The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, we propose an approach to provide secure...
Web applications are a fundamental pillar of today's globalized world. Society depends and relies on them for business and daily life. However, web applications are under constant attack by hackers that exploit their vulnerabilities to access valuable assets and disrupt business. Many studies and reports on web application security problems analyze the victim's perspective by detailing the vulnerabilities...
Combined with the grid development, this article analyzed the current widespread adoption of authentication mechanisms and researched GSI program and KX.509 program in different grid environment. With the proxy idea of KX.509, using and implementing a Web-login module to build the grid authentication model in the Globus environment. The module provides the transparent user certificate generation,...
Transactional printing and fulfillment is an area of the graphic communications industry that requires highly advanced informational assurance and security, not only on a digital level, but also once the information is printed. Financial institutions and other service providers exchange confidential information about individuals and business accounts directly with the printer. If this information...
One of the most important issues in traditional and modern networks architecture is security. Data integrity and authenticity are the most critical points that a network security model should protect and ensure. Authentication, Authorization and Accounting model (AAA Protocol) is one of the most portable security concepts. Authentication acts providing proof of authenticity for stored data and verifying...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
The data security is one of the biggest problems which inhibit the further application of the ASP platform. This paper put forward an ASP-based security system strategy which includes infrastructure security, safeguard security boundary and computing environment protection. An ASP-oriented intrusion detection model was also proposed, and the intrusion detection subsystem function was analyzed in detail...
Web database is a combined production with database technology and Web technology, it stores and manages a great deal of data, if they are embezzled or juggled, which maybe bring enormous political and economic losses to the society. So it is imperative to properly establish security for Web database against illegitimate intrusion. The host identity protocol (HIP) is designed by the Internet Engineering...
Along with the rapid growth of Internet, the importance of safe network authentication becomes more evident than ever before. Cryptography mainly cares about secrecy in communication. Encrypting the transmitting data could prevent others from stealing important information, but this only solves the problem on the one hand, as for how to prevent them from destroying important data would be additional...
With the fast development of network technology, computer technology, digitized information technology and image processing technology, some online score systems based on the network are developed in recent years. However, they only can be used in the local area network. Thus, a new online score system is designed and implemented to able to be used in the Internet. The structures of this system are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.