The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, Thai e-Tailer discover a chance for operating their business in popularly type of virtual merchant via internet channel. Unfortunately, Thai e-Tailer faces to a problem concerning to the low level of trust for making an internet activity in view point of customer. Therefore, this document studied to e-Tailer: virtual merchant regarding to common threat and technological solution on e-Tailer...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical infrastructure functions, such as the electricity, gas, water, waste, railway and traffic. Recently, SCADA systems have been targeted by an increasing number of attacks from the Internet due to its grow- ing connectivity to Enterprise networks. Traditional techniques and models of identifying attacks,...
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural and context-sensitive data flow analysis, mainly concerning the taint propagation and sanitization. This paper also discusses some techniques used in TASA, such as sanitization routines...
Leslie Lampor proposed the theory of Temporal Logic of Actions(TLA),which can express model program and logical rules in one language at the same time. Secure Electronic Transaction(SET) is an secure protocol for e-commerce, Based on the open network and paying with credit card. The agreement defines the whole process of the internet transactions. And it has a complete authentication. Based on the...
Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats...
Trust is an important topic in information security research and is oriented to increase the reliability and performance of a web-based system in open networks. A trustworthy e-learning system is a trust-based learning system which contains reliable serving peers and useful learning resources. In this paper, a survey of trust researches in trust management and computing is presented at first and then...
In this paper, we demonstrate that anomalies in Internet traces can have a significant impact on semi-experiments that are designed to determine the causes of scaling behavior of traffic. A semi-experiment involves artificially modifying a specific aspect of a trace and studying the resulting change in scaling behavior. We demonstrate using MAWI traces that semi-experiments performed without addressing...
Trust evaluation model based on inherent vector and cloud model is advanced in open network. The concept of inherent vector of trust is put forward as the core of this model. Inherent trust degree is acquired on the basis of inherent trust vector. Forward and reverse algorithms of n dimensions trust cloud model is proposed to map between qualitative concepts and quantitative expressions. The numeral...
Perceived risk is the crucial factor that influences consumers' online shopping intention, it is of great importance for the development of online shopping to examine how perceived risk affects consumers' online shopping intention. The result shows: Under the C2C model, financial risk, performance risk, time risk, health risk and psychological risk have remarkable negative impact on purchase intention,...
Trust model is the basis of the entire network security system. It determines the form of trust used in the network and the risk caused by the form. Furthermore, it provides the framework for establishing and managing the trust relations. It can clearly be seen that the study of trust model in the network security is considerably significant. This paper mainly analyses the trust mechanism, the certification...
In services and cloud computing, processes need to be continually adapted to changing environments and requirements. Undisciplined process adaptation could easily lead to data flow anomalies, e.g., input missing for some activities in the process. In this paper, we study the problem of data-flow-correctness-preserving adaptation and propose three important criteria that can maintain the data flow...
We propose a formal model of web security based on an abstraction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We identify three distinct threat models that can be used to analyze web applications, ranging from a web attacker who controls malicious web sites and clients, to stronger attackers who can control the network and/or leverage...
This paper discusses trust issues and challenges have been encountered by e-government developers during the process of adoption of online public services. Despite of the apparent benefits as online services' immediacy and saving costs, the rate of adoption of e-government is globally below experts' expectations. A concern about e-government adoption is extended to trust issues which are inhibiting...
Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities. However, the construction of such a security system is a delicate process involving: (i) the acquisition of the monitored program behavior and its storage in a compact way, (ii) the generation of a monitor detecting deviances in the program behavior. These problems are emphasized...
E-commerce is the core content and inevitable trend of the information society. With the rapid growth of e-commerce in recent years, internet fraud and credit risk in e-commerce environment occurs more and more frequently, especially in China. The credit risk has become the critical factor restricting the development of e-commerce. It is of great importance to study the credit risk management of online...
Attacks against web applications and web-based services that use HTTP as a communication protocol pose a serious threat to today's information technology infrastructures. A common countermeasure is to apply misuse detection and prevention systems that compare the contents of HTTP traffic against signatures of known attacks, as it is for example done by web application firewalls. A serious drawback...
We have found a new man-in-the-middle attack on the BAN modified Andrew Secure RPC protocol with a model-checker based on SAT. Subsequently, we have reasoned about vulnerability of the protocol and propose a remedial method to improve the protocol. The method, simple and effective, can be helpful to analyze and design other security protocols.
Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, describes the characteristics of their behavior, focused on the spread of malicious software models, including the SI model, SIS model and the SIR...
Online trust is one of the key obstacles to vendors succeeding on the Internet medium; a lack of trust is likely to discourage online consumers from participating in e-commerce. Previous study most have investigated only a component of e-commerce (e.g., initial adoption or continuance), but neglected the role of good relations with the consumer in ensuring a successful sustained relationship. Therefore,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.