The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a model of multi-cover based on static Markov chain. Researched on incomplete steganography system, analyzed the working principle and its implementation steps for shortage of single cover of capacity, embedded security and poor restorative, and given safety analysis of model.
An important difference among approaches to software requirements specification is the degree of formality of the specification process itself. In this paper we explore 12 approaches to security requirements specification. We divide the 12 approaches into two distinct groups, those that follow a formal specification process and those that follow an informal one. We evaluate and compare the benefits...
Although information systems increase productivity in organizations, they also make the Information Technology (IT) assets within these organizations vulnerable in the context of cyber security. Thus, the designers and users of IT in these organizations need to have adequate education in the cyber security threats and be ready to take the appropriate actions necessary for protecting their IT assets...
NetGAP is used to physically isolate the internal and external networks. Its session strides over both sides of the network. Based on the characteristics of agent, this paper designs several kinds of agent components with file accumulation, content inspection, file transmittance, protocol stream control and so on. Through these agent components it can easily establish a new connection, dealt with...
Information forensics is one of the fast growing and very demanding courses in the information security area. This emerging discipline has an increasing demand to provide hands-on labs for students to gain real-world experience. The purpose of this paper is twofold.
While hardware resources in the form of both transistors and full microprocessor cores are now abundant, economic factors prevent specialized hardware mechanisms required for secure processing from being integrated into commodity parts. We are exploring a novel way in which commodity hardware can be augmented after fabrication to enhance secure operation for only those systems that require it. Our...
We propose an approach to generate and execute tests of the conformance of a system to a given security policy. The method is rule-based: it generates test cases directly from a security policy expressed as a set of security requirements, using two relations: one between predicates appearing in the rules and elementary test cases, called tiles, used to test predicates in the system, and another one...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.