The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional routing protocols are designed to efficiently find paths containing high-quality links under assumed trust environment. Nowadays, numerous schemes have been proposed to defend attacks with the increasing attention on security issues in the applications of multi-hop wireless networks. However, only limited works consider the routing performance while securing the routing protocols. In order...
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and related products to customers. However, there are still some difficulties for customers to adopt cloud computing, in which many security issues exist, because data for a customer is stored...
The need for network traces has always been a critical element for the success of network, and network security, research. However, the plethora of privacy, legal and policy issues has often prevented access to collected traces. This has created the need for developing anonymization methods and tools to protect the privacy of the released traces while preserving utility in the data. A key dilemma...
As a new form of malicious software, phishing websites appear frequently in recent years, which cause great harm to online financial services and data security. In this paper, we design and implement an intelligent model for detecting phishing websites. In this model, we extract 10 different types of features such as title, keyword and link text information to represent the website. Heterogeneous...
This paper targets at building efficient perimeter defense for virtual private cloud (VPC) in public cloud that provides infrastructure as a service (IaaS). Because topology information can help both cloud and cloud user to better manage VPC infrastructure, we propose topology oriented VPC deployment to 1) reduce the security threats caused by transparency/virtualization, 2) to facilitate perimeter...
Network security has become an increasingly important yet challenging issue in present production networks. State-of-the-art solutions cannot meet the overall requirements of high-efficiency security, due to the complicated configuration demands, heavy network traffic and ever-increasing network scale. In this paper, we present Live Sec, a scalable and flexible security management architecture, which...
Wireless sensor networks (WSNs) consist of wireless nodes, which have relaying functions without the fixed communication infrastructures such as the base station. With WSNs, multiple paths are used for alternate paths against route breaks, ensuring bandwidth and security. However, the downside is that multiple paths have an elevated control packet count. The method of finding multiple paths is referred...
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme incorporates mechanisms to mitigate arbitrary amounts of data corruption. In particular, protection against small corruptions (i.e., bytes or even...
Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations...
Data provenance, which records the history of the ownership of a document, as well as the actions performed on it, has received great attention in recent years. However, the privacy issue in data provenance has not been well investigated. In this paper, to simultaneously protect the security of data provenance and achieve user privacy preservation, we propose a new privacy-preserving data provenance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.