The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Android is a modern and popular software platform for smart phones. To manage information and features on smart phones, Android employs intent-based mechanism for inter-application or intra-application communication and provides a permission-based security model that requires each application to explicitly request permissions in its manifest file. However, misconfiguration defined in manifest files...
As smart phones are becoming widespread over the world, relevant security problems emerge. On Android platform, some applications are granted to access some restrictive resources via system APIs. Such applications may expose this capability to the other applications without certain permissions. This will lead to permission re-delegation attacks. In this paper, we describe how this vulnerability occurs...
Due to the benefits of cloud computing, many desktop applications have been migrated into the cloud. In order to program in the cloud, lots of IDEs are also moved into the cloud at recent years. Although online IDE can bring developers a lot of convenience for their developing process, some tough problems are still less touched. This paper summarized three main kinds of actual problems from three...
As more and more component-based systems (CBS) run in the open and dynamic Internet, it is very important to establish trust between clients and CBS. One of the key mechanisms to establish trust among different platforms in an open and dynamic environment is remote attestation, which allows a platform to vouch for its trust-related characteristics to a remote challenger. This paper proposes a novel...
Grid computing technique is a mature technique for distributed-data computing and processing. Scientific workflow (SWF) technique is one of the most important parts of grid computing and typically used for job scheduling, distributed services invocation and distributed data processing. However, rare previous literatures studied the security issues of SWF in the design of scientific workflow though...
With the rapid development of network, some novel applications like remote database access, electric commerce, etc. bring forth many new requirements for network loads, network communication efficiency and network security. This paper adopts mobile agent technology to achieve remote access to databases. Compared to the traditional C/S computing model, this method can significantly improve the communication...
Traditional e-business focuses on physical products trading, and although there are transactions of the so called "virtual products", its scope is limited to "downloadable files" or game card points. But in offline market, services & intellectual works forms an important part in all commercial fields. By reconstructing the concept of "intangible product" in e-business...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.