Search results

1 – 10 of 12
Content available
Article
Publication date: 3 April 2009

Jong Hyuk Park, Stefanos Gritzalis and Ching-Hsien Hsu

457

Abstract

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 17 September 2019

Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia and Jong Hyuk Park

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while…

550

Abstract

Purpose

The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Design/methodology/approach

The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.

Findings

Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions.

Originality/value

Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.

Details

The Electronic Library, vol. 37 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 3 April 2009

Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park and Spyros Kokolakis

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

1453

Abstract

Purpose

This paper aims to contribute to the ongoing discourse about the nature of privacy and its role in ubiquitous environments and provide insights for future research.

Design/methodology/approach

The paper analyses the privacy implications of particular characteristics of ubiquitous applications and discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data.

Findings

A significant trend towards shifting privacy protection responsibility from government to the individuals is identified. Also, specific directions for future research are provided with a focus on interdisciplinary research.

Research limitations/implications

This paper identifies key research issues and provides directions for future research.

Originality/value

This study contributes by identifying major challenges that should be addressed, so that a set of “fair information principles” can be applied in the context of ubiquitous environments. It also discusses the limitations of these principles and provides recommendations for future research.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Sajid Hussain, Firdous Kausar, Ashraf Masood and Jong Hyuk Park

As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because…

Abstract

Purpose

As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because they provide better performance and security solutions for scalable applications in dynamic environments. Random key pre‐distribution schemes are vulnerable to collusion attacks. The purpose of this paper is to propose an efficient collusion resistant security mechanism for heterogeneous sensor networks.

Design/methodology/approach

The authors consider a heterogeneous sensor network (HSN) consists of a small number of powerful high‐end H‐sensors and a large number of ordinary low‐end L‐sensors. However, homogeneous sensor network (MSN) consists of only L‐sensors. Since the collusion attack on key pre‐distribution scheme mainly takes advantage of the globally applicable keys, which are selected from the same key pool, they update the key ring after initial deployment and generate new key rings by using one‐way hash function on nodes' IDs and initial key rings. Further, in the proposed scheme, every node is authenticated by the BS in order to join the network.

Findings

The analysis of the proposed scheme shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys near the compromised nodes, while other keys in the network remain safe.

Originality/value

The proposed key management scheme described in the paper outperforms the previous random key pre‐distribution schemes by: considerably reducing the storage requirement, and providing more resiliency against node capture and collusion attacks.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Geon Woo Kim, Deok Gyu Lee, Jong Wook Han, Seung Hyun Lee and Sang Wook Kim

The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the…

2223

Abstract

Purpose

The purpose of this paper is to identify security technologies that are essential in making home network systems secure and to describe specialized security mechanisms for the home network and the relationships among them.

Design/methodology/approach

The research model is designed to support three functions: authentication, authorization, and security policy. Authentication is tested in several methodologies such as id/pw, certificate, or bio; authorization is tested using RBAC methodologies; and security policy is specified using newly‐designed script language, such as xHDL.

Findings

The findings for “authentication” suggest that home network users can access services conveniently and securely. In addition, the findings for “security policy” suggest that security policy for home network requires specialized rather than general specification.

Practical implications

The paper identifies three security functions essential for home network: authentication that supports most existing authentication mechanisms, so as to maximize user accessibility; authorization that is middleware‐independent and beyond the physical transport layer; and security policy optimized for the home network environment.

Originality/value

The paper focuses on an implementation‐based security model for the home network. Though interest and research in home network security are increasing, only limited authentication applications have been adopted in real deployment up to now. This paper introduces an integrated security model and emphasizes safety and convenience so as to promote reliability in home network services.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Shunshan Piao, Jeongmin Park and Eunseok Lee

This paper seeks to develop an approach to problem localization and an algorithm to address the issue of determining the dependencies among system metrics for automated system…

Abstract

Purpose

This paper seeks to develop an approach to problem localization and an algorithm to address the issue of determining the dependencies among system metrics for automated system management in ubiquitous computing systems.

Design/methodology/approach

This paper proposes an approach to problem localization for learning the knowledge of dynamic environment using probabilistic dependency analysis to automatically determine problems. This approach is based on Bayesian learning to describe a system as a hierarchical dependency network, determining root causes of problems via inductive and deductive inferences on the network. An algorithm of preprocessing is performed to create ordering parameters that have close relationships with problems.

Findings

The findings show that using ordering parameters as input of network learning, it reduces learning time and maintains accuracy in diverse domains especially in the case of including large number of parameters, hence improving efficiency and accuracy of problem localization.

Practical implications

An evaluation of the work is presented through performance measurements. Various comparisons and evaluations prove that the proposed approach is effective on problem localization and it can achieve significant cost savings.

Originality/value

This study contributes to research into the application of probabilistic dependency analysis in localizing the root cause of problems and predicting potential problems at run time after probabilities propagation throughout a network, particularly in relation to fault management in self‐managing systems.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Rodrigo Roman and Javier Lopez

This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology…

2701

Abstract

Purpose

This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology mechanisms are suitable and can be applied in this context.

Design/methodology/approach

The paper considers the possible approaches that can be used to connect a WSN with the internet, and analyzes the security of their interactions.

Findings

By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely. There are other challenges to be solved if the sensor nodes are integrated into the internet infrastructure, although there exists interesting advances on his matter.

Research limitations/implications

The complete integration of sensor networks and the internet still remains as an open issue.

Practical implications

With the current state of the art, it is possible to develop a secure sensor network that can provide its services to internet hosts with certain security properties.

Originality/value

The paper studies the interactions between sensor networks and the internet from the point of view of security. It identifies both solutions and research challenges.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

Yuan‐Chu Hwang and Soe‐Tsyr Yuan

The authors seek to propose the notion of ubiquitous proximity e‐service for exploring collective wisdom in the ubiquitous environment. Ubiquitous proximity e‐service highlights…

Abstract

Purpose

The authors seek to propose the notion of ubiquitous proximity e‐service for exploring collective wisdom in the ubiquitous environment. Ubiquitous proximity e‐service highlights the collective effort focused on collecting the user group's power as the reference for ubiquitous trust decisions.

Design/methodology/approach

This paper provides some theoretical utility support for ubiquitous proximity e‐service. The “homophily” describes the tendency of individuals to associate and bond with similar others. By highlighting the “homophily” of e‐service participants, these isolated individuals can be treated as a group with proximity. The main value of ubiquitous proximity e‐service utilizes the network effect from the collective effort of interpersonal social network.

Findings

In order to leap the trust barrier for users to embrace these ubiquitous e‐services, ubiquitous proximity e‐service makes it possible for users to collaborate with their nearby user groups to establish a reliable and trustworthy interaction environment. The simulation outcomes for trust decision quality enhancement show a significant improvement in a variety of environment settings.

Practical implications

A significant value of ubiquitous proximity e‐service lies in the increased possibility of establishing innovative social network relationships. From the interpersonal perspective, unfamiliar strangers can make connections with individuals who are proximal and homoplastic to them. The strength of proximity gives people better chances to make interpersonal connections, including both weak ties and strong ties. By combining those interpersonal tie relationships, ubiquitous proximity e‐service can easily cause information diffusion and effectively encourage collective wisdom.

Originality/value

The paper advocates the utility of ubiquitous proximity e‐service that can be realized in the e‐commerce environment and which enables information diffusion effectively.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 3 April 2009

U.M. Mbanaso, G.S. Cooper, David Chadwick and Anne Anderson

This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the…

Abstract

Purpose

This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control.

Design/methodology/approach

Existing access control and privacy protection systems are typically unilateral and provider‐centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user‐centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties.

Findings

The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today.

Practical implications

This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery.

Originality/value

The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 25 October 2019

Nafis Ahmad, Md Golam Rabbany and Syed Mithun Ali

The purpose of this paper is to explore organizational and human factor-related challenges to information technology (IT) service management standard ISO 20000 in an emerging…

Abstract

Purpose

The purpose of this paper is to explore organizational and human factor-related challenges to information technology (IT) service management standard ISO 20000 in an emerging economy context. Then, this research has proposed some implications of the challenges to implementing environmental sustainability and circular economy.

Design/methodology/approach

To fulfill the research purpose, an empirical study was undertaken. The data required for the current study, based on a Likert scale and using questionnaires, were collected through surveys, interviews, telephonic conversations and meetings with IT firm managers and staff. The ranking of challenges was obtained based on the mean and standard deviation calculated from the survey responses.

Findings

The results indicated that senior management support was the most significant challenge for the successful implementation of IT Service Management systems. Other significant challenges were the justification of significant investment, premium customer support, co-operation and co-ordination among IT support teams, proper documentation and effective process design.

Practical implications

The current research is expected to help IT managers implement ISO 20000 and to manage environmental sustainability and circular economy across their organizational networks.

Originality/value

To the best of the authors’ knowledge, the current study is the first attempt to explore the organizational and human factor-related challenges to ISO 2000 in an emerging economy context. Furthermore, the current study proposes implications to the challenges to environmental sustainability and circular economy.

Details

International Journal of Manpower, vol. 41 no. 7
Type: Research Article
ISSN: 0143-7720

Keywords

Access

Year

Content type

Article (12)
1 – 10 of 12