The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The vision of data-centric security promises to enable efficient security in future ubiquitous computing environments, which are heavily pervaded with embedded devices and generally to complex to manage manually. We survey the existing work of various areas needed for data-centric security, point out their relationships, and comment on their applicability in these future environments. Furthermore,...
Recently, Web services security has shown a significant gesture as several specifications have been developed and implemented to meet the security challenges of Web services. However, the performance of the security mechanisms is fraught with concerns due to additional security contents in SOAP messages, the higher number of message exchanges to establish trust as well as extra CPU time to process...
Research on secure multi-party computation is of great interest in the field of information security. To determine convex hull algorithm for planar point set or polygons may be applied in a large number of research fields, and at present, there are a lot of methods to solve this problem. In this paper, a protocol is schemed out to determine a line by two secret points. The method is applied to determine...
Agent technology is used in e-commerce security in the perspective of distributed artificial intelligence in the paper and is researched in combination with e-commerce security technology. A multi-agent e-commerce and security system with four-layer system structure, improved password tracking method and dynamic load function is put forward, designed and realized by using agent technologypsilas own...
This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing platform. Then, we introduce the notion of Hardware Integrity Measurement (HIM), which is similar to the software integrity measurement required by the...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices. Also an active attacker can induce errors during computation and exploit...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.