The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software defined networking brings many possibilities to network security, one of the most important security challenge it can help with is the possibility to make network traffic pass through specific security devices, in other words, determine where to deploy these devices logically. However, most researches focus on high level policy and interaction framework but ignored how to translate them to...
There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper,...
The concept of value can be formalized as the ratio of benefits to costs. The value is realized if total benefits outweigh total costs, while value-adding consists of delivering higher benefit at lower cost. Software Product Line Engineering (SPLE) has shown its power to bring benefits and reduce costs for practitioners in various domains, however, systematic value-adding analysis is rare and adding...
Financial business of banking greatly relied on information technology, thus IT risks become an important issue in banking operation risks. Towards the supervision of IT risks, this thesis analyzes the principal systems of America, Britain, Basel Committee, HongKong, Singapore, etc. It comments on their achievement, aiming at monitoring and upgrading our banking IT risk supervision.
With the development of information society and the improvement of people's needs, E-ticket is an inevitable trend, which means a common platform for online ticketing has become a priority. This paper presents an integrated ticketing system based on two-dimensional (2-D) barcode on mobile phone, using coding and decoding technology of 2-D code and MD5 Message Digest Algorithm. There are also presentations...
A software-intensive company generally grows from one of its remarkable software products. Different approaches adopted by a company will contribute to its future evolution. The approach employed by FISCAN, a leading manufacturer of security inspection system in China, is software product line engineering (SPLE). This paper reviews the initiation and institutionalization of SPLE by FISCAN. This is...
Secure multi-party computation has been a research focus for more than two decades. The convex hulls problem is a special case of secure multi-party computation. However, the precise convex hulls will certainly expose every vertex and even bring about unfairness. As a result, the practical approximate convex hulls are in need. In this paper, we summarize and discuss the convex hulls problem, and then...
Privacy-preserving data mining aims at securely extracting knowledge from two or more parties' private data. Secure multi-party computation is the paramount approach to it. In this paper, we study privacy-preserving add and multiply exchanging technology and present three new different approaches to privacy-preserving add to multiply protocol. After that, we analyze and compare the three different...
Convex Hulls Problem is a special case of Privacy-preserving Geometry problems in the inquiry of Secure Multi-Party Computation (SMC). It can be applied in military, commercial and many other fields. However, because of the definition's inherent defect, current schemes will inevitably disclose the points on the vertices. In this paper, we proposed the concept of privacy-preserving approximate convex...
Least privilege is a basic principle to be conformed to when design computer systems. For file access control, the paper decomposes least privilege as user least privilege and program least privilege. User least privilege is a set of file with the corresponding access mode with which the user can access the file, and program least privilege is a set of file with the corresponding access mode with...
Convex hulls problem is a special case of privacy-preserving geometry problem in the inquiry of secure multi-party computation. In the past, only in two-dimensional space privacy-preserving convex hulls have been investigated, and there is little focus in the three-dimensional space. However, three-dimensional privacy-preserving convex hulls can be applied in many fields, such as researching and exploration...
Intrusion detection system will produce large numbers of alerts, most of which are fasle positives. This paper wants to associate multiple intrusion detection systems in large-scale network to reduce overwhelming false alerts and discover real security events in real time. For processing these alerts, two algrithms named reduce and cluster will be developed in this paper, which can remove false alerts...
The dynamic and cross-organizational aspects of Grid introduce challenging management and policy issues for controlling access to the resources. Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are protected by access control policies which may also be communicated to the other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.