The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a Deception Robust Control (DRC) for orchestrating the cyber sensors and cyber effectors present in typical enterprise information network systems operating in the ever changing situations that arise in servicing their missions. The theory and exemplar of deception control of focus here-though motivated by conventional warfare-applies to any partial information asymmetric stochastic game,...
Multilevel security requirements introduce a new dimension to traditional database schedulers as they cause covert channels. To prevent covert channels, scheduler for multilevel secure database should ensure that transactions at low security level are never delayed by high security level transactions in the event of a data conflict. This may subjected to an indefinite delay if it is forced to abort...
A Directory Harvest Attack or DHA is a technique used by spammers in an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. Directory Harvest Attackers send the blank mail to the server to collect the valid user-id. They do this by observing the server's reply. Traditionally attackers use single IP address to send mails. Recently...
Due to covert channel problem, traditional concurrency control protocols cannot be used in multilevel secure database system. Concurrency control protocol for multilevel secure database should ensure that transactions at lower security level are never delayed by higher security level transactions in the event of a data conflict. This may lead to the abortion or re- execution of high security level...
Multilevel security requirements introduce a new dimension to traditional database concurrency control protocol as they cause covert channels. To prevent covert channels, concurrency control protocol for multilevel secure database should ensure that transactions at low security level are never delayed by high security level transactions in the event of a data conflict. This may subjected to an indefinite...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.