The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Moving target defense is a revolutionary technology to change the pattern of attack and defense, and end-point information mutation is one of the hotspots belonging to this field. In order to counterpoise the defense benefit of end-point information mutation and service quality of network system, the self-adaptive end-point mutation technique based on adversary strategy awareness is proposed. Directed...
The mode of outsourcing brings about new challenges for data security and access control in cloud computing. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is considered to be a powerful tool for protecting data confidentiality in cloud storage system. Due to the large scale of cloud, there are many independent domains. It is impossible for a single authority to issue attributes to all of the...
A new approach towards highly reconfigurable SoCs for data-streaming multi-sensory systems is presented. As the applications are in the security arena, a very high degree of dependability should be guaranteed. For this purpose, extensive use is made of many-core processor architectures and associated embedded health-monitoring circuits. This enables the preventive (automatic) repair by spare parts...
The remote attestation mechanism serves to prove the trusted state of remote platform to a local user, and TPM is always the bottleneck of remote attestation efficiency. There are some improvement methods on remote attestation scalability at present. However, the existing methods have the problems such as lack of privacy protection, vendor discrimination, and marked increase of communication load...
In data-centric wireless sensor networks, the malicious nodes may selectively drop some crucial data packets, which seriously destroy the network's data collection and decrease the availability of sensor services. In this paper, we present a lightweight defense scheme against selective forwarding attacks. According to characteristics of easy positioning the nodes around transmission paths in a structured...
Grid is a promise technology which could easily share distributed heterogeneous computing resources. It brings together geographically and organizationally dispersed computational resources. This paper presented a framework that aggregated the spatial resources based on grid technology, OGC specification and spatial data index. First, a grid environment for sharing geospatial data resources was setup...
In view of the existing situation that patients' physiological information is not timely and securely acquired and medical workers is easy infected in some particular large scale medical assistance application, a feasible solution based on wireless sensor networks is proposed. In the solution, a secure network topology based on hexagonal mesh is constructed according to node locations for acquiring...
Wireless sensor networks (WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks...
To enable the rapid execution of many tasks on compute clusters, we have developed Falkon, a Fast and Light-weight tasK executiON framework. Falkon integrates (1) multi-level scheduling to separate resource acquisition (via, e.g., requests to batch schedulers) from task dispatch, and (2) a streamlined dispatcher. Falkon's integration of multi-level scheduling and streamlined dispatchers delivers performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.