The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User authentication is a very important securitymechanism for accessing the services while roaming in theglobal mobility networks. However, the authentication schemesdesigned are vulnerable to the attacks, hence new requirementsshould be employed while designing a scheme. In 2014 Gopeand Hwang proposed an efficient mutual authentication andkey agreement scheme, in which they stated that the schemeprovides...
This study focuses on supporting information systems security in the early phase of information systems development. Modeling languages have commonly been used by software developers during the designing of information systems. As an extension of Unified Modeling Language (UML) activity diagrams, Mal-Activity Diagrams (MAD) have also been used to model malicious and risk mitigation processes. Despite...
Software Defined Networking (SDN) is an emerging paradigm that changes the way networks are managed by separating the control plane from data plane and making networks programmable. The separation brings about flexibility, automation, orchestration and offers savings in both capital and operational expenditure. Despite all the advantages offered by SDN it introduces new threats that did not exist...
An insider contributes maximum to the leakage ofsensitive information knowingly or unknowingly in an enterprise. Therefore, the need for persistent protection of such informationis critical. At the same time, enterprise friendly features forrights and ownership management are of great importance to adigital rights management (DRM) system considering thedynamism of enterprise workforce in a large enterprise...
In order for an election system to be trusted, it needs to be verifiable. Methods must exist to check that the votes are cast as intended by the voters. There must be strong evidence that the machines function as they are supposed to function. Voters should feel confident that the election is conducted fairly and accurately. This paper first outlines the major concerns about election technologies...
With more companies turning towards cloud computing for storage and processing of their data, the security of the cloud becomes essential. However, cloud computing is vulnerable to many security threats, including data leakages, compromised credentials, presence of unauthorized users or entities, execution of insecure applications or programming interfaces and APIs, shared technology vulnerabilities,...
Mobile payment protocols have become more and more popular with the rapid development of network and mobile phones technologies. It gradually changes the consuming behaviors of consumers. However, must of the existing mobile payment protocols can only support on-line transactions. Some provides off-line transactions but have the limitation of micro-payments only. A micro-payment allows only a very...
The detection mechanism provided by current antimalware technologies expects that security researchers build a signature to uniquely identify the malicious samples. Once obtained, the signature will made available to final users using the update mechanism. This time window, which begins when malware is released and it lasts until the malware is identified, it is called zero-day window and represents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.