The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies distributed, combined authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each device in the network has measurement and estimation errors, more than one device needs to be chosen, and observations...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce. How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive...
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
Web services have widely employed in many application fields. The loosely coupled and distributed characters of Web services also incur trustworthiness problem. Quality of service, reputation and security all can be taken into account for trustworthy Web services. The three aspects affect each other. In this paper, we propose concept of trustworthy Web services, and design an extend Web service model...
Recently trusted network becomes hot topic in network security domain. By introducing the concept of "trusted attribute", we proposed grade division scheme, which was called hierarchy trusted network framework (HTNF). Also we detailedly explained the partition rules of trusted attributes and the approach to grade division. We discussed the potential applications of presented framework, and...
Applying Varying Pseudonyms (VP) to Radio Frequency Identification (RFID) authentication out-performs the other approaches in several respects; however, this approach is prone to the denial-of-service (DOS) attack. In this paper, we examine the de-synchronization problems of VP-based RFID authentication protocols.
The increasing dependence on mission critical applications requires more stable and persistent services, but the existence of dishonest nodes' services could damage the correctness and availability in open networks. Meanwhile, how to efficiently obtain the services from high dependable entities should be considered as well. The existing trust models in open networks ignore a fact that object itself...
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But the features of RFID system and the constraints of RFID devices may bring about various security problems. In this paper, we propose a novel cross-layer architecture designed to...
SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure solution for Web-based communication,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.