Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

    Tarig Mohamed Ahmed*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3849-3862, 2022, DOI:10.32604/cmc.2022.025582

    Abstract Mobile Agent has many benefits over traditional distributed systems such as reducing latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security problems. This paper focuses on mobile agent protection against malicious hosts. A new security mechanism called Checkpoints has been proposed. Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks. CPM assumes using a free-roaming mobility mechanism by Mobile agent systems. The main idea behind CPM is to generate multiple versions of Mobile Agent. The multiple version is used to recover… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive… More >

  • Open Access

    VIEWPOINT

    Cell extrusion in development and cancer, what MARCKS the difference for epithelial integrity?

    LUCÍA VELOZ1,2, SANTIAGO A. BOSCH1,3, GONZALO APARICIO1,2,*, FLAVIO R. ZOLESSI1,2,*

    BIOCELL, Vol.46, No.3, pp. 639-644, 2022, DOI:10.32604/biocell.2022.018798

    Abstract Cell extrusion is an active mechanism to eliminate non-viable or supernumerary cells in healthy epithelia. It also plays a role in carcinogenesis, both in tumor growth (apical extrusion) and metastasis (basal extrusion). Embryonic tissues like the neuroepithelium, on the other hand, present rates of proliferation comparable to that of carcinomas, without the occurrence of cell extrusion. However, the downregulation or phosphorylation of actin-modulating proteins like MARCKS, causes extensive neuroepithelial apical cell extrusion. As changes in MARCKS proteins phosphorylation and expression have also been correlated to carcinogenesis, we propose here an integrated model for their functions More >

  • Open Access

    ARTICLE

    Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

    Hao Yan1,2, Yanan Liu1, Shuo Qiu1, Shengzhou Hu3, Weijian Zhang4,*, Jinyue Xia5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1129-1142, 2022, DOI:10.32604/csse.2022.022317

    Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third… More >

  • Open Access

    VIEWPOINT

    New evidence for a role of Bisphenol A in cell integrity. Implications in the human population

    RAFAEL MORENO-GÓMEZ-TOLEDANO1,*, MARíA I. ARENAS2, ESPERANZA VÉLEZ-VÉLEZ3, RICARDO J. BOSCH1

    BIOCELL, Vol.46, No.2, pp. 305-308, 2022, DOI:10.32604/biocell.2022.017894

    Abstract Bisphenol A (BPA) is a xenoestrogen known for its implications for the endocrine systems and several other organs, including the kidneys. Recent renal studies have shown that BPA can induce alterations of the cytoskeleton and cell adhesion mechanisms such as a podocytopathy with proteinuria and hypertension, alterations involved in the progression of renal diseases. These data and the fact that BPA is known to be present in the urine of almost the entire population strongly suggest the critical need to reevaluate BPA exposures considered safe. More >

  • Open Access

    ARTICLE

    Elp3 modulates neural crest and colorectal cancer migration requiring functional integrity of HAT and SAM domains

    XIANGCAI YANG1,2,*, YA XU3, SHUTING MEI1, JIEJING LI3,*

    BIOCELL, Vol.46, No.2, pp. 463-470, 2022, DOI:10.32604/biocell.2021.014834

    Abstract Cell migration is a finely tuned biological process that often involves epithelial-mesenchymal transition (EMT). EMT is typically characterized by the upregulation of mesenchymal markers such as Snail1. This process has been shown to be of critical importance to normal developmental processes, including neural crest migration and invasion. Interestingly, similar mechanisms are utilized in disease processes, such as tumor metastasis and migration. Notably, EMT and EMT-like processes confer tumor cells with the ability to migrate, invade, and adopt stem cell-like properties that largely account for immunosuppression and tumor recurrence. Therefore, identifying sensitive EMT markers may… More >

  • Open Access

    ARTICLE

    Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

    V. Rajkumar1,*, M. Prakash2, V. Vennila3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 779-793, 2022, DOI:10.32604/csse.2022.019622

    Abstract Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to… More >

  • Open Access

    ARTICLE

    Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus

    Tehreem Aslam1, Ayesha Maqbool1, Maham Akhtar1, Alina Mirza2,*, Muhammad Anees Khan3, Wazir Zada Khan4, Shadab Alam5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1089-1109, 2022, DOI:10.32604/cmc.2022.019416

    Abstract Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the database vulnerable. This paper investigates database and Blockchain integration, where the Blockchain network works in synchronization with the database system, and offers a mechanism to validate the transactions and ensure data integrity. Limited research exists on Blockchain-based solutions for the single point of failure More >

  • Open Access

    ARTICLE

    GPS Vector Tracking Receivers with Rate Detector for Integrity Monitoring

    Dah-Jing Jwo*, Ming-Hsuan Lee

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2387-2403, 2021, DOI:10.32604/cmc.2021.018670

    Abstract In this paper, the integrity monitoring algorithm based on a Kalman filter (KF) based rate detector is employed in the vector tracking loop (VTL) of the Global Positioning System (GPS) receiver. In the VTL approach, the extended Kalman filter (EKF) simultaneously tracks the received signals and estimates the receiver’s position, velocity, etc. In contrast to the scalar tracking loop (STL) that uses the independent parallel tracking loop approach, the VTL technique uses the correlation of each satellite signal and user dynamics and thus reduces the risk of loss lock of signals. Although the VTL scheme… More >

  • Open Access

    ARTICLE

    GPS Vector Tracking Loop with Fault Detection and Exclusion

    Dah-Jing Jwo*, Meng-Hsien Hsieh

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1785-1805, 2021, DOI:10.32604/cmc.2021.017225

    Abstract In this paper, both the integrity monitoring and fault detection and exclusion (FDE) mechanisms are incorporated into the vector tracking loop (VTL) architecture of the Global Positioning System (GPS) receiver for reliability enhancement. For the VTL, the tasks of signal tracking and navigation state estimation no longer process separately and a single extended Kalman filter (EKF) is employed to simultaneously track the received signals and estimate the receiver’s position, velocity, etc. In contrast to the scalar tracking loop (STL) which utilizes the independent parallel tracking loop approach, the VTL technique is beneficial from the correlation… More >

Displaying 21-30 on page 3 of 56. Per Page