The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trusted transaction is becoming more and more important as malicious user or agent inside the network may compromise the upcoming transaction. Trusted Computing mutual remote attestation mechanism is a relative new approach to overcome this problem. But limited computation capability of TPM device on the sever side is an obvious bottleneck of scalable performance. by introducing a novel high efficient...
GIS Crime Analysis System is used for Police, it can provide crime analysis, crime investigation and Crime Tracking, and so it's very important to ensure the safety of information and Authentication the user's identification. This paper presents architecture of GIS Crime Analysis System based on Trusted Network Connect (TNC), the system adopts the TNC Architecture, carry out identification and Integrity...
Today's approach to security is based on perimeter defense and relies heavily on firewalls, Intrusion detection systems (IDS) and Intrusion prevention systems. Despite years of research and investment in developing such reactive security methodologies, our critical systems remain vulnerable to cyber attacks. In our approach we assume that intrusions are inevitable and our effort is focused on minimizing...
Large and complex models can often benefit from parallel execution on multiple machines. In the Mobius modeling environment, this is especially true of models for which the user wants to examine several independent configurations or parameterizations. A remote job server with the capability to securely forward jobs to remote workstations or securely submit jobs via a standard batch submission system,...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
Trust management, with trust collecting mechanism as one of its foundations, has been the focus of more and more researches in grid security. This paper analyzes shortages of existing trust collecting mechanisms, and then proposes a novel trust collecting mechanism by introducing the idea of publish/subscribe scheme used in messaging system. The objective of this mechanism is to support dynamic trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.