The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on analyzing the distribution of CVSS environmental score. Firstly we extract CVSS base score from the NVD database and calculate their corresponding environmental score by simulating all possible combinations of different environmental metrics, then analyze the distribution of the environmental score. Two conclusions are obtained: first, for any given vulnerability, there exists...
Cloud computing as a new technology in the IT industry has undergone a major change, and the smart grid informatization construction cannot be done without a cloud computing platform. This gives the power of cloud computing platform architecture. Electric cloud application environment of wide distribution, large amount of data, heterogeneous, real-time characteristics on power cloud computing platform...
Computer basic teaching aims to develop and improve the quality of students' computer literacy, to have proficiency in computer application skills for students. Therefore, we must oriente to people, individualize students, we must combinatie the computer basic education and professional education. In this paper, we combined the actual condition of xinjiang agricultural vocational college with its...
Recently, product perfect codes (PPC) steganographic method was proposed by H. Rifa-Pous and J. Rifa, which can achieve large embedding efficiency with less distortion. They divided the cover image into disjoint matrix blocks and apply F5 algorithm in each row and some columns. The proposed method in this paper improves the PPC embedding method. F5 algorithm was also utilized in each row, but to the...
This paper is based on a preliminary investigation of the current logistical and supply chain issues of China's E-business-transformed agribusiness. It aims to find solutions through practical applications of the Value Trust Network (VTN) model. The literature on this topic is extensive, with E-business being a huge topic of interest. Previous studies have made inclusion of such a study regarding...
Digital rights management (DRM) is an efficient method to protect digital content in various applications such as digital TV, IPTV, video on demand, etc. In China, the legal and administration systems, business models and industrial chain are different from those of other countries and therefore have special requirements on DRM technologies. In this paper, we propose a new licensing design to extend...
Java applets run on a JVM that check code's integrity and correctness before execution using a module called bytecode verifier. Large memory space requirements of the verification process blocks implementation of a bytecode verifier embedded in the Java smart card. To address this feasibility problem, the paper desinged a new verification algorithm that optimizes the use of Java smart card's memory...
Security bootstrap is important to the platform security. If the bootstrap is not secure, Rootkits, Viruses and Trojan horses may be loaded into kernel, thus the following defenses built on the compromised kernel may be useless. In this paper, a trusted-computing based security bootstrap is introduced. We modify trust chain defined by Trusted Computing Group slightly by introducing a new component...
Numbers of proposals to incorporate delegation into secure service management have been seen the last years. How to assure that only the authorized users can fulfill specify services is one of the main problems for secure service management. Delegation is a mechanism that permits a user to assign a subset of his/her assigned authorizations to other users who currently do not possess the authorization...
In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.