The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Resource Date Center (RDC) for labor and social security bureau (LSSB) was come into being following the need of information sharing and social service of networks. Progress on information technology led to unfitness of current theoretical architecture for traditional data center. In this paper, we analyzed the proposed an integrated solution called typical labor and social security management information...
Traditional information retrieval systems have several shortcomings in common, such as delaying in information updating, costing additional host and network resources, and so on. The promise of mobile multi-agent technology is becoming highly attractive. We approach to apply the mobile multi-agent technology to information retrieval in order to build a brand-new system. Although the mobile multi-agent...
To meet the new requirements drove by nowadays E-commerce for the signature schemes, a new threshold signature scheme is proposed from bilinear pairings based on improved short signature scheme, which realizes a single signing member can accomplish signature efficiently. The analysis shows that the scheme serves properties of non-masquerading and auditing, the members can be added and revoked dynamically...
Water environment monitor is an important component of environmental monitoring system. In this paper, the authors discuss that the solar energy technology, the wireless GPRS network transmission technology, VPN agent technology, sensor technology and information security technology could be employed in the field of hydrology intelligent on-line monitoring to solve the on-site monitoring of power...
With rapid development of urban construction, there are more and more urban construction archives, more and more types of construction archives. The traditional ways for submitting the urban construction archives, such as paper-based submission, disk-based submission and email-based submission, can't meet the much more complex demands. The shortage of paper-based way is that it can't be in time and...
As the wide adoption of in-cloud services (e.g., software-as-a-service), some major identity related issues are brought up. For enterprises, it usually introduces additional cost and risk to manage identities in services. For service providers, typical pairwise identity federation solutions are not scalable to support single sign-on, service composition, etc. among services for large environment like...
Based on the analysis of TrustGuard algorithm and the observation of malicious behaviors in distributed mail systems, we present MailTrust, a credibility-based reputation-generating algorithm, which is suitable for mail reputation system. It improves the credibility algorithm of TrustGuard and stores the credibility information of evaluation nodes at local, which aims to filter out dishonest feedbacks...
IP Multimedia Subsystem (IMS) is a common architecture providing real-time and non real-time IP multimedia services. 3GPP IP Multimedia Subsystem is a part of 3G system core network (CN) and provides an IP-based session control capabilities based on Session Initiation Protocol (SIP). Although 3GPP organization defines some security mechanisms to protect IP-based IMS network, there are still some security...
As the development of mobile communication technology becomes gradual mature, the short message service which sends messages from the information platform to the mobile phone users has been a method for the most users to obtain information timely and conveniently. This thesis collates the short message service system exploited for the mobile phone users and the service platform for the network users...
With the development of remote sensing technology, the use of remote sensing images collected by space platforms is becoming more and more pervasive. There is more and more need to distribute processing of remote sensing images. At present, WebService can figure out non-security remote sensing images network processing, but due to network transmit without non-encryption at client side, which may lead...
Trust management and trust negotiation are prevailing approaches for establishing trust relationship in grid-based systems across security domains and inter-domains. In this paper, we propose TTN, a combining trust management with trust negotiation mechanism which provides the authorization and access control for the Scientific Data Grid and aims to enhance the grid security. The framework takes into...
Due to the various kinds of information expressing and transferring standards made by different vendors, the existing security products can not interoperate with each other efficiently. In order to solve this problem, an OVAL-compatible multiplatform vulnerability assessment system (VAS) is proposed in this paper. First, it adopts OVAL as the vulnerability assessment standard. Second, it takes lightweight...
The Web services technology has been emerged as a set of standards for publishing, discovering, and composing independent services in an open network. While the rapid development in wireless communication technologies is greatly changing the way people access and work with information. Mobile computing system based on Web services now supports advanced methods for application integration through distributed...
As the rapid increase of network security events, network security monitoring and management on network behavior become more and more focused in the fields of computer science. This paper develops a kind of fuzzy constraint correlation algorithm based on prerequisites and consequences of security event. The introduction of fuzzy constraint correlation can resolve the issues of false negatives and...
Due to the dynamic and anonymous nature of open environments, it is critically important for agents to identify trustful cooperators which work consistently as they claim. In the e-services and e-commerce communities, trust and reputation systems are applied broadly as one kind of decision support systems, and aim to cope with the consistency problems caused by uncertain trust relationships. However,...
Current wireless communications enable people to easily exchange information, while web services provide loosely-coupled and platform-independent ways of linking applications across the Internet or Intranet. This paper presents an integration of wireless communication technologies and web services technologies to realize a wireless food ordering system. In this system, it implements wired and wireless...
A defense system against UDP flooding attack with artificial immune detection was put forward, and four sections detection with weight was proposed based on considering the uncontinuity of IP address. Eigenvalue matching was introduced based on analyzing the r-continuous bits matching rule. Using the new matching rule the negative selection algorithm was improved both in detector generation and "black...
In this paper, we introduce an m-commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce...
To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email addresses. It has been observed that spammers conceal their identity to a lesser degree in the harvesting phase, so it may be possible to gain new insights into spammers' behavior by studying the behavior of harvesters, which...
In view of the limitation of the traditional security technique in Web service (WS) session domain, it researched the session security management model based on Web service and analyzed the security specifications of WS-Security and WS-Conversation proposed by IBM and Microsoft. In combination with a specific E-Commerce project, it discussed the design of session security model, analyzed the process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.