Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
General network attack graph has a large state space. It affects the efficiency of network attack graph generation greatly. In order to solve this problem, a reverse search based network attack graph generation method is proposed. It starts from the target hosts that the goal of attackers, by analyzing the vulnerabilities and connectivity of them, finds all the middleman hosts, then repeats the search...
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
Even though trust plays a significant role during decision-making in open collaborative environments, still end-user trust mechanisms have not be deployed in the EGEE grid computing setting. In this paper, we conduct a preliminary investigation on the integration of the trust paradigm in that environment, with a special focus on achieving end-user trust in an intuitive and practical manner.
This paper presents an information system security evaluation model referring to Common criteria (CC). Analytic Hierarchy Process (AHP) and Grey Relational Analytic Process (GRAP) are applied to this model which combines the qualitative evaluation with the quantitative decision. AHP is used to obtain the indices' weights with respect to the final goal of the security evaluation. GRAP is adapted to...
Trust management is important for agent cooperation and security in multi-agent system. Based on rough sets theory, a new trust evaluation method is proposed. The method divides attributes into necessary or unnecessary, calculates attribute weight, and then evaluates trust values by using a decision-making method. Finally, an example shows that it is efficient to evaluate trust by using the method.
The methods estimating vulnerability of perimeter security systems are developed in the current study. Appropriate estimations are based on the fuzzy inference methods of intruder undetection risks on security zones set in territory's perimeter.
The vision of data-centric security promises to enable efficient security in future ubiquitous computing environments, which are heavily pervaded with embedded devices and generally to complex to manage manually. We survey the existing work of various areas needed for data-centric security, point out their relationships, and comment on their applicability in these future environments. Furthermore,...
The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not optimally supported despite the fact that recent studies indicate a high potential to save costs. Within this paper we identify the main obstacles and propose a multi-stage solution. Therein we classify the e-invoicing process...
With the widely use of wireless sensor network (WSN), data forwarding security has become more and more important to the whole network. In order to avoid the selective forwarding attack, we proposed a scheme of secure data transmission which can forward the data safely, and detect the selective forwarding attack. In this paper, we judge the trust value of each node to select a secure path for message...
As traditional network security cannot meet the security requirements, the international research shows that network security is on the way to Trustworthy Internet and that the trustworthy issue becomes a hot topic in the future Internet. Trust evaluation of userspsila behavior is an important part of Trustworthy Internet and a rational trust model plays a key role in the evaluation. This paper concludes...
In cyber-physical systems, which are the integrations of computational and physical processes, it is hard to realize certain security properties. Fundamentally, physically observable behavior leads to violations of confidentiality. We focus on analyzing certain noninterference based security properties to ensure that interactions between the cyber and physical processes preserve confidentiality. A...
This paper focuses on modular hierarchical design of configuration for an integrated security system. Hierarchical morphological design approach is used to search for Pareto-effective design solutions. An applied example involves the following: hierarchical (tree-like) model of the security system, design alternatives for system components/parts, criteria for the selection of the design alternatives,...
Data (or information) provenance has many important applications. However, prior work on data provenance management almost exclusively focused on the collection, representation, query, and storage of provenance data. In contrast, the security aspect of provenance management has not been understood nor adequately addressed. A natural question then is: What would a secure provenance management system...
A transaction is assigned with a purpose which is a collection of roles. Suppose a transaction T1 with a purpose R1 writes an object o2 after reading an object o1 and then another transaction T2 with R2 reads o2 and writes an object o3. Unless T2 is granted a read right of o1, illegal information flow occur from o1 to o2. In the purpose-marking(PM) protocol, T1 marks o2 with the purpose R1. T2 cannot...
Spammers have proven very powerfully adaptable, if we thwart all current spam methods, they will find new loophole to use them. Blogs, comments, forums, opinions, online communities, wikis and tags are nowadays targets for their campaigns. This paper presents analysis of current anti-spam methods in Web 2.0 for spam detection and prevention against our proposed evaluation framework. The framework...
Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. Building on our close examination of the existing approaches for IT Information assurance, this paper proposes a risk-based security assurance metrics and aggregation techniques to be incorporated in a methodology for the...
It is hard to judge whether one subject is to be trusted where federation identity management only focuses on identity trust achieved by credentials the subject hold. So we propose a behavior trust-based federation identity management mechanism. The trust value was modified according to the subjectpsilas behavior and it will be employed in identity management procedure including identity mapping and...
A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? Considering...
Network threat assessment is an important branch of information security assessment. Its research involves data fusion and data mining. This paper provided an overview of related research efforts in the area of network threat assessment. It presented a network threat assessment framework, and demonstrated a computational approach based on attribute recognition theory. In the computational example,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.