The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks are made up of a large number of wireless sensor nodes which are exploited to sense parameters in environment such as temperature, moisture level, pressure, light intensity, vibration, and so on. In order to effectively reduce energy consumption of WSN, this paper proposes a novel energy constrained clustering routing method based on particle swarm optimization. The simulation...
Database servers are the most important servers your company owns. They store client details, financial information, human resource details — all the data that keeps your company in business and, as such, they need to be secure. This paper has been written to help database administrators, security professionals and risk framers understand the issues involved with database security and provide options...
This paper proposed a formalize method of mandatory access control (MAC) model for multilevel secure DBMS and discussed the problems of labeling object in tuples, and security label, and covert channels. Mandatory access control (MAC) model requires that all users and resources are classified and assigned a security label, which is a combination of a hierarchical security level and non-hierarchical...
In order to protect confidentiality and integrity of information in the computer information systems, in general, we need to follow some security polices to access and handle information. The BLP model only to resolve the confidentiality problem, and the Biba model only to resolve the integrity problem, other models are also all similar, they can't make look after two sides at the same time. In this...
This paper analyzes scheme and technologies to fulfill the mandatory access control model based on security label, and discusses few aspects of security label, including definition, composition, storage structure, compare algorithm, implementation. Because security label plays an important role in highly secured database system. The scheme for an independent copyright database management system Logic...
The secure limitation in the database system only taking discretionary access control is discussed. This paper proposes a mandatory access control model for multilevel secure DBMS and discusses the problems of labeling object in tuples, security label, covert channels and poly-instantiation. The mandatory access control model requires that all users and resources are classified and assigned a security...
This paper discusses two main ideas, Electronic Business Technology and its Security Problems. E-Business relies upon a wide range of technologies. Here we examine the more vital technologies for electronic Business. Included Networks, E-mail, The Word Wide Web etc. On the Internet many electronic Business applications can be used today, but most of them provide only weak security or even none whatsoever...
With the rapid development of the Internet, electronic commerce is getting more and more applications. On the Internet many electronic Commerce applications can be used today, but most of them provide only weak security or even none whatsoever. A major cause of this problem is the variety of technologies used to create such applications. Most existing security architectures are not designed to work...
Flexible authorizations are an important problem in current access controls. On the basis of the analysis of access control mechanisms, the flexible features in authorization are proposed and summarized. By several cases, the flexible authorizations are specified using the logic rules, and it is shown that the structural features of logic programs can specify the responding properties of security...
Research of the security model is one of security system keys. The secrecy and the integrity are two important demands of security system. BLP model mainly satisfies the secret request , and Biba model emphasises the integrity request. The few security models unify the secrecy with the integrity. A mutilevel database security model increases integrity examination in the foundation of original secret...
Steam turbine is a main thermal facility in power plant. There are a lot of items and complicated technology and strict working procedure, and the working schedule is dynamic through the maintenance process. So the issue of how to arrange rationally and adjust working schedule and cut maintenance time and obtain the optimum working schedule is key to improve the maintenance efficiency. This article...
Logic programming is a prominent approach for knowledge representation and reasoning. Answer set semantics of logic programs provides a promising constraint programming paradigm. Consistency is a significant issue in answer set programming. We investigated the order consistent logic programs and showed that the class of order consistent logic programs is identical to the call consistent one for finite...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.