The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developers need suitable metric for computer system security. Metrics must adapt to conditions of computer system's environment. Considering the ability of administrator and dynamic environment are the most important conditions of computer system. In this paper, we present a metric for computer system security based on Evolutionary Optimization. Our approach considers a value for ability of administrator...
There are many risks for computers in network. However most risks can not be solved, managing of risks is appropriate approach to empower the computers. Every developer need to an appropriate approach for managing threaten risks for computers. In this paper, a new approach for risk management base on polling system is presented. Management of risks includes recognition of assets and evaluation of...
Wireless sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a Refined Key Link Tree (RKLT) scheme that incorporates dirty key path into the key link tree-based group key management...
Currently, there exist different trust models in peer-to-peer application. Each model has an abundance of trust information about trust and reputation attributes which are needed for establishing trust between peers. These trust models canpsilat be easily interoperable due to no approach for integrating in a semantic way the trust information from different models. Integrating trust information in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.