The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart home has become a popular application all over the world. However, the service to interact with smart grid, and the service to guide residents utilize power, are ignored. In this paper, we propose an effective converged service oriented architecture (CSOA) to give a solution for supplying a converged service in smart homes. This architecture not only supports diversified service integrated with...
Work Safety Standardization of enterprise is a detailed and tedious work, because the level of the safety management and information for the majority of our enterprise is not high, slow progress in the safety standardization. Safety Management Information System of Work Safety Standardization will make the work network and systematic, greatly enhance the security management level. The paper combines...
During the multi-dimensional Fuzzing technique, how to construct the influencing relationships between input elements and vulnerable statements is a key problem. This paper applies the virtual machine based taint analysis technique on multi-dimensional Fuzzing, gives detailed design and the experiment result shows the method is feasible.
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed...
Information Card (InfoCard), as an OASIS standard, is a federated identity management metasystem based on visual cards. Users can collect information cards issued by various identity providers, such as web portals, governments, or companies, and use these cards to log on various relying parties. InfoCard protocol is as the foundation of the InfoCard system and its security properties should undergo...
In order to solve the problem that encryption files can not benefit from the data deduplication technology, a novel encryption scheme is proposed. According to the method, the basic encryption unit is transformed from the file to the chunks; and the chunk contents are used to generate the symmetric keys, which ensure the determinate mapping between plaintext and ciphertext of data. The data can be...
In this paper, we use mathematical method to study the model of complex network, analysis the network characters, use statistics, entropy and visualization reasoning analysis to get these characters. Then we give the three layer model for service, host and network to present network, and set up the system of network characters management.
Network security situation is a hot research realm in the area of network security, which helps security analysts to solve the challenges they encounter. This paper presents the evaluation index, and the characteristic attributes to describe the state of network situation, discusses the grey model includes grey correlation model and grey forecast algorithm to get the evaluation index and predication...
In this paper, we consider the contingent claim pricing and hedging of European call option. The theory of stock trading volume is applied to describe and study the fluctuations of stock prices in a stock market, and we obtain the formula for pricing a European call option. Then we discuss the range of parameters of the formula in a risk-averse market, and give the corresponding option pricing bounds...
In this paper we study on the prediction technique of network situation awareness. It has two levels: the high-level situation and the low-level next attack step. The first one includes the indexes and the evaluation results of the network security situation, they are figure form, we use the RBF network to predict them for RBFpsilas self-learning character. Then we use the weighted attack graph to...
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. In the paper, we describe some typical examples of type flaw attack and give a type flaw attack that was found on the GDOI protocol. We then analyze the limitations of recent tagging technique of preventing type flaw attack. Finally,...
Network situation awareness (NSA) is a new idea of network security, it is different from normal network security technique for its visualization and high-level data management, transform the abstract data to knowledge that human can understand, help network manager to make decision. Present NSA model have some weakness donpsilat fit to network security. This paper promote a improve model of the NSA,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.