The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the connotation of insisting on human-oriented, comprehensive, coordinated and sustainable development, this paper constructed the comprehensive human all-round development evaluation indicator system. It used Gini coefficient method to determine the weights of indicators, applied the TOPSIS method to establish the comprehensive evaluation model of human all-round development, lastly...
Hidden dangers in system are the main reason that causes accident happen. Using theory of constraints, it achieved the coal mine hidden dangers divided scientifically and reasonably. On the one hand, establishing coal mine hidden danger information's constraint treating flow, it makes the definition of the coal mine worker's responsibility and ability clear. On the other hand, it study on the operating...
General network attack graph has a large state space. It affects the efficiency of network attack graph generation greatly. In order to solve this problem, a reverse search based network attack graph generation method is proposed. It starts from the target hosts that the goal of attackers, by analyzing the vulnerabilities and connectivity of them, finds all the middleman hosts, then repeats the search...
In the applications of multimedia fingerprinting schemes, such as IPTV, the number of potential users can be large as millions. So many user set demands not only high robustness of fingerprints but also high bandwidth efficiency and security of the whole system. We propose a secure fingerprint scheme embedding fingerprints at the client side while decryption. It not only solved the confliction of...
Over the last few years, a large number of security patterns have been published. However, this large number of patterns led to a problem in selecting appropriate patterns for different security requirements. In this paper, we present an automatic selection approach for security patterns. We use text processing approach and learning techniques to select appropriate security patterns for given security...
Protocols for electronic voting are becoming popular with the widespread use of Internet. In this paper we propose an e-voting protocol. Our architecture is unique in that it attempts to integrate two topics of much relevance in e-voting: secure coding and information security. The former sometimes referred to as defensive programming provides defense against certain exploits while the latter deals...
With the rapid development of socio-economic, the public security is facing increasingly serious challenge. Police geographic information system (PGIS) has been widely promoted and is playing an important role in effective and efficiency for keeping national security. Police intelligence analysis function is one of core parts of PGIS which exactly and rapidly deal with emergencies to decrease damage...
Computer network operation (CNO) decision making activity includes three sub-activities: mission definition, scheme design and scheme evaluation. Scheme design produces many attack schemes of the same target. During scheme evaluation, attack schemes are evaluated and the comparatively optimal one is selected as course of action (COA) based on certain criterions. In this study, a multiple criteria...
This paper presents a new way to verify whether a behavior model of code satisfies a security policy in the model-carrying code(MCC) approach for safe execution of untrusted code. This new verification method based on a new kind of model called logic semantic based automata(LSBA). Logic semantic based pushdown automata(LSBPDA)is to model safety-related behaviors of codes unknown to a user and logic...
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those...
The rise of cloud computing leads to a possibility that nearly all applications can be ported to Web and only browser is needed in client computer. This kind of computer is called network computer or thin client. PC and laptops are fat clients and too luxurious to run browsers only. Netbooks and nettops are cheap and designed to match cloud computing. But they are still using the same operating systems...
In order to obtain the useful sequential pattern knowledge from the historical sequence database, which reflects the characteristic behavior of software fault, a novel sequential pattern mining algorithm oriented feature discovery of software fault based on location matrix named SPM-LM is proposed. The pattern growth theory and the concept of location matrix are introduced into the new proposed algorithm...
The trusted computing group (TCG) has set down and issued trusted platform module (TPM) specification, and the security of the trusted computing system relies on the security of TPM. In this paper, the relationship between the keys inside TPM and TPM users has been established by analyzing the access control mechanism of TPM. The fact that a malignant user of a child key can break the integrity of...
3G standards including W-CDMA, CDMA2000, TD-SCDMA can provide high-speed data service. Now, 3G technologies have been employed in many fields. In this paper, we mainly discuss the key technologies of using 3G mobile system to construct remote monitor system. Compared to other communication technologies, 3G technologies have many advantages. While we use 3G mobile system to construct remote monitor...
E-learning, as an efficient education method, has been developed rapidly. Personalization in e-learning has also drawn more and more attention. Based on our agent-based e-learning system architecture, this paper proposes a learner profile design model to facilitate the development of personalized e-learning systems. The model extends the IEEE PAPI specification and focuses on critical personal information...
This paper discusses the measurement methods of the software credibility in three dimensions-management, process and the final product for quality process. And the software credibility is classified into different levels. The each level degree of membership of the software is got through calculating the each level degree of membership of each metric according to the membership function, and combining...
A new idea for studying the ability for computer to bear and process viruses after suffering from the intrusion of the viruses was discussed in this paper. This ability was named intrusion tolerance. Starting from the intrusions, capturing the behavioral characteristics and dynamically adopting different strategies enable the system to continue to provide security services. In the mean time, applying...
There are some weaknesses in the traditional safety evaluation methods, such as, slow reasoning, low accuracy and so on, so thinking of a variety of factors which affect gas safety, a gas safety evaluation index system is built, which focuses on the state of gas, mine ventilation, gas monitoring, safety management and kindling. Combining the fuzzy comprehensive evaluation method with gray correlation...
This paper investigates the relationship of voluntary disclosure and information quality. A broad sample of 4551 listed Chinese firms is choused excluding financial industries from 2005 to 2008. Considering endogenous problem, we use OLS model and a model of simultaneous equations (2SLS method) to explore the relationship, respectively. Our results indicate that there is a typical endogenous problem...
With the further opening up of the financial marketing to join WTO, the banks in China will be confronted with tremendous pressure of competition. Meanwhile, with the development of information technology, E-banking has become a major inter-bank competition. In this competition process, the service quality to maintain long-term impact has become an important aspect of competitive advantage. According...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.