ISO OSI Reference Model is used as a basis to present the security threats, security services and mechanisms which have to be managed. Telecommunications management networks are used as an example of management applications which both provide management and require the provision of security and security management services. The OSI approach to network management is examined in detail. This is followed by a survey of the categories of OSI security management activities, and a discussion of the security management needs of various common security services. The need for security for network management systems is examined.
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special at...
详细信息
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special attention was given to compatibility with previous asynchronous standards, namely V.42bis. In September 1993 a proposal for modification of the V.42bis standard to make ii applicable to synchronous data was published. In this paper a prototype of a synchronous data link layer protocol based on the ITU proposals is described. The protocol chosen is HDLC based. The V.42bis compression standard is adapted to serve the needs of a synchronous protocol. A functional model is designed followed by a performance analysis of the protocol. The analysis shows a decrease of the compression ratio due to the adaption of the compression algorithm. (C) 1997 Elsevier science B.V.
This paper presents an approach to the specification of external interfaces of an electronic broker used in the Architecture for Electronic Brokerage systems (AEBS). The external interface specified by the AEBS archit...
详细信息
Type-safe high-level languages such as Java have not yet found their way into the domain of deeply embedded systems, even though numerous attempts have been made to make these languages cost attractive. One major chal...
详细信息
In this paper we present a prototype of the RTSC - the Real-Time System Compiler. The RTSC is a compiler-based tool that leverages the migration from event-triggered to time-triggered real-time systems. For this purpo...
详细信息
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubi...
详细信息
This paper presents the Secure Environment for Information systems in Medicine (SEISMED) project which is funded by the Commission of the European Commzlnities (CEC) under the Advance Informatics in Medicine (AIM) pro...
详细信息
During the last decade the number of personal multimediaenabled devices has increased significantly in everyday usage. Additionally, high-end devices for multimedia environments enable multi-modal human computer inter...
详细信息
A Health Care Establishment (HCE) is an establishment where medical services are rendered. The above services are provided by the health care personnel. The infrastructure of a HCE may include Information Technology (...
详细信息
暂无评论