The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional code defect detection tools exist in the form of client software, which lead to the separation of the development environment and test environment. In order to solve this problem, a plug-in java source code defect detection framework is constructed. It is based on DTS (Defect Testing System)1. It can provide a scalable platform with good flexibility, and a good support software framework...
Existing key distribution scheme based on key derivation has security default in cloud scenarios. The scheme distributes decryption keys to users through tags stored on cloud server. If the tag is destroyed by cloud server intentionally or unintentionally, the key distribution is destroyed too. Besides the above case, if all related tags are stored on client operated by user, the storage burden is...
Traditional checkpointing techniques are facing a grave challenge when applied to multi-tenancy software-as-a-service (SaaS) systems due to the huge scale of the system state and the diversity of users' requirements on the quality of services. This paper proposes the notion of tenant level checkpointing and an algorithm that exploits Big Data techniques to checkpoint tenant's meta-data, which are...
To improve the security of voiceprint storage and transmission, we present a novel voiceprint protection approach with homomorphic encryption and authentication scheme for cloud computing environment in this paper. System supports to calculate distortion measurement of voiceprint without disclosing the raw voiceprint data under the telebiometric functional model in the open network. The client contributes...
Dynamic Time Wrapping is a non-linear distance measure solution, widely used in query by humming. This paper have a body of work on cross-sentence retrieval, end point loose, cost function and their improvements to raise DTW performance of query by humming. Based on these researches we build a prototype of hierarchical matching humming system. During the test of database contains 500 songs and 55...
With the rapid development and the large investment in highway construction, the detection, evaluation, prediction and maintenance of highway pavement performance are getting more attention than ever before in today's China. While most current codes and standards provide much guidance for the detection and evaluation of highway pavement performance, a systematic management tool to implement these...
Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed...
Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for data recovery requires a transaction log which record data items read or written by all malicious and benign transactions. Unfortunately, conventional undo/redo log could not record read operations for transactions; and existing auditing mechanisms in DBMS could not capture...
The fine-grained access control (FGAC) is important to Web applications. However, it can be circumvented by indirect access such as inferring sensitive data from insensitive data. In the previous FGAC studies, the inference information leakage is not well controlled. In addition, the soundness property, which requires that the results of a query under the FGAC should be the subset of the results of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.