The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Natural language processing (NLP) of clinical text offers great potential to expand secondary use of high-value electronic health record (EHR) data, but a barrier to adopting NLP is the high total cost of operation, driven mainly by the costs and limited availability of technical personnel in applied health research settings. To overcome this barrier we propose a cloud-based service systems model...
Growing interest in information security technologies and security investments has resulted in many studies analyzing the information security investment process of firms and individuals. Existing studies, however, have focused on illustrating the behavior of a defender or an attacker unilaterally rather than observing the interaction of two players simultaneously. This study, therefore, expands the...
In the e-commerce transaction process, varieties of network fraud problems occurred frequently. A C2C service reputation evaluation model under Cloud computing is Proposed. Firstly, the paper analyzes the four factors impact reputation evaluation under the cloud computing environment, and analysis the weights of each factor quantitatively. Secondly, a method to calculate the long-time reputation,...
Task scheduling and resource allocation are the crucial issues in any large scale distributed system, such as Computational Grids (CGs). However, traditional computational models and resolution methods cannot effectively tackle the complex nature of Grid, where the resources and users belong to many administrative domains with their own access policies, users' privileges, etc. Recently, researchers...
During the first decade of this century, the online games are developed rapidly in China. But the virtual items transaction problems hinder the development of online games. Traditional trading models cannot meet the demand of both security and convenience at the same time. In order to improve the traditional transaction models, this paper presents a more secure transaction platform by embedding a...
In this paper a new useful model for advertisements dissemination is presented, Using virtual currency to incent nodes disseminate Ads and dynamic window strategy to defend a type of DoS attacks, in which the goal of the adversary is to exhaust the energy of the nodes and to increase their response time to broadcast messages. Besides, the method can also prevent malicious nodes disseminating Ads repeatedly...
Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account...
This paper presents a causal assessment model based on Bayesian Belief Networks to analyze and quantify information security risks caused by various threat sources. The proposed model can be applied to a variety of information security evaluation tasks, risk assessment, software development projects, IT products, and other decision making systems. This unique concept can also be used for the determination...
Trustworthiness is an essential and sometimes life-critical concern in software-intensive systems. Furthermore, supporting the proper testing of these systems can often times prove complicated. Within trustworthiness, security and privacy play key roles. Considering both security and privacy issues early in development are necessary to increase the trustworthiness of systems. In this paper we concentrate...
This project aims to solve the problems of identity authentication of users in online tests. The project integrates a biometric identification module based on techniques of fingerprint recognition in the educational communities and learning management systems where most of the courses for distance education are held. The project aims to cover all the weaknesses that traditionally have the password...
With the rapid development of industrialization and urbanization, crime prevention issues become serious in China each day. Although various security facilities have played a positive role in the field of crime prevention, defects exist in poorly designed systems targeting personnel protection, physical protection, and electronic protection. Therefore, it is a major strategic task to improve risk...
Open and anonymous communication networks like Peer-to-peer (P2P) systems promise to eliminate the scalability concerns and central vulnerability points. But P2P systems are often insecure and provide an opportunity for viruses and distributed denial of service (DDoS) activities to spread due to the fact that there is no method to verify the trustworthiness of users and shared files. To make such...
Information security managers with fixed budgets must invest in security measures to mitigate increasingly severe threats whilst maintaining the alignment of their systems with their organization's business objectives. The state of the art lacks a systematic methodology to support security investment decision-making. We describe a methodology that integrates methods from multi-attribute utility evaluation...
In this paper, we propose a security evaluation model for the web application and define a security evaluation function based on the Analytic Hierarchy Process (AHP) to describe the model. We use the evaluation method proposed by this paper to evaluate the vulnerability test effect of a BBS application named IPB. The experiment result reveals that the evaluation value calculated by the security evaluation...
This paper established a two-stage logic trust model for consumers with online shopping experience and without, and on this base, put forward the corresponding calculation formula and assessment method of trust degree, which provide reference and experience for the e-business companies to make correct decision and reasonably schedule their network marketing activities due to different stages of consumers.
In open service grid, to establish trust relationships among different domains is a basic problem. This paper proposes a layered trust model based on behavior to enhance grid security and extensibility. The upper layer establishes and maintains recommendation trust relationships between different domains in grid; lower layer is in charge of evaluating trust value of entities in his domain. We give...
Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification...
Almost every company needs to process invoices to either claim money from their customers or to pay for products or services. Although companies are allowed to electronically process their invoices, most of them still rely on the paper-based invoice process. Within this paper we built upon existing work to develop a methodology for defining a reference model for the electronic invoice based on security...
In the context of the work developed by the 4WARD project within the Future Internet, some use-cases were created to show the main aspects of 4WARD's work, highlighting the technical innovations arising from the project, and also to study the related business potential. This way, four use-cases were developed: two more user oriented (Community-oriented Applications and Internet of Things) and two...
This study uses Protection Motivation Theory (PMT) as a theoretical framework to empirically test why people back up data on their personal computers. The theory was tested using 112 surveys collected using both paper and online data sources. The findings show that computer self-efficacy and response efficacy both positively affect the backing up of data, while perceived security vulnerability and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.