The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recommendations for system security and usability to go...
The Internet is becoming increasingly mobile. Although several mobility solutions are proposed, none of them has been largely deployed. We propose a new system that can facilitate and support mobility on the Internet. The new mobility support service will be offered as a value-added service by mobility service providers to paying mobile customers. Therefore, the proposed solution is economically viable...
According to the specific demand of the construction of the information network confrontation defense system, this paper proposes a new network defense in-depth model of APR-WPDRRC based on closed-loop control mechanism. Since the model integrates variety of network defense in-depth new technology, it can achieve cooperation linkage and closed-loop control of quick pre-warning, active protection,...
Digital steganography is a kind of data security technique. In this paper, a new information hiding scheme was proposed. In this scheme, we embed secret message into still digital images based on (7,4) Hamming Code and Wet Paper Codes. It embeds seven secret bits into a pixel-group of seven cover pixels at a time at first, if that is unsuccessful, it embeds the first three secret bits into that pixel-group...
Social networking is become important component of our daily lives. People use them to share important personal data. However, most users do not fully realize the security implications of using social networks. Furthermore, social networks are vulnerable to many security attacks. One major threat remains the alteration of data in social networks. In this paper we review several techniques to protect...
The importance of mobility in networks is being increased together with its number of users and applications. However, we still do not have broadly accepted solutions for mobility in Internet or other type of networks. In particular, mobility is difficult in heterogeneous networks, where heterogeneity could expand over ownership, administration, technology, and so on. We propose for such heterogeneous...
This paper describes the objectives of the Working Group (WG) on Test Systems for Economic Analysis of Power Systems, and presents the current activities of the WG as well as the future plan.
An ID-based designed-verifier multisignature without trusted PKG is proposed. In proposed scheme, several signers cooperate to sign a single message and no one else than the designed verifier can be convinced by this signature. Since the scheme is based identity, it simplifies the certificate management. It is no need to trust PKG completely, so dishonest PKG can not be free to impersonate a user...
This paper improves an authentication protocol based on The Elliptic curve Cryptography, and applies it to WSNs. This scheme contains system initialization, node registration and authentication phase. It continues to use the primary scheme's high efficient multiplication operation method, and the sensor node store the other ID's hash value as the premise of the authentication. Besides, this scheme...
In this paper, we propose a self-protection model based on distributed intelligent agents. The major feather of this model is that autonomic agents can manage themselves given high-level objectives from administers. System can detect attacks and compromise, and recovering from security incidents without human intervention. We describe the model and the existing prototype, as well as some design and...
In this paper, a good data hiding scheme has been proposed. This scheme embeds messages into a still image based on (Fridrich, et.al; 2005; Dumitrescu, et.al; 2003) Hamming codes oriented wet paper codes . It embeds a segment of three secret bits into a group of seven cover pixels at a time. The experimental results show that the proposed scheme achieves high embedding efficiency and acceptable capacity.
On the basis of analyzing the requirements to the security of collaborative commerce system based on service oriented architecture, a security solution which can solve the security problem is proposed. The solution includes some technologies such as XML encryption, authority access control, signatures and intrusion detection, etc.
The Capital Asset Pricing Theory is hotly discussed with the development of China's capital market. For the study range in 2007, 65 stocks were chosen with certain rules to do an empirical research of the Capital Asset Pricing Model (CAPM) applicability in Chinese stock markets. The study found that, from the perspectives of constant and beta coefficient significant as well as the explanatory power...
An intrusion detection system which can work in IPv6 network environment is designed and implemented based on protocol analysis and pattern match technology in this paper. The system not only can fast detect system vulnerabilities and network intrusion events, but also possesses high accuracy and good performance. Furthermore, the system is tested using IDSwakeup. The test shows that the system can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.