The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SDN is a new network architecture for control and data forwarding logic separation, able to provide a high degree of openness and programmability, with many advantages not available by traditional networks. But there are still some problems unsolved, for example, it is easy to cause the controller to be attacked due to the lack of verifying the source of the packet, and the limited range of match...
Integrity measurement is an important attribute in trusted computing. An integrity measurement model for computing platform is proposed, which aims at providing effective measurement and security protection for the booting of the platform, the loading of the process and the running of the procedure. The trusted platform which is based on embedded system and virtual machine can tolerate untrusted components...
Since the first SMS (Short Message Services) message was sent in the UK in 1992, the SMS has become a mass communication tool and has been broadly used in mobile business applications. But the security issue of the SMS has often been considered as a crucial barrier to its application in many fields that need strong authentication and confidentiality, such as mobile-commerce. The Subscriber Identity...
Trust models like Beth, Josang and EigenRep evaluated trust degree by the history of interactions or the reputations, and some other learners brought fuzzy theory, cloud model into the researches of trust management. All of these models based on the trusteepsilas outer information. However it is more reasonable to get the evaluations by both the outer information and the inner attributes. Aiming this...
One of the important functionalities in trusted computing is platform attestation, which allows us to reporting the current configuration of the platform to a remote Challenger. As a result of single threaded access mode on Trusted platform module (TPM), the server platform needs to process integrity requests turn and turn about, and then an issue on response efficiency arises in practice. An improved...
In current access control mechanisms, the system will assign access privileges to authenticated users without taking into account of the trustworthiness of the user, and the fact that authentication and access control are implemented in different modules provides a possibility for the illegal access. In this paper we first introduce the measure of user's trust, Certainty Factor (CF), and its computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.