The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We analyze the privacy implications of identity references in biometric databases in which either raw biometric samples or templates are stored. The analysis was inspired by the privacy requirement imposed by the Norwegian National DPA (Data Protection Act Privacy Advisor) on the fingerprint data collection for one of our research projects. The respective DPA approved maintenance of a fingerprint...
Biometric traits are increasingly viewed as the ultimate proof of identity. Unfortunately, biometrics also raises many privacy concerns. In order to overcome these, template protection technologies have been developed in which privacy protection is embedded at the technological level. Standard template protection schemes, however either require secret key management or are vulnerable to brute force...
This article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational...
This paper is about a framework that would help developing nations like the Philippines minimize if not eliminate the various social problems such as poverty, unemployment, insurgency, traffic congestions, pollution, etc., in the various metropolitan cities like Metro Manila. The US occupation of the Philippines did not only teach Filipinos speak English but also leave some infrastructures that can...
This fast abstract outlines a novel mechanism for monitoring the security state of a system, using intelligent testing agents to instigate and then depress security activities.
Many computer-based communication media offer visual anonymity. As a result, detecting online deception tends to be more difficult relative to traditional non-mediated communication. The state of the art research on online deception has focused on using linear statistical approaches to identifying behavioral differences between deceivers and truth-tellers. However, deception behaviors are not linear...
Ensuring SOA developed applications security has become crucial to protect against potential damage and is a sign of confidence for companies that would like to start collaboration based on SOA services. The aim of the present paper is to present the principles of a novel tool that supports the assessment of SOA security maturity of organizations: the SOASMM (SOA Security Maturity Model). This model...
The network security situation perception technology as active defense technology has become the new research direction of network security field. On the basis of analyzing and summarizing the basic concept and the model of network security situation perception, put forward a method of network security situation perception based on artificial life. This method builds an artificial life model which...
Agent-based modeling and simulation is a way to model the behavior of populations of components and their interactions within a system. The key of this approach is to model the components of the system as autonomous agents and to simulate their behavior for evaluating the system as a whole. That is very useful for observing the emergence of properties in social, biological, environmental or financial...
A major problem facing the full deployment of business-to-consumer (B2C) electronic commerce (e-commerce) is the development of trust on the side of the consumer, particularly in developing countries. Differing characteristics of local environments and their cultures have created a significant level of variation in the acceptance and trust to e-commerce and e-transactions. Exploring influencing factors...
Power system operation risk assessment can comprehensively take into account the occurrence possibility and severity of disturbances, and it is an effective complement to traditional deterministic security analysis. Calculating transient state probability of components in future short time duration is one of the key issues in power system operation risk assessment. In this paper, a novel probability...
We propose the use of a Neural Network (NN) methodology for evaluating models of time series that exhibit nonlinear mean reversion, such as those stemming from equilibrium relationships that are affected by transaction costs or institutional rigidities. Given the vast array of such models found in the literature, the proposed NN procedure represents a useful graphical tool, providing the researcher...
Motivated by the increasing need for developing automated decision-support tools for cyber-physical networks subject to uncertainties, we have been pursuing development of a new control-theoretic framework for network security and vulnerability. In this paper, we build on the proposed framework to put forth concrete definitions for security and (dually) discoverability, for a class of models that...
Recently the power system state estimator was shown to be vulnerable to malicious deception attacks on the measurements, resulting in biased estimates. In this work we analyze the behavior of the Optimal Power Flow (OPF) algorithm in the presence of such maliciously biased estimates and the resulting consequences to the system operator. In particular, we characterize the set of attacks that may lead...
Facing the great challenge of global warming, major developed country and regions have achieved social consensus of developing low-carbon economy. Low-carbon economy will not only be the direction of the future world economic development structure, but also one of the new pillars of the world economy. To take a commanding point in the global economic competition, China needs to understand the serious...
We discuss the concept of information stewardship in cloud-based business ecosystems. The constituent concepts of stewardship -- which we believe will be crucial to the successful development of cloud-based business of all kinds -- extend those of security to encompass concepts of objectives, ethics/values, sustainability, and resilience: all familiar from the stewardship of natural resources. Our...
This paper presents an intelligent model for stock market signal prediction using Multi Layer Perceptron (MLP) Artificial Neural Networks (ANN). Blind source separation technique, from signal processing, is integrated with the learning phase of the constructed baseline MLP ANN to overcome the problems of prediction accuracy and lack of generalization. Kullback Leibler Divergence (KLD) is used, as...
Telehealth allows health care professionals to diagnose and treat patients in remote locations using telecommunication technology. In few developed countries, telehealth has become standard medical practice. Over 10,000 peer review papers have been published during past 20 years supporting the clinical effectiveness and cost savings of telehealth. Unfortunately, telehealth has not been implemented...
With a very wide variety of potential applications, the market for Machine-to-Machine (M2M) connectivity - sometimes referred to as Embedded Mobile (EM) - is one of the main growth areas in telecommunications and associated vertical industries. There are several major differences between the embedded domain and traditional subscriber-centric mobile communications. Chief among these is the way in which...
Simulators of biometric data are emerging technologies for educational and training purposes (security access, forensic systems, public safety and health care). They emphasize decision-making skills in diverse situations. To model these situations or scenarios, synthetic biometric data can be used. This paper reviews an example of the application of synthetic biometrics for training users of a physical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.