The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
This paper describes a database system with tenant technology on Eucalyptus platform for a rural drinking water supply system. This database use a sharing model to store data and a tenant placement algorithm to properly put tenants in virtual machine therefore it can ensure the service quality for the tenants with the minimum use of hardware resources. The experiment results show that the tenant placement...
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes communication behavior into account to calculate sensor nodes’ trust value, which is not enough for trust evaluation due to the widespread malicious attacks. In this paper, we propose...
The Delay/Disruption Tolerant Network (DTN) is characterized with intermittently connectivity and frequent partitions. Due to this, the DTN routing algorithm is very vulnerable to various kinds of malicious attacks. In this paper, combined with many other DTN forwarding approaches, we propose a multi-stage routing forwarding algorithm so as to further improve network throughput. To ensure the security...
These growing threats and broad damages have made it imperative to understand, characterize, filter, and reduce exploit traffic towards millions of home routers and billions of connected devices in the home. This paper presents a bloom-filter based analytic framework to capture persistent threats towards the same home routers and to identify correlated attacks towards distributed home networks. Our...
Routing-driven key management schemes integrated with centralized routing for heterogeneous sensor networks (HSNs) mainly have two shortcomings: high communication energy consumption, and large storage requirements. To address the above problems, we propose a distributed key management scheme for HSNs. Taking advantage of distributed routing protocol, the scheme achieves to reduce communication cost...
With increased global interconnectivity, reliance on network services and Internet communication, real-time transport system security has become an issue, which cannot be ignored. Encryption is viewed as a salvation to protect the real-time transport system from intrusion and computer-virus attacks. A plenty of applications like real-time communications for the web, Voice over IP (VOIP) etc. These...
Knowledge service is critical to enterprise collaboration in cluster supply chain. However, current cluster enterprises have limited capabilities for knowledge sharing. In order to address the knowledge service needs of cluster supply chain, this paper proposes a novel semantic-based knowledge service approach. In the approach, a multi-level knowledge model is presented to achieve uniform and flexible...
The rapid growth of broadband connections and home networks has created new application opportunities such as video streaming and remote health care. However, managing and securing the increasingly complicated home networks has remained a serious challenge for most home users who have little technical expertise to manage their home networks and connected devices. Towards this end, we will demonstrate...
Multiple path dissemination is recognized as an important feature to improve the reliability and efficiency of networks. However, most multipath routing proposals focus only on disseminating additional routes to increase the reliability of the Internet, and do not concern the security issues that the additional routes bring to the table. In this paper, we attempt to understand the feasibility of utilizing...
An heterogeneous distributed system using middleware to finish the visit to each other between P2P and Web Service system is brought forward, and the safety and veracity of visit the service must be ensured. The blue print of middleware is to adding the function of visit Web Service onto the basic function of peer. The middleware provides the service accepting and disposal of request to the Web Service,...
Grid computing technique is a mature technique for distributed-data computing and processing. Scientific workflow (SWF) technique is one of the most important parts of grid computing and typically used for job scheduling, distributed services invocation and distributed data processing. However, rare previous literatures studied the security issues of SWF in the design of scientific workflow though...
The metrological management system incarnates the business rule, information transaction of the metrological management by computer aided management. It can administer the layout of humans, finance, facilities that concerned in the metrological management. This paper analyses business process, functional requirement of the energy sources metrological management system of Zhongzhou Filiale of China...
Multi-tenant technology is one of key competencies for software as a service (SaaS) to achieve higher profit margin by leveraging the economic scale. In China, there are a number of textile & apparel OEM enterprises, but due to the lower value-added products, they can not invest on information platform with very big budget. A collaboration service system supporting multiple tenants can significantly...
Network coding is a new proposed way for data transmission over networks, allowing each intermediate nodes to perform encoding. This transmission scheme, totally different from traditional routing one, was proved to be able to obtain larger capacity, higher efficiency, robustness and security for the network. In this paper, we focus on certain security issue, give an overview for network coding, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.