The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
In a typical peer to peer system, each node is owned and operated by an independent entity, and the nodes collectively form a self-organizing, self-maintaining network with no central authority. The peer to peer technology has attracted a significant amount of interest because of its capacity for resource sharing and content distribution. The existence of high degree of free riding is a serious threat...
Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attacks, which cause invalid packets to be flooded through the P2P network, preventing valid packets from being delivered. This causes a disruption of the services provided by the P2P network. Since, anonymity and lack of centralized control/censorship are the salient features of P2P networks; it often encourages malicious...
Intruders will normally install some tools when he gains access to a computer system, in order to regain the root privilege when he come back onto the system at a later time. Installing a rookit on the compromised system is one of the methods that a intruder may use. The kernel of the operating system which is the lowest level of most modern OS will be modified by a kernel level rootkit. In this paper...
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incremental or...
A new model of network security assessment is proposed in this paper. A single IT entity is evaluated through EAL; The composite IT entities are evaluated by CAP. The model analyzes the security value of network elements, and adopts the Geometric mean method to determine the security value of the entire network. The effectiveness of this method is validated through the evaluation of a practical system.
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, referring to Common Criteria (CC), we established security evaluation hierarchy model. Then, the analytic hierarchy process (AHP) method was used to calculate the security factors' weights...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.