The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interconnected computing units are used more and more in our daily lives, starting from the transportation systems and ending with gas and electricity distribution, together with tenths or hundreds of systems and sensors, called critical infrastructures. In this context, cyber protection is vital because they represent one of the most important parts of a country's economy thus making them very attractive...
This paper addresses the potential of mathematical modelling in support of the classical security risk assessment and treatment approach. Classical security risk assessment and control selection is strongly based on expert judgment. Within the context of large scale system implementation in air traffic management, there is only a limited availability of resources during the system engineering phase...
The present paper introduces the aims of the BWSS-2012 Panel on scanning the future by looking to the tendencies of Computation and Complexity Sciences, namely Agents and Artificial Intelligence, in order to situate the power of current Social Simulation within the network of sciences.
It is urgent to upgrade urban water supply systems to improve water supply security in developing countries. This paper conducts models for analyzing the conflicts between local government and a water company based on game theory. Penalties and subsidies are considered as policy variables to promote water companies upgrading equipments. Then the model is enriched by adding policy variable, reputational...
Many computer-based communication media offer visual anonymity. As a result, detecting online deception tends to be more difficult relative to traditional non-mediated communication. The state of the art research on online deception has focused on using linear statistical approaches to identifying behavioral differences between deceivers and truth-tellers. However, deception behaviors are not linear...
Growing interest in information security technologies and security investments has resulted in many studies analyzing the information security investment process of firms and individuals. Existing studies, however, have focused on illustrating the behavior of a defender or an attacker unilaterally rather than observing the interaction of two players simultaneously. This study, therefore, expands the...
In traditional distributed computing systems a few user types are found having rather "flat" profiles, mainly due to the same administrative domain the users belong to. This is quite different in Computational Grids (CGs) in which several user types should co-exist and make use of resources according to hierarchical nature and the presence of the multiple administrative domains. One implication...
Task scheduling and resource allocation are the crucial issues in any large scale distributed system, such as Computational Grids (CGs). However, traditional computational models and resolution methods cannot effectively tackle the complex nature of Grid, where the resources and users belong to many administrative domains with their own access policies, users' privileges, etc. Recently, researchers...
In order to solve the problem of trust management in E-marketplace where asymmetric information exists between buyers and sellers, we propose a trade selection algorithm based on game processing in C2C environment in this paper. With the idea of rational expectation of economics, the selection of rational contracting parties is imitated, and a credit-scoring model is presented according to history...
Scheduling independent tasks in Computational Grids commonly arises in many Grid-enabled large scale applications. Much of current research in this domain is focused on the improvement of the efficiency of the Grid schedulers, both at global and local levels, which is the basis for Grid systems to leverage large computing capacities. However, unlike traditional scheduling, in Grid systems security...
The inefficiency of the securities regulation results in the instead development of the securities in China. Dealing with the inefficiency of the securities regulation is very vital to the development of the the securities in china. We developed an infinitely repeated game model and a simplified KMRW reputation model to prove that the construction and maintenance of the listed companies' reputation...
The most serious problem in the area of quantitative security evaluation is modeling of hacker's behavior. Because of the intelligent and complicated mental aspects of hackers, there are many challenges to model their behavior. Recently, there have been some efforts to use game theory for predicting hacker's behavior. However, it is necessary to revise the proposed approaches if there is a society...
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors of email users in the email worm propagation process. The game situation models the actions of the email users under the condition that at the time they open an attachment, the system...
Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify...
Terrorists tend to coordinate multiple raids which, combined with diversionary attacks are designed to divert the attention of the security forces, causing them to take a longer time to respond. This in turn enables the terrorists to cause more casualties at their primary target. It is important to efficiently reallocate the available security forces to meet these terrorist attacks, especially when...
Individuals in computer networks not only have to invest to secure their private resources from potential attackers, but have to be aware of the existing interdependencies that exist with other network participants. Indeed, a user's security is frequently negatively impacted by protection failures of even just one other individual, the weakest link. In this paper, we are interested in the impact of...
For assessing the security and optimal strengthening of large enterprise networks, this paper proposes a new approach uses configuration information on firewalls and vulnerability information on all network devices to build defense graphs that show the attack and defense strategy. Some models including a defense graph model, attack-defense taxonomy and cost quantitative model, and Attack-Defense Game...
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enhanced security policies does not necessarily establish the mutual trust relationship ultimately, and even has a negative effect on the usability and acceptability of DRM system. Therefore,...
How to quantify the threat probability in network security risk assessment is an important problem to be solved. Most of the existing methods tend to consider the attacker and defender separately. However, the decision to perform the attack is a trade-off between the gain from a successful attack and the possible consequences of detection; meanwhile, the defenderpsilas security strategy depends mostly...
How to quantify the threat probability in network security risk assessment is an important problem to be solved. Most of the existing methods tend to consider the attacker and defender separately. However, the decision to perform the attack is a trade-off between the gain from a successful attack and the possible consequences of detection; meanwhile, the defender’ssecurity strategy depends mostly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.