The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biomedical research increasingly depends on access to and analysis of distributed medical and biomedical data. In biomedical research, datasets are often collected at multiple locations, as it is difficult to recruit required patient populations at one location. The sensitive nature of these datasets leads to a need for secure sharing methods that can work with distributed databases and image archives...
In recent years network attack are easily launch since the tools to execute the attack are freely available on the Internet. Even the script kiddies can initiate a sophisticated attack with just a basic knowledge on network and software technology. To overcome this matter, Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious activity. With...
Botnets have become a serious threat to Internet and are often deployed to control a large pool of zombies and perform notorious activities such as DDoS, information theft and spam sending. In this paper, a new method is developed for detecting IRC botnets by analyzing the characteristic of packet size sequence of the TCP conversation between IRC zombies and their command and control (C&C) servers...
Widespread and commercial usage of Wireless Sensor Networks is kept back by the lack of strong and easy to use security. The wide range of applications of WSNs implies different and often contradictory security requirements. This paper argues the need for a configurable security architecture for WSNs and presents a methodology and software implementation to determine the most resource efficient suite...
Botnet is a hybrid of previous threats integrated with a command and control system and hundreds of millions of computers are infected. Although botnets are widespread development, the research and solutions for botnets are not mature. In this paper, we present an overview of research on botnets. We discuss in detail the botnet and related research including infection mechanism, botnet malicious behavior,...
The remote attestation mechanism serves to prove the trusted state of remote platform to a local user, and TPM is always the bottleneck of remote attestation efficiency. There are some improvement methods on remote attestation scalability at present. However, the existing methods have the problems such as lack of privacy protection, vendor discrimination, and marked increase of communication load...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Electronic voting schemes are expected to meet the basic security requirements for electronic voting. However, very different opinions about these requirements exist in the e-voting community. This is due to the fact that the security requirements comprise different levels at which they can be met. For example, universal verifiability may, or may not, include verifying eligibility of the voters who...
The following topics are dealt with: cloud computing; resource management; P2P networks; distributed storage; delay assurance; data security; wireless networks; QoS routing; TCP; and service management.
A transaction is assigned with a purpose which is a collection of roles. Suppose a transaction T1 with a purpose R1 writes an object o2 after reading an object o1 and then another transaction T2 with R2 reads o2 and writes an object o3. Unless T2 is granted a read right of o1, illegal information flow occur from o1 to o2. In the purpose-marking(PM) protocol, T1 marks o2 with the purpose R1. T2 cannot...
Data compression algorithms are used to reduce the redundancy and storage requirement for data. Data compression is also an efficient approach to reduce communication costs by using available bandwidth effectively. Over the last decade we have seen an unprecedented explosion in the amount of digital data transmitted via the Internet in the form of text, images, video, sound, computer programs, etc...
SOBSS is architecture of OBSS (object-based storage system) proposed from time, data trans-mission and security aspects by which performance of OBSS can be promoted effectively. In this paper, a security mechanism for OBSS called as NSM is proposed. The prominent feature of NSM is that a security model adopted in our architecture of SOBSS which is different from traditional security model. In NSM,...
Research on secure multi-party computation is of great interest in the field of information security. To determine convex hull algorithm for planar point set or polygons may be applied in a large number of research fields, and at present, there are a lot of methods to solve this problem. In this paper, a protocol is schemed out to determine a line by two secret points. The method is applied to determine...
A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? Considering...
The GridFTP by Allcock, W. (2003) protocol defines a general- purpose mechanism for secure, reliable, high-performance data movement. GridFTP has been widely used for efficiently transferring large volumes of data. It is based on the Internet FTP protocol and thus involves two communication channels: a control channel and a data channel. The commands and responses flow over the control channel, and...
This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing platform. Then, we introduce the notion of Hardware Integrity Measurement (HIM), which is similar to the software integrity measurement required by the...
Network intrusion detection systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually follow two different strategies. The first one aims at detecting forbidden usage of the network and the second one concentrates on finding illegitimate behaviour. The first methodology accomplishes its goal by defining all possible...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
A distributed denial of service attack is coordinated and synchronized set of comprehensive attacks on a sophisticated network and its services that hampers the network infrastructure thereby bringing down its performance. Its effects are characterized by the uninformed delays and interruptions accompanied by undue losses. Since no optimal methodology exists, the internet continues to remain susceptible...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.