The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness...
Cloud Computing is in widespread use today because of its many benefits. One of the early concerns was security and it has been shown in multiple studies that cloud security is significantly enhanced by the use of cloud service. Organizations are able to enhance security because of the advanced features that a cloud service provider is able to provide. The availability of high-end resources for all...
Mobile Marketing is a powerful means to grow business. Tremendous increase in the count of mobile users has motivated the mobile marketing to high level in the last several years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted major attention of mobile users and the businessman now a days. Signal Processing is used to get latitude and longitude of...
Today, privacy and security concerns are being perceived as major roadblocks to creating vibrant marketplaces for context-aware personalized information services. Marketplace members would benefit if a trusted third-party could manage the complex privacy and security requirements associated with such services accessing end-user's personal and confidential information. This paper describes a clearinghouse...
Even as the rate of IPv6 deployment increases, there continues to be a number of key technical, operational and political challenges that have limited the overall adoption rate of IPv6. This paper is intended to explore the IPv6 technical features, advantages, research improvements, potential business benefits. This paper also investigates how some of the challenges have slowed the transition process...
With the rapid development of the world economy, e-commerce has become the essential part of economic activity among the world economy. The traditional cash payment has become a stumbling block to economic development, while the networks and their related technologies to the development of e-commerce provide a convenient, inexpensive, fast platform. Online payment is the key link in e-business development...
Current digital rights management (DRM) systems support only two-party systems, involving the package server and purchaser. However, for a scalable business model of transacting digital assets, a multi-party DRM system is often necessary which involves more than one distributors, who can promote and distribute the content in regions unknown to the package server. We propose a key management scheme...
Wireless Sensor Networks raise the interest of different business domains, including public security. The ability of WSNs to monitor and control physical environments such as football stadiums makes them very attractive. The integration of WSNs into Command and Control (C2) systems aims at avoiding catastrophes such as the Heysel Stadium disaster. In this paper, the architecture and implementation...
On the basis of analyzing the requirements to the security of collaborative commerce system based on service oriented architecture, a security solution which can solve the security problem is proposed. The solution includes some technologies such as XML encryption, authority access control, signatures and intrusion detection, etc.
This paper is intended to give an overview about the aspects of information security that are of importance in real life and should be taken into consideration during a regular IT project. Not only in the financial sector it is very popular these days to outsource certain parts of IT like application development and IT operation. From the perspective of a threat analysis team the authors experienced...
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n)-threshold agreement certificates of a secret are also shadows derived from the original secret using a different access structure. Based on these certificates, we present a (t, n)-threshold secret sharing scheme which can resist participantspsila cheating. That is, any participantpsilas cheating would not work...
Information security is the basis for the development of e-commerce, with the development of e-commerce, a variety of Internet transactions show the characteristic of diversification and the security issues become much more prominent. In order to solve this problem, there must be a security technology for protection. In this paper, we explain the existence security problems of the e-commerce, and...
The current business environment has become still more demanding in which organizations are under increasing pressure not only to increase revenue but also to respond quickly to changing market conditions. These organizations shall only be successful if they transform themselves and adapt on demand businesses paradigm. There is constant demand for innovation and shorter time to market for products...
Mobile agent technology promises to be a powerful mechanism to improve the flexibility and customizability of applications with its ability to dynamically deploy application components across the network. But none of the present mobile agent prototype systems satisfy all the requirements to provide a secure and reliable architecture, suitable for any mobile agent based distributed application. This...
An increasingly large number of digital documents, need to be preserved by organizations. Business documents such as various contracts may be of great business value, may only exit in digital form and may need to be preserved for longer periods of times that may span over decades or even centuries. The preservation process should take care of both the integrity and authenticity of digital documents,...
This paper proposes a model and technical solutions encouraging emergence of market-driven content protection uses. Content handover by proprietary CAS is based on the DVB-CPCM standard. The handover is partial since hooks for proprietary content management are instantiated. This allows adding security to the standard protection means.
With the rapid development of e-commerce, security issues are arising from people's attention. The security of the transaction is the core and key issues of the development of e-commerce. This paper about the security issues of e-commerce activities put forward solution strategy from two aspects that are technology and system, so as to improve the environment for the development of E-commerce and...
Immune digital watermarking algorithm is a new kind of weak reversible digital watermarking. Accordance with the characteristics of watermark protection, in some cases, it do not expect reversible digital watermark which containing watermarked information will be fully restored to the original undifferentiated state, but it allows some small differences. Under this premise, this paper presents a digital...
Software source code management uses it to improve the functioning of the information society. And there are management and security of software source code equivalent to assembly lines of important infrastructure in the early stage of information society directly. Thus, support technology and framework to protect copyrights of software source code are so poor state. In this paper, we propose management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.