The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the management efficiency and convenience of the access control system in intelligent building, according to the new demand, a network entrance guard management software has been in this paper developed based on original software for single computer system. Inquiring real-time network data, browsing real-time information and long-distance monitoring can be realized by use of the...
Sealed storage and access control are the characteristics of USB KEY integrated with smart card, a kind of USB KEY-based approach for virtual assets protection is presented. Virtual assets of users are stored in the hidden partition of USB KEY which is not able to read out, it would be displayed on the screen of USB KEY after user's PIN verified. If a PIN is blocked, it must be reloaded, it is designed...
To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing...
The purpose of TPM authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The TPM treats knowledge of the AuthData as complete proof of ownership of the entity. The main specification defines an authorized user must provide the parent key AuthData before loading its child key and provide the child key AuthData before using it. All...
The paper begins with introduction on the xen-based secure computer, the common data sharing methods and virtual disk access control. It puts forward a data sharing method based on virtual disk between guest OSs of Full-Virtualization in order to deal with the shortages of data sharing between virtual guest OSs based on Xen secure computer. It induces further analysis on the Xen driver split mechanism...
Role-Based Access Control (RBAC) is a mainstream access control method of software systems. After RBAC policies are formulated, there may be permission inconsistency between RBAC policies and practical execution paths. First, we defined the concept of RBAC permission consistency, and the concepts of execution path, Role Requirement array and Role Holding vector etc. On this basis, we proposed RBAC...
H-HIPS (Hardware- and Host-Based Intrusion Prevention System) is an IPS that can be used on UMPC (Ultra-Mobile PC) or PDA (Personal Digital Assistant). Because it has been achieved by using a FPGA (Field Programmable Gate Array), the use of the hardware resource for intrusion detections is limited. Additionally, the operation of low power consumption is very important. In this paper, a firewall unit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.