The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world. This...
With the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable environment transaction management technology is believed to provide service reliability and data consistency. Existing models developed for mobile transactions mainly focus on variation of conventional commit procedures and give...
With the popularity of the Internet, the load on the servers is aggravated heavily, so secret sharing is used as a fundamental approach for improving availability of an online service. In a (t, n)-threshold secret sharing scheme, any t-out-of-n participants could recover the shared secret, and any less than t participants could get nothing about the shared secret. However, with the long life of the...
During the last years, the growth of e-commerce has been considerable due to the increase of user confidence in secure electronic payment. Most of the security proposals in commerce scenarios have been based on a classical e-payment system definition. This definition basically represents a client who sends a payment order to obtain some goods/services from the merchant. Nevertheless, these definitions...
Nowadays more and more information systems are being shifted to distributed architectures because of the benefits like scalability, autonomy, and faulty-tolerance implied from the essence of the distributed systems. Here, every process is peer and cooperates with other peers to achieve common goal. In order to do that, peers have to efficiently and flexibly make an agreement on one common value which...
The security of Industrial Critical Infrastructures is become a prominent problem with the advent of modern ICT technologies used to improve the performances and the features of the SCADA systems. In this paper we present an innovative approach to the design of Intrusion Detection Systems. The aim is to be able to detect complex attacks to SCADA systems, by monitoring its state evolution. By complex...
Much research aiming to design practical algorithms to support Byzantine Fault-Tolerant distributed applications has been made in recent years. These solutions are designed to make the applications resistant to successful attacks against the system, thereby making services tolerant to intrusions. Recently, some of these studies have considered the use of virtual machines for building a trusted computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.