The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today many design houses must outsource their design fabrication to a third party which is often an overseas foundry. Split-fabrication is proposed for combining the FEOL capabilities of an advanced but untrusted foundry with the BEOL capabilities of a trusted foundry. Hardware security in this business model relates directly to the front-end foundry's ability to interpret the partial circuit design...
Managing complex enterprise networks requires an understanding at a fine granularity than traditional network monitoring. The ability to correlate and visualize the dynamics and inter-relationships among various network components such as hosts, users, and applications is non-trivial. Network security visualization is a highlighted topic of network security research in recent years, The existing research...
Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. For the technical issues that the index of security situation is not accurate, and visual effects is not straightforward, the paper designed and implemented the security situation visualization prototype system based on geographic...
Virtualization technique is one core of cloud computing. For the virtualization security problem introduced by cloud computing, especially for the private cloud computing, a solution based on divide-conquer strategy is proposed. First, the security risks induced by virtualization are analyzed and classified, and then based on the divide-conquer idea, for each kind of security risk, some corresponding...
Digital Rights Management ecosystem is composed of various participants, which adopt different security policies to meet their own security requirements, with a goal to achieve individual optimal benefits. However, from the perspective of the whole DRM-enabling contents industry, a simple adoption of several increasingly enhanced security policies does not necessarily implement an optimal benefit...
Vehicle safety communication applications require safety messages to be received by all the targeted vehicles within their lifetime. We propose a piggybacked cooperative repetition approach for reliably broadcasting safety messages in VANETs. Repetitions by neighbors that receive the original transmission can effectively cover the areas that are missed in the original transmissions. Moreover, the...
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enhanced security policies does not necessarily establish the mutual trust relationship ultimately, and even has a negative effect on the usability and acceptability of DRM system. Therefore,...
A secure and trusted distribution of digital contents is a fundamental requirement for Digital Rights Management (DRM) system, so that the integrity of user terminal platform should be verified prior to contents' distribution in order to assure that the platform is free from a malicious modification and attack. Recent years the emerging trusted computing has better enhanced the necessary functionality,...
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights policy by using DRM agent. First, descriptions of extensible ODRL-based rights transfer policy were presented to complete OMA REL. Then, we introduced a remote attestation mechanism among...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.