The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As cloud computing technology develops rapidly, more convenience has been brought to users by various cloud providers with various cloud services. However, difficulty of management, especially when different access control protocols and personal information involved, has become one of barriers that inhibit the development process of cloud technology. In this paper, a user-centered ID MaaS (Identity...
In mobile Internet, Location-Based Services (LBSs) as a popular kind of context-aware recommendation systems can recommend Point of Interest (POI) data according to current locations of users. However, the inherent feature leads to leak sensitive location information of users into untrusted LBS providers. This paper aims at the location privacy problem on query prediction which forecasts next locations...
Nowadays, RFID technology is increasingly become popular and begin to enter many spheres of everyday life. In this paper, we present LocSafe, a “missed-connections” service with privacy grantees based on RFID technology, in order to prove an encounter sharing among users in the past. LocSafe is comprised of three parts: RFID Tags, LE Collectors, and Social Service Provider. We use RFID technology...
Subsynchronous Damping Control (SSDC) compensation damping plays a significant role in power system stability in HVDC system. This paper builds a linear model to analysis SSDC compensation damping characteristics based on an EPRI proposed double-ended DC test system. Calculation results show that electrical damping is obviously relevant to some factors, such as generator capacity, DC system transmission...
Dynamic phasors have been introduced to the HVDC model to analyze its dynamic behavior. Dynamic phasor method featured by high accuracy and calculation speed has many advantages, representing the switch state of the valve with switching function and flexibly selecting the proper time-varying Fourier coefficient based on the need of actual analysis. Based on analysis of influence exerted by thyristor...
Mobile IPv6 is a very important part in the mobile computing for global Internet. However, there are some vulnerability and attacks in the current mobile IPv6 such binding update and MITM. Therefore, the safe and flexible model to authenticate every entity is required. This paper studies the existing security problems in the current mobile IPv6; meanwhile, we summary and analyze the existing authentication...
Tagging systems are known to be particularly vulnerable to tag spam. Due to the self-organization and self-maintenance nature of Peer-to-Peer (P2P) overlay networks, users in the P2P tagging systems are more vulnerable to tag spam than the centralized ones. This paper proposes SpamResist, a novel social reliability-based mechanism. For each tag search, SpamResist client groups the search respondents...
In the real society, the owner of a tagged object may transfer its ownership to another party. An ownership transfer must satisfy the forward and backward untraceability. It is a new problem in the research of RFID security and privacy. In this paper, a simple and efficient security protocol, HBOT, for lightweight RFID tags with support for ownership transfer is proposed. The new protocol is based...
Deceptive behaviors of peers in peer-to-peer (P2P) content sharing systems have become a serious problem due to the features of P2P overlay networks such as anonymity, self-organization, etc. This paper presents Sorcery, a novel active challenge-response mechanism based on the notion that one side of interaction with dominant information can detect whether the other side is telling a lie. To make...
Tagging systems are known to be particularly vulnerable to tag spam. This paper introduces SpamClean, a novel social experience-based scheme, and presents the performance of SpamClean to defend against the tag spam in tagging systems. We first propose a novel mechanism based on cosine technique to compute the correlations between the client and other users in the system, and look the correlations...
Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static user data analysis have been presented to combat tag spam, but either they do not give an exact evaluation or the algorithms’ performances are not good enough. In this paper, we proposed a novel method based on analysis of dynamic...
With the development of grid technology, sensitive files and data protection become difficult tasks multi-domains. Traditional access control mechanisms are not suitable to such distributed environment. Several models and mechanisms utilize trust to assist access control decision. But few explicitly consider trust and risk as two separate factors which affect interactions between peers. In this paper,...
Usage control is a generalization of access control to cover obligations, conditions, continuity and mutability. However, the delegation component isn??t discussed to the full. In this paper, an improved scheme for delegation based on the usage control model is proposed. The new model is not just expanding the UCONABC model simply by increasing the delegation component as earlier literatures by Zhiyong...
In ubiquitous computing environment, resources become invisible, heterogeneous and anywhere. Traditional access control mechanism could not handle such dynamic and complex environment. In our proposed work, we view access control mechanism as a non-cooperative game. Thus, a game theoretic model for access control has been proposed to assist such mechanism. Different from traditional one, which depended...
In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper we propose a...
As e-commerce always suffers from the uncertainty, cheats and attacks, concepts of trust and risk are brought in to enhance on-line business. Several models or frameworks for dealing with uncertainty and threats in cyberspace have been proposed in the literature, but few explicitly consider trust and risk as two separate factors that influence different aspects of on-line interactions independently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.