The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secure communications in the context of civil space missions gained a major attention in the last few years, mainly thanks to the activities promoted in this field by the Consultative Committee for Space Data Systems. Risk analyses performed by several space agencies have provided indications of the impact of different security threats on several categories of space missions. As a result, to ensure...
Gong, Long, Hong and Chen defined the security model of certificateless aggregate signature schemes for the first time. However, there are some weaknesses exist in their model. In this paper, we point out some drawbacks of the security model of Gong et al.'s and present a new one. A certificateless aggregate signature scheme that is provably secure in our model is also presented. The security of our...
We present in this paper a scheduling algorithm towards the service migration uncertainty that aims to enhance the service survivability in the server cluster system. Survivable scheduling algorithm is one of the important aspects of survivability study. This paper introduced the stochastic mechanism in the server cluster systems, which made it uncertain of the services migration among the servers,...
Due to the considerably big marketplace, enterprises seek to benefit from e-commerce in China. But up to now very few of them have been successful, because some successful business models and strategies in developed countries can not be applied in China. This study examines obstacles on e-commerce development in China and attempts to find out some solutions to overcome these barriers. The relevant...
Document sanitization, i.e., the process of removing or generalizing sensitive information in order to reduce the security classification of the document, is widely used today in applications of information sharing. Traditional document sanitization systems focus on removal or generalization of certain words and phrases, but do not take into account the utility of the sanitized documents. This leads...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.