The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-source heterogeneous spatial data has been the obstacle of the spatial information sharing. So, in the network environment, how to integrate multi-sources heterogeneous spatial data has become a hot and difficult problem of GIS. This article aimed to solve the problem by grid computing technology, and put forward a model of multi-sources heterogeneous spatial data integration based on it. Use...
Organizations face a growing threat of insider attacks. This paper presents a model for detecting insider malicious activities targeted at tampering the contents of files for various purposes. It employs two-dimensional traceability link rule mining to identify intrinsic file dependencies. Traceability links are traditionally used by software practitioners and researchers to uncover the relationships...
Cloud Computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers' Quality of Service (QoS) requirements. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for...
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust...
Architecture-centric system is the logical model about self-adaptive goal's achievement of software. Based on this concept, requirement service is the driven power, the strategy definition of self-learning and self-(decision-making) is viewed as inner evolution of architecture's business mechanism. Agent is the basic internetware granularity of architecture, it is to build an architecture-centric...
Security of computer architecture is basis of trusted system. For the sake of compromising to commerce,trusted computing platform's product is really not the best secure architecture. It is short of supporting trust spread because of chain trust relationship. So we put forward a specific trust model, and then advance a secure and reconfigurable architecture distinguishing from traditional architectures...
A threat situation analytical method based on the network graph theory model was presented. In this method, the attack cost of adjacent nodes and the calculating formula for its effectiveness value were defined, as well as the method to calculate the maximum threat path and node. It analysis the threat level of the target node and the threat path of a local area network. The results indicated that:...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
This paper analyzes data characteristics and storage requirements of E-Commerce System, compares the technological characteristics, key technology & implementation models of the current continuous data protection, and puts forward a renovated implementation model for continuous data protection, which can serve as reference in data protection.
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors of email users in the email worm propagation process. The game situation models the actions of the email users under the condition that at the time they open an attachment, the system...
Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger model theory is a hypothesis of artificial immune systems. This hypothesis explains what is malicious from the trend of behaviors in a computer system. This paper presented a novel idea that malicious...
Data integrity of software can't ensure the trustiness of software behavior, a model named software's dynamic trustiness model based on behavior integrity (SDTMBBI) is proposed in this paper, which regards the behavior integrity and data integrity of the software entity as the core of software dynamic trustiness authentication. This model can be used to keep the trustiness of software behavior and...
This paper describes the establishment and estimation of trust relation, and put forward a kind of trust service selection model in pervasive computing environment. Through direct and indirect trust relation evaluation, preference adjustment and trust update, a sound trust service evaluation system is set up which has been tested in smart UPS network system and shows a better performance.
From perspective of subjectivity of trust, a group Trust model which is used to depict constraint relationships among individuals in a particular group through covering four basic constraint patterns and their nesting; what's more, gauging methods of direct trust degree and recommendation trust degree of basic constraint patterns and their nesting are brought up based on subjective logic theory respectively,...
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers for other peers. A key problem in such a system is ensuring that the peers store and report all sale offers fairly, and do not for instance favor their own offers. We give a solution to this problem based on trusted computing,...
Most distributed systems that we use in our daily lives have layered architecture since such architectures allow separation of processing between multiple processes in different layers thereby reducing the complexity of the system. Unauthorized control over such systems can have potentially serious consequences ranging from huge monetary loss to even loss of human life. Hence considerable research...
Integrity is one of essential properties of information security. It is necessary to analyze integrity of system quantitatively in order to protect the system security. For the purpose, we present formal definitions of integrity based on probabilistic computation tree logic (PCTL) and quantitative evaluation model of integrity. In the model, we model interoperations of system and environment by probabilistic...
Virtualization is a new area for research in recent years, and virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the virtualization technology more scenarios. The cloud computing technology uses the virtualization technology as while. With the development of the technology, it meets...
In this paper, on the basis of the research on Honeypot technology, in view of the many problems in current traditional security resource applications, the Honeypot technology is used in network security defense, and a Honeypot-based distributed intrusion prevention model is presented. The experimental results show that the program can successfully remedy the deficiencies of existing monitoring system...
The interconnection of software engineering and security engineering has been bringing research challenges and opportunities to us. We propose a layered framework for the trust management model of trusted software, including three layers: the application behavior layer, the trust check engineer layer, and the trust policy layer. The multi-layer approach attempts to organize a complex security design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.