The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To effectively implement fair use and rights transfer of digital content in DRM(digital rights management) system, a usage control protocol model MUCON(Multi-UCON) using encryption, digital watermarking technology and traitor tracing technology based on UCON(usage control) is proposed, whose characteristics are feature binding, flexible authorization, traitor tracking, and off-line control. Meanwhile,...
This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious...
Grid portal is a secure web environment where user can monitor and execute grid applications, access grid resources, services, and collaborate with other users. A grid portal allows an organization to have a single URL that enables users to gain browser-based access to applications and any customized information in a virtualized, unified and secure way. The main requirement for this grid portal is...
The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the...
With the growth of modern systems and infrastructures, automated and intelligent response systems become the holy grail of the security community. An interesting approach proposes to use dynamic access control policies to specify response policies for such systems. These policies should been forced when an ongoing attack, that threatens the monitored system, is detected. However, existing work do...
Development of theory and technology of wireless sensor network (WSN) has made it possible to satisfy the new demand for location-based services such as location based access control. However, most of existing techniques do not take into account the security of location estimate of some access node whose goal would be to try to confuse the localization system by amplifiers and high gain antennas....
Online social networks with millions of users are very popular nowadays. They provide a platform for the users to present themselves and to interact with each other. In this paper, we present a totally distributed platform for social online networks based on the p2p paradigm, called LifeSocial.KOM. It provides the same functionality as common online social networks, while distributing the operational...
Despite the security policies, standards, awareness strategies and tools currently in place, employees are still involving in risky behaviors that put business at risk. The growth and proliferation of Social Networks Services (SNS), among other threats, have made possible new leakage avenues for sensitive data, and malware spread. To address these security issues, network and security managers often...
As the modern society becomes increasingly dependent on software, how to develop Trustworthy Software(TS) systems is considered a critical issue by academia, government and industry. The domain of our work focused on the reliability research on UNIX system, which is the famous and widely used operation system in the world, and adopts C/S software architecture. However, when the user remote login the...
This paper conducts a comprehensive analysis of the security of LAN-based Educational Management Information System (EMIS), and proposes security policies and methods required by the system. Meanwhile, it adopts system permission allocation, user authentication, record tracking, protocol auditing, data backup, disaster recovery, warning system and other technologies to design a multi-layered database...
Wireless Sensor Networks (WSN) represent a new dimension in the field of networking. In this paper, an improved Genetic Algorithm is applied to the design of high performance multi-path routing protocol of WSN at the first time. The Algorithm consists of two stages: single-parent evolution and population evolution. The initial population is formed in the stage of single-parent evolution by using gene...
Advanced Metering Infrastructure (AMI) enables smart grids to involve power consumers in the business process of power generation, transmission, distribution and consumption. However, the participant of consumers challenges the current power systems with system integration and cooperation and security issues. In this paper, we introduce a service-oriented approach to AMI aiming at solving the intercommunication...
In this paper, we will have the combination of cloud computing and network security to research "cloud" firewall technology. Comparing the "cloud" firewall with the traditional firewall to further study the cloud computing, architecture and virtualization technologies in the "cloud" firewall. It will show the new concept of network security to the readers, which is about...
In Service Oriented Architecture (SOA) data belonging to a client (data provider) is often processed by a provider (data consumer). During this processing the data can be compromised. A client wants to be sure that its data is used in the least risky way while is under provider's control. The risk level should be low when access to the data is granted and should remain low during the whole interaction...
This paper designs and implements a network worm detection prototype system. The system includes four components: (1) the network status information collection subsystem, including two modules: monitoring module, to achieve real-time capture of network data packets from the network, and pre-process these data packets to form statistics information can be submitted; data storage module, to store the...
SCADA systems are widely used in critical infrastructure sectors, including electricity generation and distribution, oil and gas production and distribution, and water treatment and distribution. SCADA process control systems are typically isolated from the internet via firewalls. However, they may still be subject to illicit cyber penetrations and may be subject to cyber threats from disgruntled...
A new idea for studying the ability for computer to bear and process viruses after suffering from the intrusion of the viruses was discussed in this paper. This ability was named intrusion tolerance. Starting from the intrusions, capturing the behavioral characteristics and dynamically adopting different strategies enable the system to continue to provide security services. In the mean time, applying...
In this paper, we propose a self-protection model based on distributed intelligent agents. The major feather of this model is that autonomic agents can manage themselves given high-level objectives from administers. System can detect attacks and compromise, and recovering from security incidents without human intervention. We describe the model and the existing prototype, as well as some design and...
Security is one of the most important issues in grid computing. Therefore it is an inevitable function in most kinds of grid middleware to ensure the security of resource access. Efforts of this literature focus on file security in grid system. An architecture for file scan and monitoring is proposed on top of OGSA-based grid middleware as well as NFS, for the purpose of preventing the spread of virus...
Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, the healthcare system, and helping to quickly react on emergency situations. Meeting the strict security needs of these ubiquitous medical applications is a big challenge, since safety and privacy of medical data has to be guaranteed all the way from the sensor nodes to the back-end services,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.