The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present the Z3strBV solver for a many-sorted first-order quantifier-free theory Tw, bv of string equations, string length represented as bit-vectors, and bit-vector arithmetic aimed at formal verification, automated testing, and security analysis of C/C++ applications. Our key motivation for building such a solver is the observation that existing string solvers are not efficient at modeling the...
In today's cloud computing platforms, more and more users are now working or collaborating in multi-cloud environment, in which collaborators, clouds, computing nodes may belong to different institutions or organizations. Those different organizations might have their own policies. Security is still a big concern in cloud computing. To help cloud vendors and customers to detect and prevent from being...
The life-science and health care research environments offer an abundance of new opportunities for improvement of their efficiency and productivity using big data in collaborative research processes. A key component of this development is e-Science analytics, which is typically supported by Cloud computing nowadays. However, the state-of-the-art Cloud technology does not provide an appropriate support...
In this paper, we propose a high capacity text steganography method using Huffman compression. The forward email platform is used to hide the secret data. We make use of the number of characters used in email id to indicate the hidden secret data bits. So, to make optimal utilization of number of characters in email ids, the characters added to the email id to indicate the secret data bits are taken...
We are discussing a framework for formally modeling and analyzing the security of trusted boot processes. The presented framework is based on actor networks. It considers essential cyber-physical features of the system and how to check the authenticity of the software it is running.
Today incident detection mechanisms, that define CERT / CSIRT effectiveness, based mostly on two principles — signature and heuristic. Their disadvantage is that they are focused on mathematical models, which require a lot of time to prepare statistics and so it decreases CERT/CSIRT efficiency. In this work, we have proposed approaches to ensure CERT / CSIRT high efficiency and its evaluation. To...
This paper proposes two systems, Driving Security Determination and Assistance Overtaking System and Intelligent System, to analyze the performance of the right-most rule on multi-lane traffic flow. Driving Security Determination and Assistance Overtaking System (DSDAOS) is established to analyze the relationship between security, speed limit and traffic flow while Intelligent System (IS) is theoretically...
Due to accretion demand and size of the contents makes today's Internet architecture inefficient. This host centric model does not seem effective to cater current communication needs where users focus on desired content. As a result, translation between content information and networking domain should take place, typically consisting of an establishment of a delivery path between the content provider...
First, the paper gives the definition of the strongly row (column) full rank matrix, the quasi-upper triangular matrix and the quasi-lower triangular matrix of the m × n matrix. Then the triangular factorization is generalized to the m × n matrix, and some factorization theorems are obtained. By using the triangular factorization, the linear equations with strongly row (column) full rank coefficient...
Innovative approaches for securing the computing systems have intense inference for our understanding of technological, societal, economical, and political phenomena in making guiding principles, policies, rules and security implementations. The model presented here is based on cooperative and collaborative multilateral relationship among the shared business community partners. The sole responsibility...
This risk of catastrophe from an attack is a consequence of a network's structure formed by the connected individuals, businesses and computer systems. Understanding the likelihood of extreme events, or, more generally, the probability distribution of the number of compromised nodes is an essential requirement to provide risk-mitigation or cyber-insurance. However, previous network security research...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
Operations such as application and services are the basis of daily work on computers, safe and reliable application is an important goal of modern research on information security. In this passage, we build trust transfer model based on existing ideas of trusted computing. We guarantee application's static trust by ensure the integrity of application's dynamic library, we guarantee dynamic trust by...
Network bandwidth is considered a valuable resource in most computer systems. To precisely detect network anomalies (with a few false alarms), an intrusion detection system requires reliable methods. A potential solution in predicting network bandwidth usage is using a time-series model with a threshold. This paper proposes a network anomaly detection technique based on SARIMA, a time-series model,...
A network security situation awareness model based on cooperative artificial immune system is discussed in this paper. In this model, efficient memory detectors in different computers can share the differences and improve the coverage and scalability of AIS. These detectors spread in the whole system can be organized by a cooperative channel. The function of the cooperative module is sending and receiving...
Trust, the most fundamental concept in Trusted Computing, is a pervasive notion and, as such, has been studied thoroughly in a variety of different fields. Based on a survey of trust and security, two formal definitions for trust in Trusted Computing are presented in this paper: one for trust between coequal components (the direct trust) and the other for trust in specialization-employed environment...
The risk assessment of information security is an important evaluation method and decision-making mechanism in the process of constructing information security mechanisms. The risk assessment of information security has character of complex, nonlinear, uncertain and strong real-time, the traditional mathematical model for the risk assessment of information security not only lays some limitations,...
SELinux is a strong and flexible system with a well-defined MAC architecture. It provides a mechanism to enforce the access control based on confidentiality and integrity requirements which offers an effective protection of information security. This paper describes in what way SELinux uses various models and policies to secure the information safety which different from others, especially from a...
After the instruction of FCS and Time, a new proxy signature is proposed. The new scheme not only has the properties of proxy signature, but also greatly improves the security.
Grid is the next generation of Internet, and it has attracted the attentions of research communities recently. In practical applications, the nodes in the grid domain need to transact with other strange nodes to acquire the services provided by those nodes. Recently, trust has been recognized as an important factor for Grid security. And it is important for them to make a trust evaluation for those...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.