The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Through the in-depth study of the existing network information security technologies, combined with the actual situation of the small and medium enterprise information systems, this paper puts forward a security implementation program based on small and medium enterprises and describes the implementation details of which. This network information security design is simple, easy to operate and so on.
Information exchange and convert is an important part of Internet of Things. The establishment of information sharing platform is necessary. In this article, DNS service principle and existing registration-mechanism are being imitated, in order to present a new data sharing platform-IIEDNS which based on the Internet of Things. Platform used the DNS service principle to achieve the link among platform...
According to the concept of dividing the strategy definition and the strategy implementation, the authorization model of Security Mechanism for Network Virtual Robot is put forward in this paper. The major data structure in the model is protected areas, operator stack and strategy image, the protected area encapsulated the class characteristics of corresponding to the code source, such as code source(including...
One-Time-Password authentication is a simple, little cost and more efficient technology. Access control is another mechanism by controlling access which is legal or not. These two are separate. To get high safety and reduce the complexity of operating, this paper proposes a new integrated scheme base on them. It has some important merits include:(1)there is no verification table;(2)users can freely...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
The negative impact of network partitions on the availability of key management services in Wireless Local Area Network (WLAN) is alleviated by a robust key management scheme based on the distributed certificate authority (DCA). Auxiliary shares are used to increase the redundancy of shares in the networks thereby ensuring robustness and security at the same time. Simulations show that the average...
Authentication is very important in the security and technology of electronic accounting system. It is the first protector and the portal of network system. The purpose of authentication is verifying the identity of two communication parts and prevents the illegal users steal the data of accounting system. In the secure network communications, the parts of communications only can achieve access to...
A scalable authentication protocol is proposed for security and efficient RFID communication. The performance evaluation and security analysis has proved its advantages. Compared with other protocols, it can preserve content and location privacy, resist replay attacks and Dos attacks, and has forward security and scalable.
In the paper, two SNS buddies relationship based authorization delegation mechanisms are introduced to enable SNS users to share his/her external protected resources with friends or friends' friends. Through this solution, user can share more information or documents with his/her friends in a controlled way; he/she can easily find the wanted information or documents with the help of social network...
Web information systems are now widely used. These systems generally provide specific service in accordance with users' identities. To use these services, users are required to conduct identity authentication separately when logging in different web applications and systems. For the sake of security and access control, it is infeasible to use a unique common identifier and password for all systems...
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs) in wireless applications. Current approaches rely mostly on the use of privacy policies to describe and solve this problem in an ad hoc way. In this paper, we propose a method based on the three-dimensional access control model to support privacy requirements. We show...
As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point...
Password authentication has been adopted as one of the most commonly used solutions in a network environment to protect resources from unauthorized access. Recently, Shieh et al. and Yoon et al. respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
Recently, home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. This paper designs a ubiquitous computing based smart home safety management (U-SHM) for digital life. The proposed scheme integrates RFID and context awareness technologies in ubiquitous environments to increase the efficiency of mobile commerce and improve the life...
With advances in distributed computing technologies, group communication systems (GCS) have received a lot of attentions. Besides reliable and ordered message delivery services, these applications require plenty of security services, such as data secrecy, data integrity, and user authentication. However, less work has been invested on how to integrate authorization scheme within efficient communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.