The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of large and multifarious business processes and applications with heterogeneous data source have remained in the process of enterprises informatization. Some of these data of applications have their own characteristics and these application systems are difficult to use data from other application systems. These problems are more prominent in the logistics system which involves various...
With the rapid development of multimedia network technology, the traditional teaching modes and learning styles have undergone profound changes. Collaborative learning is just a new teaching mode that comes into being under contemporary teaching circumstance. It is important to train students' cooperative spirit and innovative consciousness. But current collaborative learning system faces with some...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
Under the increasing demand for more reliable security systems, there is a renewed interest in human identification based on biometric. Since the biometric templates stored in database directly have introduced a number of security and privacy threats, the study to biometric template protection is necessary. This paper provides a new face recognition scheme with renewable templates. In this scheme,...
A data mining based adaptive intrusion detection model (DMAIDM) is presented in this paper. The DMAIDM applies a fast heuristic clustering algorithm for mixed data (FHCAM) to distinguish intrusions from legal behaviors efficiently and an attribute-constrained based fuzzy mining algorithm (ACFMA) to construct intrusion pattern-database automatically. Verification tests are carried out by using the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.