Results 1 - 10
of
123
MetaDisk A Blockchain-Based Decentralized File Storage Application
, 2014
"... v1.01 MetaDisk is an open source software project seeking to prove concep-tually that cloud storage applications can be made more decentralized, more secure, and more efficient. In addition, MetaDisk provides a proto-typing platform for a fully decentralized network. In pursuit of this goal, we prop ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
propose developing a web application that provides an interface for non-technical users, and an underlying API for native applications and feature extensions. A cryptocurrency will serve as both an incentive and payment mechanism while a separate blockchain will be used as a datas-tore for file metadata
Living Lab Approach For Developing Massmarket IoT Products And Services
"... Abstract: Internet of Things (IoT) has emerged as a central concept in both the industrial as in the academic world. In this context, Living Lab research has been shown as an effective means for the design, implementation, development, testing and validation of Internet of Things system’s pervasiven ..."
Abstract
- Add to MetaCart
pervasiveness. However, IoT products are not yet designed based on the needs of a larger, non-technical group of end-users. Therefore, in this paper we describe the AllThingsTalk Living Lab research track in which tangible end-user products are defined to be implemented on an online IoT platform. More
Transaction on IoT and Cloud Computing 2015 A Survey on Application Layer Protocols for the Internet of Things
"... It has been more than fifteen years since the term Internet of Things (IoT) was in-troduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT archite ..."
Abstract
- Add to MetaCart
architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The frame-work that current IoT platforms use consists mostly in technologies that partially fulfill some of the IoT requirements. While developers employ existing technologies
Ecosystem-Driven Design of In-Home Terminals Based on Open Platform for the
"... Abstract—In-home healthcare services based on the Internet-of-Things (IoT) have great business potentials. To turn it into reality, a business ecosystem should be established first. Technical solutions should therefore aim for a cooperative ecosystem by meeting the interoperability, security, and sy ..."
Abstract
- Add to MetaCart
Abstract—In-home healthcare services based on the Internet-of-Things (IoT) have great business potentials. To turn it into reality, a business ecosystem should be established first. Technical solutions should therefore aim for a cooperative ecosystem by meeting the interoperability, security
1 Ecosystem-Driven Design of In-Home Terminals Based on Open Platform for the Internet-of-Things
"... Abstract—In-home healthcare services based on the Internet-of-Things (IoT) have great business potentials. To turn it into reality, a business ecosystem should be established first. Technical solutions should therefore aim for a cooperative ecosystem by meeting the interoperability, security, and sy ..."
Abstract
- Add to MetaCart
Abstract—In-home healthcare services based on the Internet-of-Things (IoT) have great business potentials. To turn it into reality, a business ecosystem should be established first. Technical solutions should therefore aim for a cooperative ecosystem by meeting the interoperability, security
Improving End-user Security and Trustworthiness of TCG-Platforms
- GI-FACHTAGUNG, FRANKFURT
, 2003
"... Over the last two years, the computing industry has started various initiatives to increase computer security be means of new hardware. The most notable effort is the Trusted Computing Group (TCG, former TCPA), which unites most important companies to develop a standard for security hardware. While ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
efforts towards more security are generally appreciated, the new technology has raised fears that the user will lose control over his platform, and that its extensive use would harm competition in several areas of IT technology. In this paper, technical modifications to the TCPA Specification (based
Andersson et al. Issues in the Development of a Communication Platform Issues in the Development of a Mobile based Communication Platform for the Swedish Police Force and Appointed Security Guards
"... This paper presents the learning experiences from the development of a mobile-based communication platform, called OrdningsVaktsCentralen (OVC). OVC can be translated to Security Guard Central. OVC is designed to enable the Swedish Police Force (SPF) to comply with new legal requirements and enhance ..."
Abstract
- Add to MetaCart
This paper presents the learning experiences from the development of a mobile-based communication platform, called OrdningsVaktsCentralen (OVC). OVC can be translated to Security Guard Central. OVC is designed to enable the Swedish Police Force (SPF) to comply with new legal requirements
© Rinton Press AN XML-BASED PLATFORM FOR E-GOVERNMENT SERVICES DEPLOYMENT
, 2003
"... Transaction services that enable the on-line acquisition of information, the submission of forms and tele-voting, are currently viewed as the future of E-Government. Deploying such services requires platform independent access and communications security as a basis. This paper presents a platform fo ..."
Abstract
- Add to MetaCart
for supporting E-Government services in a highly distributed public network environment, based on XML protocols. We discuss the technical details of the developed software that implements these XML protocols. The platform relies on the well-established IPsec and SSL/TLS technologies for ensuring the security
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
A Pessimistic Approach to Trust in Mobile Agent Platforms
, 2000
"... eats from a malicious service provider include trying to obtain payment data without providing the service or trying to remove information about a better offer from the agent's memory, thereby tricking it into accepting the malicious provider's offer. The usual approach to protecting mobi ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
mobile agents is to assume that service providers are trusted principals that behave correctly. 3 Although the importance of trust has long been recognized as paramount for the development of secure systems, the meaning associated with trust or a trusted principal is seldom clearly defined
Results 1 - 10
of
123