Limpar
10 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Capítulo de livro

Byron Guanochanga, Rolando Cachipuendo, Walter Fuertes, Santiago Salvador, Diego S. Benítez, Theofilos Toulkeridis, Jenny Torres, César Villacís, Freddy Tapia, Fausto Meneses,

... processing nodes within flat files, and sent via SSH File Transfer Protocol (SFTP) as a restore operation in case the ...

Tópico(s): Water Quality Monitoring Technologies

2018 - Springer Nature | Advances in intelligent systems and computing

Artigo Acesso aberto Revisado por pares

Shishir Kumar Shandilya, Chirag Ganguli, Ivan Izonin, Atulya K. Nagar,

... foreign packages including malicious ones. Also, services like File Transfer Protocol (FTP) and Secure Shell (SSH) were exploited using several attack mechanisms. The presented ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2022 - Elsevier BV | Data in Brief

Artigo Acesso aberto Revisado por pares

Kyoung-Lyoon Kim, Myung‐Sup Kim, Hyoung-Joong Kim,

... SSH(Secure Shell) 프로토콜을 분석하고 SSH 터널링, SFTP(SSH File Transfer Protocol)와 일반 SSH 트래픽의 차이점을 분석하고 식별할 수 있는 방법을 제시하고 ...

Tópico(s): Network Packet Processing and Optimization

2012 - THE KOREAN INSTITUTE OF COMMUNICATIONS AND INFORMATION SCIENCES (KICS) | The Journal of Korean Institute of Communications and Information Sciences

Artigo Revisado por pares

Niu Leyua,

Secure Shell(SSH)protocol can ensure the implementation of network file transfer between the local host and remote host,remote login,executing commands remotely and safe execution of other applications.It plays an important role in the protecting network security.This paper studies the security of the protocol.The main content of this article is the automated analysis of Secure Shell Version2(SSHV2)protocol.This paper introduces the architecture of SSH protocol and gets the message terms by analyzing ...

Tópico(s): Access Control and Trust

2015 - East China Computer Technology Research Institute | Jisuanji gongcheng

Artigo Acesso aberto Revisado por pares

P. Tallada-Crespí, Gerard Bernabeu, Marc Caubet, M. Delfino, Francisco Javier Jiménez Martínez, C. Neissner, Maria A. Rodriguez, N. Tonello,

... data connection is limited to the Secure Shell (SSH) protocol using the scp command. Besides a limitof bandwidth, we had to deal with a lack of automation and reliability of the transfers. PIC managed to control those scp transfers through gLite's File Transfer Service (FTS). Therefore, the discs containing the data at the BSC are mounted via SSH to a local Storage Resource Management (SRM) server at PIC. Once established the access to the data through the SRM server, the data can be transfered to any other SRM server, including the storage system at PIC, using grid protocols. Although we cannot improve the bandwidth, we reach ...

Tópico(s): Distributed systems and fault tolerance

2011 - IOP Publishing | Journal of Physics Conference Series

Artigo Revisado por pares

Andrew Simmons, J‐Sebastian Muehlboeck, Eric Westman,

... public clouds. Data transfers are automated using the SSH-2 protocol. The system provides a framework for effective collaborations and resource sharing. It facilitates access to data at all levels, by providing pertinent meta information about image acquisitions, allowing to extract individual series in various formats from DICOM studies and offering direct file download and transfer to workstations for source data and processed output. ...

Tópico(s): Distributed and Parallel Computing Systems

2014 - Wiley | Alzheimer s & Dementia

Capítulo de livro Revisado por pares

Lei Qian, Yinlong Liu, Yanfei Zhang,

... example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics existence in different application layer protocols by illustrating our performance evaluation result of five different application layer protocols (HTTP, HTTPS, FTP, SMTP, and SSH) in individual flow level from over 10 years IP packets trace files collected from two different locations. Our results show ...

Tópico(s): Network Security and Intrusion Detection

2015 - Springer Science+Business Media | Communications in computer and information science

Artigo Acesso aberto

Jae-Won Ahn, Beom-Jin Choi, Sung-Jin Ok, Jung-Ha Kang, Jae‐Young Kim, Eun-Gi Kim,

... 암호화되어 전송되는 것을 확인하였다. The FTP that provides file transfer capabilities to/from another station cannot provides data confidentialities. The FTPS and SFTP can support a security functionalities. The FTPS needs a SSL layer and SFTP use a functions of SSH. And therefore the FTPS or SFTP needs an additional modules such as SSL or SSH. In this paper, we propose a new Secured FTP protocol that can support the security functions without extra ...

Tópico(s): Internet of Things and Social Network Interactions

2014 - The Korea Academia-Industrial Cooperation Society | Journal of the Korea Academia-Industrial cooperation Society

Artigo Acesso aberto

Murali Krishna, Pradeep Jamwal, Kosana Sai Chaitanya, B. Vinod Kumar,

... of security risks. So the model that uses SSH for securing channel like intranet/internet which provides ... also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the ...

Tópico(s): Cryptography and Data Security

2011 - Scientific Research Publishing | Journal of Software Engineering and Applications