The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Infrastructure-as-a-Service (IaaS) clouds, intrusion detection systems (IDSes) increase their importance. To securely detect attacks against virtual machines (VMs), IDS offloading with VM introspection (VMI) has been proposed. In semi-trusted clouds, however, it is difficult to securely offload IDSes because there may exist insiders such as malicious system administrators. First, secure VM execution...
The increasing demand for air transport, as being forecasted for the next decade, and the difficulties associated with the expansion of existing infrastructures, have fostered the interest towards market-based mechanisms aimed at a more efficient use of available resources. Such mechanisms nevertheless require stakeholders to disclose private information, which can be used to recover key elements...
Modern trojans are equipped with a functionality, called WebInject, that can be used to silently modify a web page on the infected end host. Given its flexibility, WebInject-based malware is becoming a popular information-stealing mechanism. In addition, the structured and well-organized malware-as-a-service model makes revenue out of customization kits, which in turns leads to high volumes of binary...
Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel,...
The program data is encrypted at the time the data is introduced into the system. Program data stays encrypted until sent to MC to be decoded and display on TV. The encryption keys for the program data are never transferred out side of the data center. Instead, the “seed keys” are sent out. A secret algorithm is used to convert a seed key to a real key for decryption.
Backup technology based on data de-duplication has become a hot topic in nowadays. In order to get a better performance, traditional research is mainly focused on decreasing the disk access time. In this paper, we consider computing complexity problem in data de-duplication system, and try to improve system performance by reducing computing time. We put computing tasks on commodity coprocessor to...
With the development and application of Web service technology, the security of Web service is becoming more and more important. The security of SOAP message is an important factor which decides Web service security. In order to realize the security of SOAP message, an approach to partly sign and encrypt on SOAP message based on Rampart is proposed in this paper. The experimental results demonstrate...
Multi-level encryption method was used to encrypt the database system and encryption design method for different levels of data granularity was given, respectively taking database level, table level, recording level and field level as the objects.
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. It is useful to apply trusted computing into content protect, so content owners can protect their content against non authorized use and copying. At...
Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the performance of enterprise critical networked applications or network-based tasks or may overload the network infrastructure of Internet service providers, being desirable that this traffic be blocked in some situations. However,...
The Domain Name System (DNS) is used by virtually every Internet application, but has virtually no security. The DNS Security Extensions (DNSSEC) add essential authentication, but deploying DNSSEC in a large-scale environment is non-trivial. This paper examines the operational and technological considerations when DNS operators manage a largescale deployment, such as an ISP with tens of thousands...
A system for re-ordering the search results to provide to the user results of more relevance to him with the help of his profile. This concept is called Personalization. These profiles can be created by collecting explicit data (which may be input directly by a user in the form of recommendation, comment or vote) and implicit data (based on the users browsing patterns). Data can be monitored locally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.