The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the security and performance of authentication protocol in manufacturing grid, identity-based authentication protocol under standard model is constructed. Combining with the environment of manufacturing grid, this protocol can work under escrow and non-escrow models and different trust domains model. By introducing pseudo random function set, new authentication protocol realizes...
Consciously or unconsciously, we are using many kinds of “cards” in our daily lives. Among them, credit card, cash card, driving license, etc., are as important as our wallets. To protect the card holder from malicious use of his/her cards, it is necessary to authenticate the card user. For this purpose, a common practice is to ask the user to provide some key information (usually password) known...
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
Leslie Lampor proposed the theory of Temporal Logic of Actions(TLA),which can express model program and logical rules in one language at the same time. Secure Electronic Transaction(SET) is an secure protocol for e-commerce, Based on the open network and paying with credit card. The agreement defines the whole process of the internet transactions. And it has a complete authentication. Based on the...
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security module. Through analyzing the overall survivability of storage systems, and importing survivable requirement into the design phase of storage systems, security and other attributes is easily...
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
It is becoming increasing difficult to implement an effective DDoS Defense System, because (1) the raising sophistication of DDoS attack requires more complex analysis to detect, (2) internet traffic grows bigger and bigger which needs more powerful system to monitor. Taking advantages of the great improvement in multi-core technology, a multi-core based DDoS detection system (MIFDDS) is proposed...
Nowadays mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. We have developed an application that incorporates a novel technique which uses and enhances the Record Management Store (RMS), a subsystem of Mobile Information Device Profile (MIDP), which not only captures, upload and download multimedia data...
“Network Information System” has emerged as an important research field. Researchers in computer science have successfully developed some network technologies includes security solutions, information query protocols, and data management services. However, along with the development of wireless network technology, there is a need of solution for efficient information interaction re-scheduling in the...
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce...
As organizations become larger and larger, a worldwide enterprise may involve many regional branches, and also form partnerships with other organizations. Therefore it becomes necessary to implement authentication systems which are capable of working across multiple security domains or internet domains. We proposed an effective scheme which can implement virtual identity federation by establishing...
How to efficiently enhance fault-tolerance and data access availability are the major problems to solve in distributed storage system. Data fragment maintenance is an essential part of distributed storage systems. Byzantine quorum system is a typical system model in maintaining data availability. The paper presents a novel fragment verifying and repairing algorithm built in Byzantine quorum system...
Being able to fingerprint devices and services, i.e., remotely identify running code, is a powerful service for both security assessment and inventory management. This paper describes two novel fingerprinting techniques supported by isomorphic based distances which are adapted for measuring the similarity between two syntactic trees. The first method leverages the support vector machines paradigm...
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Peer to Peer networks can be seen as truly distributed computing applications in which peers communicate directly with one another to exchange information, distribute tasks, or execute transactions. The issues with peer to peer network are that the resource is not centralized. Moreover, peers may not know about the trustworthiness of other, so the trust framework should be designed in such a way that...
This paper presents mathematical and general models of electronic money systems. The goal of the paper is to propose a first framework in which various kinds of e-money systems can be uniformly represented and their security properties can be evaluated and compared. We introduce two kinds of e-money system models; a note-type e-money system model and a balance-type e-money system model. We show that...
The creation of efficient and secure framework is becoming important with the rapid development of internet and World Wide Web (WWW). The objective of this paper is to examine the web based framework to retain the information of any organization. Thus, we propose a new scaffold on the basis of JSP Access Model and Model-View-Controller (MVC), which will assist in providing information regarding users...
Consider the following problem in secure multiparty computation: Alice and Bob possess integers x and y respectively. Charlie is a researcher who would like to compute the value of some function f(x, y). The requirement is that Charlie should not gain any knowledge about x and y other than that which can be obtained from the function itself. Moreover, Alice and Bob do not trust each other and should...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.