The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to every system object in systems-on-chip (SoCs). Access decisions are administered by a security logic “server" implemented as an extension of the...
This Paper proposes Web application-oriented active threat awareness model and analyzes the threat features of Web application, which is used for threat intelligence analysis, association analysis and data-driven anomaly detection. So in this paper, we mainly study the threat feature design and selection problem in the web application, which will be used for threat awareness system to improve the...
In service oriented computing, authentication factors have their vulnerabilities when considered exclusively. Cross-platform and service composition architectures require a complex integration procedure and limit adoptability of newer authentication models. Authentication is generally based on a binary success or failure and relies on credentials proffered at the present moment without considering...
Cloud computing is currently one of the most hyped information technology fields and it has become one of the fastest growing segments of IT. Cloud computing allows us to scale our servers in magnitude and availability in order to provide services to a greater number of end users. Moreover, adopters of the cloud service model are charged based on a pay-per-use basis of the cloud's server and network...
Network security is one of the most important research fields among information security techniques. Most problems of network security are often caused by network attacks. In order to ensure network secure running it is very necessary to analyze and research the procedure of network attacks. In this paper, the formal method is researched and automaton theory is used to describe the procedure of network...
On open digital computing infrastructure, various large-scale and complicated malicious behaviors are increasingly threatening the security of digital computing infrastructure. In this paper, a Cooperative Work Model (CRM) is presented by extending the conceptions of the Universal Turing Machine to deal with the threats. Then the Cooperative Work System Framework (CWSF) is derived from the model....
Recently, an interest has arisen for network worms that propagate using domain name servers (DNS) in order to discover victim hosts.These worms generate random strings, as possible network domain names, and then query domain name servers in order to discover the corresponding IP addresses. In this paper we present models for the dynamics of the co-evolution of worm agents in the presence of anti-worm...
A new and feasible trusted remediation model was put forward, and the functions as well as the work flow of remediation model were explained in detail. Moreover, the communication and authentication process of remediation model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation...
This paper describes electronic integrity in the context of curbing double submissions during e-assessments. Submission of examination answers is an important part of assessment whether paper or electronic based. As will be discussed in this paper, double submission of an assessment test by one student is a breach in electronic integrity and it breeds electronic corruption. The proposed solutions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.