The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Enterprise File Sync and Share (EFSS) is one of the most important services to provide enterprises' employees with cloud file sync, share, and collaboration services. To take enterprises' concerns into account, such as security, privacy, compliance, and regulation, the existing EFSS solutions are either using private (on-premise) or hybrid cloud service model to provide their services. They usually...
This paper presents a clustering method based on genetic algorithm (GA) for Wireless Application Protocol (WAP) log. Firstly WAP log files are pre-processed and the behavior features of WAP service users are extracted. Then the similarity matrix is constructed to compute the similarities between the behavior feature vectors of WAP service users. Furthermore, compute near-optimal solutions by mapping...
As a critical component of grid security, secure and efficient grid authentication needs to be well addressed. However, the most widely accepted and applied grid authentication is based on public key infrastructure (PKI) and X.509 certificates, which make the system have low processing efficiency and poor anti-attack capability. To accommodate the challenge of grid authentication, this article aims...
As a new technology, mobile agent (MA) shows a wide application in the field of network technology. However, security has been one of the crucial problems in its application. A new protection model based on a trusted element is presented in this paper. The trusted element, which differs from the traditional trusted hardware such as a smart card or a co-processor, offers a third party service based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.