The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the Web Services widely used in the distributed systems, the demand for cross-domain authentication is increasing day by day, its security issues become more and more prominent. Aiming at disadvantages of the cross-domain authentication, this article presents a dynamic authentication mechanism crossing domains for Web Services based on SAML. It can achieve single sign-on and improve the interoperability...
In this paper, we examine general mechanisms that a network covert channel may exploit, and we characterize the essence of network covert channels, which are decided by overt sources. So we present a taxonomy of network covert channels based on entropy of overt sources. We classify overt sources into three categories, as variety entropy, constrant entropy and fixed entropy sources, and name the network...
Our country needs specially appointed data transmission between different security level networks in government. In this paper, we put forward a model of warden, which is deployed between these networks and used to counteract the overall covert channels. We use 2-type Turing machine to handle input and unrestricted grammar to generate output, this will eliminate all covert channels in packet header...
This paper presents a generic self-aware solution to guarantee the security of PTN network on ECMP condition. This mechanism, called OAM detection and multipath switching (ODMS) has two points. The first one is sending specific OAM packets periodical to detect out of order status of data flow. The second is switching the routing paths in variable periods according to the flowpsilas out of order proportion...
The rapid development of World Wide Web has dramatically changed the way in which information is managed and accessed. The information in Web is increasing at a striking speed. At present, there are more than 7,500 terabytes of information in Web. Web information has covered all domains of human activities. This opened the opportunity for users to benefit from the available data. So Web is being concerned...
Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present system security status, while the future security status, which also has an impact on assessing the system risk, is not taken into consideration. In this paper we propose a novel risk assessment model based on Markov game theory...
Attack model is the foundation for organizing and implementing attacks against the target system in Attack Resistance Test. By redefining the node of the attack tree model and redescribing the relation of the attack tree nodes, we build a penetration attack tree model which can describe, organize, classify, manage and schedule the attacks for Attack Resistance Test. The organization method of the...
With the development of mobile network and computer technology, MIPv6 is brought to the internet. Taking care of the security concerns about network connection, we bring AAA system into the mobile network. In order to be permitted in the integrated architecture of MIPv6 and AAA systems, the users have to get network access permission and AAA response from AAAH. This paper presents an optimization...
Mobile agent technology is an attempt towards bringing the computation process nearer to the physical location of data in a distributed system. Although it has been extensively studied and applied in a variety of applications but still its usage is limited mainly because of the security issues associated with its usage. Mobile agent watermark encapsulation (MAWE) is a method that first embeds a watermark...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.