The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Selecting, developing and deploying a document management system for engineering use involves the ability to follow an engineering revision process, integrate easily with engineering and corporate applications (custom or Commercial Off the Shelf (COTS)), uniting disparate on-premise and cloud systems, and integrating existing and evolved business processes and applications.
The main goal of proactive security is to prevent attacks before they happen. In modern information systems it largely depends on the vulnerability management process, where prioritization is one of the key steps. A widely used prioritization policy based only upon a common vulnerability scoring system (CVSS) score is frequently criticised for bad effectiveness. The main reason is that the CVSS score...
In this paper a novel technique of fragment visible mosaic image is proposed. It is a unique and novel kind of computer art called Mosaic tile image steganography technique, which transforms a color secret image into a so called secret fragment visible mosaic image of the same size. Initially choose randomly any color cover image from the existing database, which looks similar to secret color image...
In recent years, many financial sectors are evolving with huge numbers of web applications, which plays a crucial role in organizations to make important decisions. Considering this, the data has to be secured in order to prevent it from any attacks which lead to a huge loss. One of the topmost attacks in the database is SQL injection attack, is injecting some malicious query into the database causing...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
In order to find out the network security problem of the IP Multimedia Subsystem (IMS) in Diameter protocol, first of all, this paper builds a security test model of classification entity according to different entities in IMS network. Then owing to the fact that test messages are difficult to pass the protocol specification, we present a limited distance method for generating test message based on...
Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, we propose an approach to provide secure...
Scientific documents need to be checked for plagiarism before publication. On the other hand, authors do not want to reveal their document's contents prior to successful publication. In this paper, we propose a novel approach for plagiarism detection in scientific digital libraries, which does not reveal contents of unpublished documents, but allows for early detection of plagiarism attempts. Based...
Security is an important aspect in the practical deployment of biometric authentication systems. Biometric data in its original form is irreplaceable and thus, must be protected. This often comes at the cost of reduced matching accuracy or loss of the true key-less convenience biometric authentication can offer. In this paper, we address the shortcomings of current face template protection schemes...
This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice conversion. We design two protocols, one for standard speaker verification evaluation, and the other for producing spoofing materials. Hence, they allow the speech synthesis community...
This paper presents a person identification technique that uses information from person's shadow, and is robust to appearance changes caused by variations of clothes and carried objects. The technique uses invisible lights and resulting shadows and has advantages from undetected sensing. The shadows on the ground obtained through illumination by multiple lights can be considered as silhouettes captured...
The security is issue in online applications. Online transactions are increasing day by day due to internet but the attack are also increasing in same propotion due to poor architecture of the system, improper validations of the system. The modification in input query by the intruder leads to major damage to the database. Many tools and products were developed to avoid this but no approach was satisfactory...
As low-cost tags based on the EPC C-1 G-2 standard are much limited in storage capacity and computation power, most of the existing authentication protocols are too complicated to be suitable for these tags, and the design of authentication protocols conforming to the EPC C-1 G-2 standard is a big challenge. Recently, a mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard...
The Central Database is one of the core components in the Palestinian e-Government technical framework. The Central Database model lacks features such as: interoperability, flexibility, and manageability. The purpose of this paper is to propose a SOA based solution for the Central Database that achieves the above features.
The comprehensive archives information digital management system is developed to adapt to the actual archival work in public security service institutions. This article expounds the system from the perspectives of its functions, developing tools, main characteristics and structural designs.
Informationalization is one of the most important technology revolutions since the 20th century, and the establishment of social security system is one of the major task for our social construction. The development of social security management service system has post basic requirements to Informationalization construction of social security as informationalization can also facilitate the development...
This paper presents a systematic approach for a context-based evaluation of SOA testing tools, with an emphasis on security. An evaluation framework is used to structure a case study with a selection of SOA testing tools. The evaluation data are analyzed and discussed to show the tools' strengths and weaknesses. This research reveals three main results. The first result highlights the gap between...
Reference clinical data interchange standards defined by CDISC (Clinical Data Interchange Standards Consortium), we developed clinical data management system with distributed system architecture which can be executed on different platforms for high performance. This system consists mainly of study management module, data capture module, data management module and security module. Besides, web-based...
With the development of computer network and communication network, people can shoping, book tickets and deposit or fetch money through electronic commerce at home; they also need to see the collection, exhibition and activities of museum via Internet at home. Therefore, many museums make their collection digitalized to meet people's needs. In accordance with The United Nations definition, cultural...
In its simplest form, identity management deals with how users are identified and authorized across networks. In the case of federated identity management, these networks cross system and organizational boundaries. To manage identity in this context, a cooperative contract is set up between multiple identity providers, using a decentralized approach. Establishing an identity management strategy within...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.