首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Internet connectivity in the ITS context is a flourishing demand that has to be covered by efficient information and communication technologies. Thanks to the provision of this connectivity, not only end users will profit from communication services, but also services for controlling the operation of the vehicle will benefit from the Internet connectivity. Services related to the operation and control of the vehicles exchange sensitive data, so strong security properties have to be ensured for this type of services. In addition, because of the privacy concerns related to the end users, it is desired to provide this kind of services with an adequate security level. From the communication point of view, a vehicle can be regarded as a mobile network where nodes onboard obtain continuous and optimal Internet connectivity, so, its mobility has to be managed. In the same way, network mobility management protocols should not only avoid security leaks, but also they have to ensure an adequate security level. It is needless to say that the introduction of security properties cannot render not fulfilling service performance requirements. In fact, the trade-off between security and application performance is a must. ITS standardisation bodies have adopted the NEtwork MObility Basic Support (NEMO BS) protocol to manage the mobility of networks. However, it still presents shortcomings like lack of security support and routing problems, which leads to a bad performance. One of the most promising design approaches is to consider a base mobility management protocol that provides out of the box security and route optimisation support like the Host Identity Protocol (HIP). Different solutions based on HIP can be found to solve network mobility in the literature, but none of these solutions aim at solving securely and efficiently network mobility management. That is, the provision of security properties to the network mobility management itself and to the end-to-end data communications while not increasing the signalling overhead and the manageability level remains unsolved. In this paper, we present the NeMHIP. NeMHIP is a secure and efficient network mobility management protocol which is based on HIP. In order to demonstrate its feasibility, we have carried out a study by means of analytical modelling to assess the performance of user applications with stringent QoS requirements like VoIP. Results demonstrate that the introduction of the NeMHIP in the ITS context is feasible because security properties are ensured while application performance requirements are satisfied. Therefore, we successfully achieve the trade-off between security and performance.  相似文献   

2.
The informational context in which we live and work is becoming increasingly complex and rich, with information much more plentiful and accessible than ever before. Our informational context is also faster paced, with news and developments spreading across media and the Internet at an often astounding rate. In today's competitive world, the first response to a trend is usually the most effective. Thus far, the technology responsible for this information complexity offers little to help us quickly understand and act upon it. Although visualization is useful, its techniques are typically too slow or simply not designed to help users understand highly time-sensitive and dynamic information streams. To address this, we developed TextPool, a system that uses temporal pooling to visualize live text streams such as newswires and system telemetry. In temporal pooling, systems gather recent stream content into a buffer (pool) to use for visualization. Because the stream continues to flow through the pool in real time, the visualization must be dynamic, using motion to respond to the pool's changing content. The TextPool system processes live text streams in real time using information retrieval techniques, extracts the most frequently occurring salient terms from the buffered streams, and displays related terms next to one another in a dynamic text collage.  相似文献   

3.
To perform automatic, unconscious inference, the human brain must solve the binding problem by correctly grouping properties with objects. Temporal binding models like SHRUTI already suggest much of how this might be done in a connectionist and localist way by using temporal synchrony. We propose a set of alternatives to temporal synchrony mechanisms that instead use short signatures. This serves two functions: it allows us to explore an additional biologically plausible alternative, and it allows us to extend and improve the capabilities of these models. These extensions model the human ability to both perform unification and handle multiple instantiations of logical terms. To verify our model's feasibility, we simulate it with a computer system modeling simple, neuron-like computations.  相似文献   

4.
随着计算机技术的飞速发展,计算机信息安全问题越来越受关注。各种计算机病毒的泛滥,各种木马猖獗,各种黑客事件曝光等等问题。可以说互联网的计算机都是不安全的,这些计算机可以被网上的任一台计算机攻击,即使不联网,也可能被强行插入的物理设备携带的病毒攻击。如何保护我们计算机的信息安全不被侵犯是我们目前面临的问题。本文介绍了计算机信息安全技术的概要,并详细探讨了目前计算机的各种信息安全防护技术。告诉读者如何才能通过各种方式保护计算机信息,营造一个安全的计算机防护系统。  相似文献   

5.
Fog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed. As the Fog layer has direct access to data streams generated by IoT devices and responses/commands sent from the Cloud, it is in a critical position in terms of security of the entire IoT system. Currently, there is no specific tool or methodology for analysing the security of Fog computing systems in a comprehensive way. Generic security evaluation procedures applicable to most information technology products are time consuming, costly, and badly suited to the Fog context. In this article, we introduce a methodology for evaluating the security of Fog computing systems in a systematic way. We also apply our methodology to a generic Fog computing system, showcasing how it can be purposefully used by security analysts and system designers.  相似文献   

6.
With inereasing power, miniaturization, and thin-client/NetPC structures, people will soon be able to access the full network environment wherever they are. Information access points/appliances will be built into the walls, incorporated into our working environments, carried and even worn by us, and used as an integral part of most of our daily activities.At the same time, as the Internet and information technologies are being woven into the fabric of education, business, and daily life, greater attention is being focused on whether the ordinary person, including those with disabilities, will be able to access and use these systems.It is interesting that these two seemingly different objectives have similar solutions. If we design systems which are truly ubiquitous and nomadic; that we can use whether we are walking down the hall, driving the car, sitting at our workstation, or sitting in a meeting; that we can use when we're under stress or distracted; and that make it easy for us to locate and use new services — we will have created systems which are accessible to almost anyone with a physical or sensory disability. We will also have gone a long way to creating systems that are usable by a large percentage of the population who currently find systems aversive or difficult to learn. In addition, strategies and ideas developed for people with disabilities can provide valuable techniques and insights into creating devices for all nomadic computer users.  相似文献   

7.
The web has become the largest repository of multimedia information and its convergence with telecommunications is now bringing the benefits of web technology to hand-held devices. To optimize data access using these devices and provide services which meet the user needs through intelligent information retrieval, the system must sense and interpret the user environment and the communication context. In addition, natural spoken conversation with handheld devices makes possible the use of these applications in environments in which the use of GUI interfaces is not effective, provides a more natural human-computer interaction, and facilitates access to the web for people with visual or motor disabilities, allowing their integration and the elimination of barriers to Internet access. In this paper, we present an architecture for the design of context-aware systems that use speech to access web services. Our contribution focuses specifically on the use of context information to improve the effectiveness of providing web services by using a spoken dialog system for the user-system interaction. We also describe an application of our proposal to develop a context-aware railway information system, and provide a detailed evaluation of the influence of the context information in the quality of the services that are supplied.  相似文献   

8.
Identification is becoming increasingly problematic in the halls of smoke and mirrors we call ‘cyberspace’. The identity question raises its head in the context of the origin of mass-mailing viruses and worms; the relentless avalanche of spam; electronic identity theft; Internet fraud and cybersquatters. How do we recognise and respond to email address spoofing? How should we react to the evil spammer? Why must we remain vigilant in defence of our financial details and what is our recourse in the event of identity theft and fraud? How we choose to resolve these issues could determine our future freedom of use of the Internet, and a clearer understanding should allow us to navigate safely some potentially hazardous waters ahead.  相似文献   

9.
IPv6的安全问题探讨   总被引:7,自引:1,他引:7  
面临全球IP地址耗尽的问题,人们通过采用无分类编址CIDR和网络地址转换NAT等方法来推后其耗尽的日期,但最根本的办法还是IPv6。IPv4向IPv6过渡是一个逐步演进的过程,目前,已经有数目惊人的IPv6测试网络遍布全球,有必要认真关注IPv6的动向,本文对IPv6中的验证和加密两种安全机制进行了研究,探讨了它们的应用情况,并分析了IPv6安全和其他服务互通的问题。  相似文献   

10.
11.
Abstract

Time has always been a major factor in the way information professionals provide information and function on a daily basis. There always seems to be more things to do or use in the same amount of time. The Internet has added a new twist to the way informa–tion professionals do their jobs and what patrons expect from libraries. The Internet can be used for scholarly and personal information pursuits. Balance is the key for the information professional and the patron. Electronic access does not always mean better. And we have a responsibility to use the Internet in the same way that all sources are used.  相似文献   

12.
In recent years considerable attention has been focused on the potential of the Internet as a means of health information delivery that can meet varied health information needs and empower patients. In this article, we explore utilization of the Internet as a means of health information consumption amongst young women with breast cancer who were known Internet users. Focusing on a population known to be competent at using the Internet allowed us to eliminate the digital divide as a possible explanation for limited use of the Internet for health information‐seeking. Ultimately, this allowed us to demonstrate that even in this Internet savvy population, the Internet is not necessarily an unproblematic means of disseminating health care information, and to demonstrate that the huge amount of health care information available does not automatically mean that information is useful to those who seek it, or even particularly easy to find. Results from our qualitative study suggest that young women with breast cancer sought information about their illness in order to make a health related decision, to learn what would come next, or to pursue social support. Our respondents reported that the Internet was one source of many that they consulted when seeking information about their illness, and it was not the most trusted or most utilized source of information this population sought.  相似文献   

13.
随着计算机网络的日益普及,信息网络安全事件日益增多。防火墙作为保护本地系统及网络不受基于网络的安全威胁的有效办法,引起越来越多的关注。本文从防火墙的基本概念、特征、技术方法出发,探讨了防火墙的发展现状,并对其未来发展趋势做出了展望。  相似文献   

14.
互联网在给人们工作、生活带来快捷便利的同时,也能产生巨大的负面效应。为维护互联网健康有序和谐稳定发展局面,必须加强对互联网的依法管控。目前,我国针对互联网管控出台了一系列法律法规,多个管理部门也在依法履行管控职能,但在管控过程中还存在诸多问题,实际管控效果不尽人意。在当前互联网发展新形势下,需要分析借鉴国外先进的管控经验,从法律制订、法律遵循、法律实施等多方面去进一步健全完善我国互联网管控法律体系。  相似文献   

15.
As the Internet has been commonly used in our everyday lives, we have been able to obtain large amount of information from it, whereas we have simultaneously had a problem that it is difficult to find proper information for us from the large amount of information on the Web. Although many information recommendation methods have been proposed in order to solve this problem, most recommendation methods are based on a large amount of user’s personal data such as operation log, schedule, etc – which means that we have to manage a large amount of personal data in the system in order to provide proper information to users, and it would be expensive to construct such a system. With this background, in this study, against aiming to construct a sophisticated information recommendation system based on large personal data, we propose a handy and not expensive information recommendation method, working beside a normal search engine, which does not depend on user profile data, but on topical news information.
Ichiro KobayashiEmail:
  相似文献   

16.
17.
The technology available to building designers now makes it possible to monitor buildings on a very large scale. Video cameras and motion sensors are commonplace in practically every office space, and are slowly making their way into living spaces. The application of such technologies, in particular video cameras, while improving security, also violates privacy. On the other hand, motion sensors, while being privacy-conscious, typically do not provide enough information for a human operator to maintain the same degree of awareness about the space that can be achieved by using video cameras. We propose a novel approach in which we use a large number of simple motion sensors and a small set of video cameras to monitor a large office space. In our system we deployed 215 motion sensors and six video cameras to monitor the 3,000-square-meter office space occupied by 80 people for a period of about one year. The main problem in operating such systems is finding a way to present this highly multidimensional data, which includes both spatial and temporal components, to a human operator to allow browsing and searching recorded data in an efficient and intuitive way. In this paper we present our experiences and the solutions that we have developed in the course of our work on the system. We consider this work to be the first step in helping designers and managers of building systems gain access to information about occupants' behavior in the context of an entire building in a way that is only minimally intrusive to the occupants' privacy.  相似文献   

18.
分布式拒绝服务攻击:原理和对策   总被引:7,自引:0,他引:7  
1 引言随着网络技术的发展,Internet正以迅猛强劲之势渗透到社会的各个层面。无论是在商业领域、教育科研机构或政府组织,人们日益感受到它的潜在魅力与巨大益处,从网上信息发布到电子商务,从个人主页到公司广告,从虚拟社区到政府上网,我们的生活和工作都因Internet而增添了新的内容和形式。Internet设计  相似文献   

19.
The mobile Internet introduces new opportunities to gain insight in the user’s environment, behavior, and activity. This contextual information can be used as an additional information source to improve traditional recommendation algorithms. This paper describes a framework to detect the current context and activity of the user by analyzing data retrieved from different sensors available on mobile devices. The framework can easily be extended to detect custom activities and is built in a generic way to ensure easy integration with other applications. On top of this framework, a recommender system is built to provide users a personalized content offer, consisting of relevant information such as points-of-interest, train schedules, and touristic info, based on the user’s current context. An evaluation of the recommender system and the underlying context recognition framework shows that power consumption and data traffic is still within an acceptable range. Users who tested the recommender system via the mobile application confirmed the usability and liked to use it. The recommendations are assessed as effective and help them to discover new places and interesting information.  相似文献   

20.
Recent advancement in cameras and image processing technology has generated a paradigm shift from traditional 2D and 3D video to multi-view video (MVV) technology, while at the same time improving video quality and compression through standards such as high efficiency video coding (HEVC). In multi-view, cameras are placed in predetermined positions to capture the video from various views. Delivering such views with high quality over the Internet is a challenging prospect, as MVV traffic is several times larger than traditional video, since it consists of multiple video sequences, each captured from a different angle, requiring more bandwidth than single-view video to transmit MVV. In addition, the Internet is known to be prone to packet loss, delay, and bandwidth variation, which adversely affect MVV transmission. Another challenge is that end users’ devices have different capabilities in terms of computing power, display, and access link capacity, requiring MVV to be adapted to each user’s context. In this paper, we propose an HEVC multi-view system using Dynamic Adaptive Streaming over HTTP to overcome the above-mentioned challenges. Our system uses an adaptive mechanism to adjust the video bit rate to the variations of bandwidth in best effort networks. We also propose a novel scalable way for the multi-view video and depth content for 3D video in terms of the number of transmitted views. Our objective measurements show that our method of transmitting MVV content can maximize the perceptual quality of virtual views after the rendering and hence increase the user’s quality of experience.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号