The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Moving target defense is a revolutionary technology to change the pattern of attack and defense, and end-point information mutation is one of the hotspots belonging to this field. In order to counterpoise the defense benefit of end-point information mutation and service quality of network system, the self-adaptive end-point mutation technique based on adversary strategy awareness is proposed. Directed...
In order to solve the problem that BLP model directly canpsilat be applied to application systems, an application system-oriented mandatory access control (ASOMAC) model extended from BLP is proposed. Combining with role and security label , this model achieves the principle of least privilege and separation of duty, and not only improve effectively the agility of mandatory access control, but also...
Secure interaction between trusted-domains is a major problem on network security. Combining with the advantages of role-based access control (RBAC) and the existing authentication technique on crossing the trusted-domain, this paper proposes a privilege management model on crossing the trusted-domains (PMCT) which is suitable for large scale distributed network. Role recommending policy and unilateral...
In the grid security infrastructure (GSI), cross-domain authentication is based on traditional PKI cross certificate, which brings about problems of certificates management. Encouragingly, identity-based cryptography (IBC) can overcome these problems for its certificate-free feature. Therefore, an identity-based signcryption scheme is proposed in order to meet the requirement of cross-domain authentication...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.