The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a new method for off-line Chinese signature verification. The approach is based on feature extraction of every segment segmented from the signature image. A signature image is segmented to some segments. Every segment is represented by a set of seven features, because each type feature has a different impact for the signature verification, each type weighting factor is very...
This paper analyzes the shortcoming of web services (WS) access control model, discusses many research methods of policy-based access control technology. Based on SAML, XACML, OWL and policy protocol layer, the paper proposes an access control model WS-HPBAC of dynamic hierarchical policy of WS, and realizes a cross-domain semantic WS access control system. The system provides more overall access...
Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute...
Firewalls are important elements in today's network security. This paper presents a flexible policy-based firewall management framework. The framework provides policy-based management to manage different types of firewalls, such as packet filter firewall, application layer firewall. It is important to know whether the firewall policy configuration and enforcement is correct. We believe that there...
As the rapid increase of network security events, policy-based management is more and more widely used to monitor and manage the behavior of network. But the policies are created and deployed by the administrator, and can not automatically adjust without the involvement of human. This paper develops an evolutional network security policy framework based on genetic-feedback algorithm. Based on the...
As a new computing mode, the mobile agent technology attracts more and more attention of researchers. However, its complex and changeful computing environment brings forward a higher requirement for the flexibility and consistency of the system's security access control. To meet this requirement, this paper puts forward an access control model which can be applied in the mobile agent system (MAS)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.