Дисертації з теми "Secure Services"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Secure Services".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.
Повний текст джерелаAli, Mazhar. "Towards Secure Cloud Storage Services." Diss., North Dakota State University, 2015. http://hdl.handle.net/10365/24802.
Повний текст джерелаHines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.
Повний текст джерелаOne of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.
Повний текст джерелаGuerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.
Повний текст джерелаSensor deployments are becoming more and more common nowadays and the ways to access them are becoming more standardized. Indeed, users want to access sensor data via the Internet and without using some complex and unknown protocol; enter Web Services. By observing the typical system architecture for relaying sensor information to the web, we identified out of a large group of security issues a particular one. The issue in question is user privacy.
In this thesis we focus on hiding the activity of a user who queries a sensor deployment, from an attacker that can listen to communications in the neighborhood of the network. Our goal is to generate extra traffic in an intelligent way so that it can effectively mask user activity without draining the energy from the sensors.
Hayton, Richard. "An open architecture for secure interworking services." Thesis, University of Cambridge, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313860.
Повний текст джерелаPotebenko, Maria, and Alina Shliakhovska. "Secure environment for e-services in Ukraine." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51120.
Повний текст джерелаThe concept of e-service represents one prominent application of utilizing the use of information and communication technologies in different areas. Basically, there are three main components: service provider, service receiver and the channels of service delivery. For example, as concerned to public e-service, public agencies are the service provider and citizens as well as businesses are the service receiver. The channel of service delivery is the third requirement of e-service. Internet is the main channel of e-service delivery while other classic channels are also considered.
Концепція електронного сервісу являє собою одне з видатних застосувань використання інформаційно-комунікаційних технологій у різних сферах. В основному, є три основні компоненти: постачальник послуг, приймач послуг та канали надання послуг. Наприклад, що стосується державної електронної послуги, державні установи є постачальником послуг, а громадяни, а також підприємства - отримувачами послуг. Канал надання послуг є третьою вимогою електронної послуги. Інтернет є основним каналом надання електронних послуг, тоді як інші класичні канали також розглядаються.
Barnes, Cheontell Marie. "Relating following aggression : women's medium secure services." Thesis, University of Essex, 2015. http://repository.essex.ac.uk/16837/.
Повний текст джерелаKrohn, Maxwell (Maxwell N. ). "Building fast and secure Web services with OKWS." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34364.
Повний текст джерелаIncludes bibliographical references (p. 69-74).
OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, OKWS shows performance improvements compared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWS's throughput and responsiveness exceed that of Apache 2, Flash and Haboob. Experience with OKWS in a commercial deployment suggests it can reduce hardware and system management costs, while providing security guarantees absent in current systems. In the end, lessons gleaned from the OKWS project provide insight into how operating systems might better facilitate secure application design.
by Maxwell Krohn.
S.M.
Li, Hong Ping. "Secure proximity queries in mobile geo-social services." HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_ra/1551.
Повний текст джерелаFabian, Benjamin. "Secure name services for the internet of things." Doctoral thesis, Humboldt-Universität zu Berlin, Wirtschaftswissenschaftliche Fakultät, 2008. http://dx.doi.org/10.18452/15829.
Повний текст джерелаThe term Internet of Things (IOT) describes an emerging global, Internet-based information service architecture for RFID-tagged items (Radio-Frequency Identification). In the vision of its proponents, this IOT will facilitate information exchange about goods in global supply chain networks, increase transparency, and enhance their efficiency. Name Services for the IOT are distributed systems that serve the following fundamental lookup function: Given an identifier for a real-world object, e.g., an Electronic Product Code (EPC), they return a list of Internet addresses of services, which offer additional information about this object. This thesis discusses the information security challenges involved in the design and use of an IOT Name Service (IOTNS). Our main contributions are the following: First, the requirements for an IOTNS are collected and discussed, including multilateral security and the client perspective, which have been neglected in IOT standards and research literature so far. Second, we conduct a detailed security analysis of the most influential standard Object Naming Service (ONS). This extends our previous article that initiated this new research line in the field of RFID and IOT security. Third, enhancements to ONS are discussed, which could mitigate some of the ONS security shortcomings in an evolutionary way without completely abandoning the established standard. In particular, we describe an architecture and prototype for Multipolar ONS, which reduces international dependency on a single country controlling the ONS Root. Fourth, we present a new IOTNS architecture based on Distributed Hash Tables (DHT) and its implementation on the research platform PlanetLab. This architecture is shown to offer enhanced overall security compared to ONS while delivering equivalent or even better functionality, scalability, and performance.
Clarke, William Francis Eugene. "Therapeutic community principles and practice within a secure environment." Thesis, University of Brighton, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304526.
Повний текст джерелаWatson, William. "Haven of change : the history of a secure psychiatric hospital." Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.259691.
Повний текст джерелаGorgun, Ilhami. "Deploying And Invoking Secure Web Services Over Jxta Framework." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605915/index.pdf.
Повний текст джерелаWSSecurity&rdquo
, &ldquo
XML Key Management Specification&rdquo
, &ldquo
WS-Trust&rdquo
and &ldquo
WSSecurityPolicy&rdquo
are exploited. &ldquo
WS-Security&rdquo
is primarily a specification for an XML-based security metadata container, and is a building block for the specifications &ldquo
WS-Trust&rdquo
and &ldquo
WS-SecurityPolicy&rdquo
. &ldquo
WS-Trust&rdquo
defines the process of how to acquire security tokens. Within the peer-to-peer network that is proposed with this work, a peer is dedicated to act as a &ldquo
trusted third party&rdquo
and to manage the processes for incorporating the security of public-key infrastructure, which is defined by &ldquo
XML Key Management Specification&rdquo
. In addition, the same peer is dedicated to manage to acquire security tokens, which is defined by &ldquo
WS-Trust&rdquo
. As for &ldquo
WS-SecurityPolicy&rdquo
, Web service invoking peers conform to this specification that specifies how to define security assertions stating Web service provider&rsquo
s preferences and requirements. This work realizes and achieves the necessity of bringing together the technologies mentioned above in order to propose an architecture of secure SOAP messaging for Web service invocation in peer-to-peer environment that is provided by the JXTA framework. The work presented in this thesis is realized as a part of the SATINE project funded by the European Commission.
Poroye, Adeola Oluwaseyi. "Secure contactless mobile financial services with near field communication." Thesis, University of the Western Cape, 2011. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_3849_1320751857.
Повний текст джерелаSingh, Aameek. "Secure Management of Networked Storage Services: Models and Techniques." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-04092007-004039/.
Повний текст джерелаLiu, Ling, Committee Chair ; Aberer, Karl, Committee Member ; Ahamad, Mustaque, Committee Member ; Blough, Douglas, Committee Member ; Pu, Calton, Committee Member ; Voruganti, Kaladhar, Committee Member.
Tan, Juan Jim. "Adaptive management and interoperability for secure semantic open services." Thesis, Queen Mary, University of London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418306.
Повний текст джерелаEl, jaouhari Saad. "A secure design of WoT services for smart cities." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0120/document.
Повний текст джерелаThe richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network
Dhillon, Gurmit. "Developing a CBT manual for adult inpatient secure services." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/374544/.
Повний текст джерелаSun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.
Повний текст джерелаPh. D.
Mumtaz, Majid. "Security Services for Mobile Applications." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.
Повний текст джерелаChen, Shujuan. "Secure Real-time Services for Wireless Sensor Networks in Contiki." Thesis, KTH, Reglerteknik, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-106231.
Повний текст джерелаErlandsson, Fredrik, and Daniel Evertsson. "S-UDDI : using Web services, the Secure and Trustworthy way." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5573.
Повний текст джерелаSajjad, Ali. "A secure and scalable communication framework for inter-cloud services." Thesis, City University London, 2015. http://openaccess.city.ac.uk/14415/.
Повний текст джерелаKounga, Gina. "Strong authentification for providing secure services in ad hoc networks." Versailles-St Quentin en Yvelines, 2009. http://www.theses.fr/2009VERS0047.
Повний текст джерелаEntity authentification is a precondition to provide secure services in ad hoc networks. In order to define an entity authentification solution that suits the characteristics of ad hoc networks, we do an in-depth analysis of existing authentification solutions and how they have been adapted to work in mobile ad hoc networks. This permits to identify their limitations as well as the problems that still need to be solved. We then propose a first solution that solves these remaining problems. It is improved in a second solution that additionally permits each node to manage alone its cryptographic key pairs. The authenticity of such generated public keys can be verified without accessing any third party. We finally use this improved solution to define three secured applications that first highlight how that solution can be used to fulfil various security requirements and that second permits to generate some revenues in ad hoc networks. The first application permits individuals to buy some multimedia resources in ad hoc networks. Non-repudiation is provided to guarantee that at the end of a transaction the buying node receives the resource it has bought and is able to view or play it. It is further provided to guarantee that the selling node is sure that it will be paid for having sold the resource. The second application permits vehicles to exchange anonymously some safety information and to evaluate the reliability of this information. The third application finally permits nodes to negociate and provide the access to a fixed network in a way that avoids defrauding. The performances of the improved solution, on wich these applications rely, show that it can be used on mobile device
Mutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
Evdokimov, Sergei. "Secure outspurcing of IT services in a non-trusted environment." Doctoral thesis, Humboldt-Universität zu Berlin, Wirtschaftswissenschaftliche Fakultät, 2008. http://dx.doi.org/10.18452/15821.
Повний текст джерелаThis thesis considers the possibilities of secure outsourcing of databases and of content-based routing operations to an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions of the thesis are the following: - We explore the applicability of cryptographic constructs that allow performing operations over encrypted data, also known as privacy homomorphisms, for creating protocols that could enable secure database outsourcing. We also describe a framework for secure database outsourcing that is based on searchable encryption schemes, and prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with regard to certain parameters: compared to the existing works, the proposed scheme allows for performing a larger number of operations over a securely outsourced database and has significantly lower chances of returning erroneous results of a search. - We propose an approach for managing discretionary access to securely outsourced and encrypted databases. Compared to existing techniques, our approach is applicable to more general scenarios, is simpler and has similar performance characteristics. - We examine possibilities of performing a secure content-based routing by building a formal security model that describes a secure content-based routing system, evaluate existing approaches against this model, and provide an analysis of the possibilities for achieving confidentiality when performing the routing. Compared to the existing works, which fail in providing complete confidentiality, our security model considers shortcomings of these solutions. We also describe a content-based routing system that satisfies this model and to the best of our knowledge is the first of its kind to provide a complete confidentiality.
Wong, Sai Man. "Versioning of Web Services for the Swedish Public Sector’s secure electronic mail service Mina meddelanden." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177577.
Повний текст джерелаMina meddelanden är en säker digital posttjänst som tillhandahålls av sju svenska myndigheter och kan användas av den svenska befolkningen för att ta emot post elektroniskt från den offentliga sektorn. IT-infrastrukturen av denna posttjänst utvecklas och underhålls främst av Skatteverket. Den är byggd på webbtjänster och principerna av en tjänsteorienterad arkitektur (SOA). Detta gör det möjligt för externa aktörer att ansluta till systemet som delsystemen: Avsändare, Förmedlare eller Brevlådeoperatörer som är utformade för att antingen skicka, förmedla eller ta emot e-post med hjälp av webbtjänster. Webbtjänster gör det möjligt för delsystemen att samarbeta med varandra, men uppdateringar utav ett sådant system måste ske på ett metodiskt sätt för att förhindra haverier. Det huvudsakliga undersökningsområdet av denna litteraturstudie, genomfördes med en iterativ sökprocess, omfattas av versionshantering av webbtjänster, SOA strategier, designmallar och ramverk. Baserat på litteraturstudien förslås två teoretiska tillvägagångssätt för Mina meddelanden: (i) en succesiv förändring mellan två strikta och kontrollerade versioner med ett enat förvar för att lagra relevanta webbtjänster artefakter och dokumentationer och (ii) en mer generell lösning att implementera en integrationsplattform som inkluderar en tjänstebuss för att förmedla meddelanden till den mest passande versionen. Mina meddelanden är ett statligt projekt och måste därför följa strikta IT direktiv och riktlinjer, så det första tillvägagångssättet är den bäst kvalificerad i skrivande stund på grund av att det redan finns en fungerande version av systemet som följer dessa regler. Framtida implementationer av en integrationsplattform kräver ytterligare studier för att säkerställa att juridiska krav är uppnådda.
Vasudevan, Sridhar. "Secure telemedicine system for home health care." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1254.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains vi, 94 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 92-93).
Tham, Kevin Wen Kaye. "Developing security services for network architectures." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16546/1/Kevin_Wen_Kaye_Tham_Thesis.pdf.
Повний текст джерелаBryerJoyner, Susan Heller Scott D. "Secure local area network services for a high assurance multilevel network /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362547.
Повний текст джерелаThesis advisor(s): Cynthia E. Irvine, James P. Anderson. "March 1999:. Includes bibliographical references (p. 213-215). Also available online.
Alrouh, Bachar. "Towards secure web services : performance analysis, decision making and steganography approaches." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/6193.
Повний текст джерелаDupré, la Tour Irénée. "A secure authentication infrastruture for mobile communication services over the Internet." Thesis, University of Ottawa (Canada), 2001. http://hdl.handle.net/10393/9401.
Повний текст джерелаOng, Kar Leong. "Design and implementation of wiki services in a multilevel secure environment." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FOng%5FKar.pdf.
Повний текст джерелаThesis Advisor(s): Irvine, Cynthia E. ; Nguyen, Thuy D. "December 2007." Description based on title screen as viewed on January 22, 2008.... Includes bibliographical references (p. 121-122). Also available in print.
Evans, kathryn. "Support staffs experiences of relationship formation and development in secure services." Thesis, Lancaster University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536074.
Повний текст джерелаBryerJoyner, Susan, and Scott D. Heller. "Secure local area network services for a high assurance multilevel network." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13583.
Повний текст джерелаStinson, Jill D., and Sharon Bradford Robbins. "Characteristics of People With Intellectual Disabilities in a Secure U.S. Forensic Hospital." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/etsu-works/7873.
Повний текст джерелаTham, Kevin Wen Kaye. "Developing security services for network architectures." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16546/.
Повний текст джерелаCroft, Neil John. "Secure interoperation of wireless technologies." Diss., Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-12072004-082613.
Повний текст джерелаPozzobon, Oscar. "Secure location services : vulnerability analysis and provision of security in location systems /." [St. Lucia, Qld.], 2004. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18315.pdf.
Повний текст джерелаLarsson, Fredrik. ""Halfpipe Active Channel"- developing a secure communications protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2799.
Повний текст джерелаWith the advent of powerful multimedia capable mobile phones, the market for mobile services is flourishing. Zenterio AB's Halfpipe Active Desktop is a complete distributed mobile service platform a with a powerful server and platform-independent client. The communication between the client and server takes place over a GPRS-capable mobile network.
The purpose of this thesis is to develop a secure communications protocol for use between the Halfpipe Active Desktop client and server. This is done by determining requirements, analyzing candidate protocols and then by designing the final protocol. The result, the Halfpipe Active Channel protocol, is an authorized, encrypted, session oriented, message based and light weight protocol designed to minimize computational as well as network overhead.
This master's thesis project was defined by and performed at Zenterio AB during the second half of 2004.
Bou, Abdo Jacques. "Efficient and secure mobile cloud networking." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066551.
Повний текст джерелаMobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. Users can expect to execute their jobs faster, with lower battery consumption and affordable prices; however this is not always the case. Various mobile applications have been developed to take advantage of this new technology, but each application has its own requirements. Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction. In addition to that, the absence of a valid business model to motivate investors hindered its deployment on production scale. This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model. This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network. The OCMCA/user connection can utilize multicast channels leading to a much cheaper service for the users and more revenues, lower congestion and rejection rates for the operator. The OCMCA/CSP connection is based on federation, thus a user who has been registered with any CSP, can request her environment to be offloaded to the mobile operator's hosted cloud in order to receive all OCMCA's services and benefits
Habib, Usman. "Secure Mobile Authentication for Linux Workstation log on." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10898.
Повний текст джерелаWimmer, Martin Rudolf. "Efficient access control for service-oriented IT infrastructures enabling secure distributed service compositions." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/988827174/04.
Повний текст джерелаRodriguez, J., X. Koudouridis, M. Gelabert, M. Tayyab, R. Bassoli, F. H. P. Fitzek, R. Torre, et al. "Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G." IEEE, 2001. http://hdl.handle.net/10454/18488.
Повний текст джерелаAs 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by considering virtual mobile small cells (MSC) that are created on demand. Relying on emerging computing paradigms such as NFV (Network Function Virtualization) and SDN (Software Defined Networking), these cells can harness radio and networking capability locally reducing protocol signalling latency and overhead. These MSCs constitute an intelligent pool of networking resources that can collaborate to form a wireless network of MSCs providing a communication platform for localized, ubiquitous and reliable connectivity. The technology enablers for implementing the MSC concept are also addressed in terms of virtualization, lightweight wireless security, and energy efficient RF. The benefits of the MSC architecture towards reliable and efficient cell-offloading are demonstrated as a use-case.
This project has received funding from the European Union´s H2020 research and innovation program under grant agreement H2020-MCSAITN- 2016-SECRET 722424 [2].
Rodriguez, J., X. Koudouridis, M. Gelabert, M. Tayyab, R. Bassoli, F. H. P. Fitzek, R. Torre, et al. "Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G." IEEE, 2021. http://hdl.handle.net/10454/18488.
Повний текст джерелаAs 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by considering virtual mobile small cells (MSC) that are created on demand. Relying on emerging computing paradigms such as NFV (Network Function Virtualization) and SDN (Software Defined Networking), these cells can harness radio and networking capability locally reducing protocol signalling latency and overhead. These MSCs constitute an intelligent pool of networking resources that can collaborate to form a wireless network of MSCs providing a communication platform for localized, ubiquitous and reliable connectivity. The technology enablers for implementing the MSC concept are also addressed in terms of virtualization, lightweight wireless security, and energy efficient RF. The benefits of the MSC architecture towards reliable and efficient cell-offloading are demonstrated as a use-case.
This project has received funding from the European Union´s H2020 research and innovation program under grant agreement H2020-MCSAITN- 2016-SECRET 722424 [2].
Calvert, Clare. "An exploration of the relationships between trauma and delusional ideation in secure services." Thesis, Lancaster University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431411.
Повний текст джерелаBreckon, Susan Elizabeth. "Listening to the voices of intellectually disabled offenders : qualitative enquiry in secure services." Thesis, Lancaster University, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.586925.
Повний текст джерелаBurdock, Matthew. "Burnout in secure forensic mental health services for young people : a mixed methods approach." Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/402565/.
Повний текст джерелаCole, Samantha. "Management of clients who self-harm in UK secure forensic units." Thesis, Canterbury Christ Church University, 2016. http://create.canterbury.ac.uk/15030/.
Повний текст джерела