Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Document Types "Chapter"
Now showing items 1-20 of 317
-
0-RTT Key Exchange with Full Forward Secrecy
(Chapter, 2017)Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particular interest in this ... -
5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
(Chapter, 2020)The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress ... -
A Basic Result on the Superposition of Arrival Processes in Deterministic Networks
(Chapter, 2018)Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ... -
A Comparison between Business Process Management and Information Security Management
(Chapter, 2014)Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ... -
A connectionless multicast protocol for MANETs
(2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter, 2012)In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ... -
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility
(Chapter, 2019)The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ... -
A Fault-Tolerant and Consistent SDN Controller
(Chapter, 2016)Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ... -
A Framework for the Information Classification in ISO 27005 Standard
(Chapter, 2017)Information Security Risk Management (ISRM) process involves several activities to conduct a risk management (RM) task in an organization. ISRM activities require access to various information related to the organization. ... -
A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
(Chapter, 2017)SDN network's policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting ... -
A modeling approach for dependability analysis of smart distribution grids
(Chapter, 2018)The distribution grids are among the most critical infrastructures which integrates advanced control and communication technologies atop of power systems. This paper presents a comprehensive modeling framework suited to ... -
A scalable resource allocation scheme for NFV: Balancing utilization and path stretch
(Chapter, 2018)Network Function Virtualization (NFV) implements network middlebox functions in software, enabling them to be more flexible and dynamic. NFV resource allocation methods can exploit the capabilities of virtual- ization to ... -
A Security Policy Infrastructure for Tactical Service Oriented Architectures
(Chapter, 2017)Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ... -
A Survey on Network Resiliency Methodologies against Weather-based Disruptions
(Chapter, 2016)Due to the increasing dependence on network ser- vices of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large- scale failures, as in case of disaster ... -
A Taxonomy of Challenges in Information Security Risk Management
(Chapter, 2013)Risk Management is viewed by many as the cornerstone of information security and is used to determine what to protect and how. How to approach risk management for information security is an ongoing debate as there are ... -
A Taxonomy of Situations within the Context of Risk Analysis
(Chapter, 2019)Prediction of deliberate human decisions with potential negative impact on others would have great practical and scientific utility. The Conflicting Incentives Risk Analysis (CIRA) method defines risk as a result of ... -
AccountabilityFS: A File System Monitor for Forensic Readiness
(Chapter, 2014)We present a file system monitor, AccountabilityFS, which prepares an organization for forensic analysis and incident investigation in advance by ensuring file system operation traces readily available. We demonstrate the ... -
Accuracy vs. Cost Trade-off for Machine Learning Based QoE Estimation in 5G Networks
(Chapter, 2020)Since their first release, 5G systems have been enhanced with Network Data Analytics Functionalities (NWDAF) as well as with the ability to interact with 3rd parties' Application Functions (AFs). Such capabilities enable ... -
Achieving dependability in software-defined networking - a perspective
(Chapter, 2015)In this paper we take a closer look at the operationof software defined networking (SDN) in intra-domain networks.The focus is on the dependability issues related to interworking ofSDN controllers, network OS (NOS), and ... -
Achieving Guaranteed Performance for Protection Traffic in Smart Grid Wide- Area Networks
(Chapter, 2019)Recent years, tele-protection applications in utility grids have been deployed using Ethernet. However, Ethernet without Time Sensitive Network (TSN) mechanisms is non-deterministic. Hence, challenges of the queuing delays ... -
Action-Independent Generalized Behavioral Identity Descriptors for Look-alike Recognition in Videos
(Chapter, 2020)There is a long history of exploitation of the visual similarity of look-alikes for fraud and deception. The visual similarity along with the application of physical and digital cosmetics greatly challenges the recognition ...