The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of large and multifarious business processes and applications with heterogeneous data source have remained in the process of enterprises informatization. Some of these data of applications have their own characteristics and these application systems are difficult to use data from other application systems. These problems are more prominent in the logistics system which involves various...
Information is an irreversible general trend of social and world economy's development. E-government means to make full use of information technology to enhance the effective management of the government, in order to promote transformation of government functions and improve management level. However, e-government faces with some problems, such as security issues. First, this paper analyzes the characteristics...
Portable Document Format (PDF) is used for representing two-dimensional documents independent of the application software and hardware. PDF is now a published ISO standard. This article presents the idea of implementing a plug-in for PDF based on Digital Rights Management (DRM) technology. In this system, the issuer can encrypt the PDF files with its issue license awarded by authentication server...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
A Bluetooth ad hoc network can be formed by interconnecting piconets. The security of the process of Bluetooth scatternet formation is a major factor to guarantee the applications of Bluetooth network. Through the analysis of the characteristics of Bluetooth scatternet formation algorithm and Bluetooth's security architecture, this paper gives out a scheme for Bluetooth scatternet security based on...
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
Under the increasing demand for more reliable security systems, there is a renewed interest in human identification based on biometric. Since the biometric templates stored in database directly have introduced a number of security and privacy threats, the study to biometric template protection is necessary. This paper provides a new face recognition scheme with renewable templates. In this scheme,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.