The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Finance brings great changes and conveniences to enterprise at network economy age, at the same time, but security issues have been the biggest constraint to their development, so how to build the control system of network financial security is an important issue which is urgently in-depth studied. In this paper, the control system of network financial security is constructed systematically...
Since the 21st century, artificial intelligence has deeply impacted the development process of every subject, such as Cybernetics, Information Theory, System Theory, Computer Science, physiology, etc., nearly involving any field and category in the human world in the theory and practice study. With the development of artificial intelligence, the internet has become a relatively new field. Today, with...
Government agencies and organizations are just beginning to harness the powerful capabilities of visualization to aid in the prevention, detection, and mitigation of security threats. Most advances in this area have focused on protecting an agency or organization from malicious outsiders. While not a new threat, the malicious insider has recently earned increased focus. This paper investigates methods...
Peer-to-Peer (P2P) delivery systems, such as eDonkey, Bittorrent, attracted many people who want to share files. Other P2P systems, used for broadcasting video contents, also gained in popularity (e.g., Live systems such as PPLive, PPStream, UUSee, etc.). In the past few years, new streaming applications, initially designed for User Generated Contents (UGC) have come up and are now widely used to...
Under mobile environment, the third part trusted may not be reached at any time. Moreover, there exist attacks on overall performance and availability of mobile networks caused by deceit of legal users and compromised platforms. In this paper, trust model composed of identity authentication, platform integrity attestation and user behavior evaluation is raised for network mobility (NEMO). Where, identity...
The security flaws of a direct anonymous attestation scheme proposed by He et al. was analyzed, and the result shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerading attacks when being used for remote attestation. An improved direct anonymous attestation authentication scheme with the involvement of key agreement was proposed to provide the property...
In the recent past, there have been frequent reports on privacy violations by service providers on the Web. The providers are overstrained with the legal implications of processing personal data. Data-protection authorities in turn are overburdened with the enforcement of the regulations. Users themselves typically cannot identify those violations, due to missing expertise in data-protection law....
The abuse of online-game bots has seriously hindered the development of online-game related business. However, in China there's no complete survey on game bots up to date yet. This paper we present an investigation of online game security issues, including bot behaviors and corresponding counter-measures. It shows that the increasing bots abusing damage the game business seriously and there are still...
The goal of library information resources construction under network environment is to achieve the sharing and building of information resources. The security mechanism construction of information resources sharing and building is the only way for library develops and utilizes the information resources under network environment. Through a series of ways such as establishing the legal security system...
In 2004, the White House and then Congress determined there should be an “Information Sharing Environment” that facilitates the flow of critical information for counter-terrorism, related law enforcement, and disaster management activities. That work has been progressing but a major challenge is how to create technologies that: ensure compliance with laws and policies of the federal government, 50...
In the modern era of economic globalization and informationalization, the system of electronic government affairs information is a competent tool to improve government administration and service quality. Sharing government affairs information is an important part of implementing electronic government affairs information. With the intensifying of economic government affairs information in our country,...
The Internet offers an enormous potential for all kinds of services, from Web search to online shopping, from social networks to multi-player online games,from online auctions to online encyclopedias. Many of these services thrive due to a vibrant community support. Making services open to community support offers great potentials but makes them also vulnerable to malicious behavior. Malicious behavior...
There's a profound changes on the concept of administration with the coming of information society. To meet the need of this change, a new method of administration about E-government emerged with the combination of administration and modern science technology. The specification and consummating of E-government is the need of protecting the security of information. This article will focus to discuss...
SIP (Session Initial Protocol) is attacked easily by DoS flooding thanks to it's open, the queue scheduling scheme can alleviate the SIP server's influence caused by DoS flooding attack at a certain extent. By analyzing SIP message character and existing queue scheduling scheme, we propose a INVITE DoS flooding attack defense mechanism based on CWFQ (Custom Weighted Fair Queue) and simulates it's...
In the last several years, E-commerce has developed rapidly in China as a convenient means of trade and business, which, however, faces challenges of security issues as well. This thesis covers the current situation of security problem of E-commerce in our country, a summary of the security threats confronted by E-commerce, and solutions from technical, legislative and personal consciousness aspects...
The safety of application is one of the most important research problems in the field of information security. The paper firstly analyses the nature of application attack, and points out the vulnerabilities of application. Then the paper proposes an anti-attack model of application in storing state based on mandatory access control idea, and the model has good security properties that it can protect...
This paper analyzes the technology composition of online-bank, types of technology risks and their causes, has raised management and supervision to the technology risks of online-bank. Based on the online-bank technology risks management and regulatory experience of United States and other developed countries (regions), and our country's research status quo of online-bank technology risks management...
China has established a legal system of government information disclosure. The current key point is to safeguard the execution of government information disclosure system from every aspect. This paper researches deeply into the government information disclosure system of China from the supervision to the information disclosure department, the relief for the information disclosure right and the external...
Enterprise should manage positively the new legal risk with the emergence of enterprise E-transaction. This paper discusses the procedures and tactics of legal risk management for enterprise as seller or service provider in the process of E-transaction. It recommends a method of reducing legal risk and of enhancing legal security in legal risk management for enterprise.
With the continuous growth and pervasion of the Internet in all aspects of daily lives, e-commerce has been largely integrated into our lives. However, there are many disadvantages of current e-commerce payment system, such as payment model, payment security system, etc. With achievements of e-commerce and payment system development acknowledged, this paper proposes the countermeasures of highlighting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.