secure access
Recently Published Documents


TOTAL DOCUMENTS

403
(FIVE YEARS 106)

H-INDEX

14
(FIVE YEARS 4)

The investigation of characteristics of access and use of resources in different distributed environments in the network space is aimed at determining optimal levels for the basic parameters of the supported processes. On the other hand, with the development of the possibilities of the digital space and the significant change in the level of informatization of the society, it is necessary to take the necessary measures to ensure secure access to information resources and in particular to the profiles of personal data. In this respect, the purpose of the article is to propose an organization of heterogeneous environment with resources stored in different places (own memories and cloud data centres). A general architecture and functionality of the main sub-systems are presented. Deterministic model investigation by using Petri Net apparatus based on preliminary formalization is provided to analyse the effectiveness of the processes for regulated and secure access to resources.


2022 ◽  
Vol 18 (3) ◽  
pp. 1
Author(s):  
SUNIL GUPTA ◽  
Akansha Bhansiya ◽  
Mansi Saini ◽  
Amuleek Sidhu

2021 ◽  
Vol 63 ◽  
pp. 103016
Author(s):  
Preeti Soni ◽  
Arup Kumar Pal ◽  
SK Hafizul Islam ◽  
Aadarsh Singh ◽  
Priyanshu Kumar

Author(s):  
H Spoorti ◽  
R Sneha ◽  
V Soujanya ◽  
K Heena ◽  
S Pooja ◽  
...  

Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Jianfeng Ma ◽  
Ruixiao Wang ◽  
Wenbo Shi

2021 ◽  
Vol 13 (21) ◽  
pp. 11782
Author(s):  
Taha Al-Jody ◽  
Hamza Aagela ◽  
Violeta Holmes

There is a tradition at our university for teaching and research in High Performance Computing (HPC) systems engineering. With exascale computing on the horizon and a shortage of HPC talent, there is a need for new specialists to secure the future of research computing. Whilst many institutions provide research computing training for users within their particular domain, few offer HPC engineering and infrastructure-related courses, making it difficult for students to acquire these skills. This paper outlines how and why we are training students in HPC systems engineering, including the technologies used in delivering this goal. We demonstrate the potential for a multi-tenant HPC system for education and research, using novel container and cloud-based architecture. This work is supported by our previously published work that uses the latest open-source technologies to create sustainable, fast and flexible turn-key HPC environments with secure access via an HPC portal. The proposed multi-tenant HPC resources can be deployed on a “bare metal” infrastructure or in the cloud. An evaluation of our activities over the last five years is given in terms of recruitment metrics, skills audit feedback from students, and research outputs enabled by the multi-tenant usage of the resource.


2021 ◽  
Author(s):  
Alessio Catalfamo ◽  
Maria Fazio ◽  
Francesco Martella ◽  
Antonio Celesti ◽  
Massimo Villari

2021 ◽  
Vol 11 (2) ◽  
Author(s):  
Roxane SILBERMAN

Over the past twenty years, in various countries, secure access to data for the members of the research community was eased in a significant manner. Such data involve microdata and granular data from administrative records and detailed individual surveys. While some difficulties remain, the scene has been extensively redesigned, and new players emerged on both sides of the fence: data holders and users, both challenging what seemed to be well-established boundaries. In the French case, access to confidential data for research purposes has been carefully facilitated. The paper analyses the French developments and current achievements, providing insights into how obstacles can be overcome and newly emerging issues


2021 ◽  
Author(s):  
Nazatul H. Sultan ◽  
Vijay Varadharajan ◽  
Chandan Kumar ◽  
Seyit Camtepe ◽  
Surya Nepal

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yu Jiang ◽  
Hua Fu ◽  
Aiqun Hu ◽  
Wen Sun

The access control mechanism in LoRa has been proven to have high security risks. In order to improve the secure access ability of LoRa terminals, this paper presents a physical layer-based authentication system for security enhancement. Different from the security access technology of cryptography, a lightweight gateway architecture called LW-LoRaWAN is proposed to realize a data frame-based authentication with radio frequency fingerprint (RFF). A novel RFF feature of Cross Power Spectral Density (CPSD) is used to achieve a fast authentication with one single frame. Theoretical analysis and experimental results show that the proposed system not only reinforces the authentication security of LoRa network but also protects the LoRa terminals against the Sybil attacks. The LW-LoRaWAN provides new security approach from physical layer for LoRa network.


Sign in / Sign up

Export Citation Format

Share Document