The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: Internet; crowdsourcing; software engineering; cyber security; successive iterative decoding; correlated Rayleigh fading envelope; pseudorandom phase generation; nonuniform signal constellation; network coding; mobile Web service; mobile Web services; fault tolerant architecture; context aware approach; arabic language processing; smart grid; video techniques;...
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
Data holders need to share the alerts data that they detected for correlation and analysis purpose. In such cases, privacy issues turn out to be a major concern. This paper proposes a model to correlate and analyze intrusion alerts with privacy-preserving capability. The raw intrusion alerts are protected by improved k-anonymity method, which preserves the alert regulation inside disturbed data records...
In December 2009, after years of planning, preparations and extensive infrastructure deployment, the world's first regional-scale underwater ocean observatory was open for business. NEPTUNE Canada opened its instrument network and data archive to free and open access by anyone willing to register for an account. Thus, we have embarked on a journey to transform our observatory into an online platform...
This study was on the computer network layer and application layer data packet interception, analysis, analysis of network data flow filter, protocol decoding, multi-node collaborative detection, anomaly feature extraction, pattern discovery algorithms, intrusion detection model, network-level intrusion detection The algorithm and protocol analysis test method and so on, trying to find fast and efficient...
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stable, false negatives of vulnerability are high and the selection of data sample depends on people's analysis. To solve these problems, this paper proposes...
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Trust management and trust negotiation are prevailing approaches for establishing trust relationship in grid-based systems across security domains and inter-domains. In this paper, we propose TTN, a combining trust management with trust negotiation mechanism which provides the authorization and access control for the Scientific Data Grid and aims to enhance the grid security. The framework takes into...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Fault-tolerant broadcasting and secure message distribution are important issues for numerous applications in networks. It is a common idea to design multiple spanning trees with a specific property in the underlying graph of a network to serve as a broadcasting scheme or a distribution protocol for receiving high levels of fault-tolerance and of security. A set of spanning trees in a graph is said...
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies...
In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer 1 out of k protocol, successfully construct confidential computing protocols of matrix general factorization and QR factorization. On the model of semi-honest, it can meet the confidentiality...
This paper presents mathematical and general models of electronic money systems. The goal of the paper is to propose a first framework in which various kinds of e-money systems can be uniformly represented and their security properties can be evaluated and compared. We introduce two kinds of e-money system models; a note-type e-money system model and a balance-type e-money system model. We show that...
Peer-to-peer overlay is vulnerable to distributed denial of service (DDoS) because of its characteristics such as openness, dynamics. Existing solutions are designed for a network-layer but overlay. A novel distributed method based on peer level model to inhibit DDoS attack is presented. Level model which can identify malicious nodes collects four factors which involve a twofold content including...
The central processing units of centralized structure are generally overloaded, and traditional intrusion detection system cannot effectively detect unknown attacks. To overcome the above problems, a distributed intrusion detection system model is established combining neural network with distributed detection in this paper based on the self-learning and adaptive characteristics of neural networks...
Combined with the grid development, this article analyzed the current widespread adoption of authentication mechanisms and researched GSI program and KX.509 program in different grid environment. With the proxy idea of KX.509, using and implementing a Web-login module to build the grid authentication model in the Globus environment. The module provides the transparent user certificate generation,...
We modified the multi-agent negotiation test-bed auction scheme which was proposed by Collins et al. In 2004, Jaiswal et al. have modified Collins's scheme, but Jaiswal's scheme still has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, collision between customers and a certain supplier. So the proposed protocol tries to reduce DOS attack and avoid replay data...
The stream control transmission protocol (SCTP) uses a cookie mechanism to tackle the security and traditional attack scenario. Unfortunately, SCTP is not secured against redirection attacks, bombing attacks and towards verification-tag guessing attacks which lead to association-hijacking and may force the victim client to starve out of service from the server. Therefore, we propose a secure SCTP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.