Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords. Two-factor authentication aids in the security, even though, as a side effect, might worsen user experience. We depict a mobile sign-on scheme that benefits from the dynamic relationship between a user's...
Cloud infrastructure becomes the primary business environment for all types of enterprises during recent years. In cloud computing security is a fundamental concern, loss of control and potential lack of trust prevent large set of potential customers to immerse in the cloud world. One of the major key problem is how one can test, monitor or measure the underlying Cloud infrastructure from user/customer...
The 7th edition of the SESS workshop aims at providing a venue for software engineers and security researchers to exchange ideas and techniques. In fact, software is at core of most of the business transactions and its smart integration in an industrial setting may be the competitive advantage even when the core competence is outside the ICT field. As a result, the revenues of a firm depend directly...
This paper summarizes the main challenges we encountered in integrating and analyzing large malware and threat datasets in the context of the European project WOMBAT. We will outline WOMBAT's motivation, structure and contributions to the field of threat intelligence.
College professors routinely are required to work in four entirely different environments - in the office or classroom, at home, on a mobile device, and on a public computer in a library or Internet cafe??. Each of these settings impose unique requirements for the management of information. This three-hour workshop provides the college professor with an overview of the challenges to proper management...
Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. Building on our close examination of the existing approaches for IT Information assurance, this paper proposes a risk-based security assurance metrics and aggregation techniques to be incorporated in a methodology for the...
Key sectors of our society are becoming increasingly dependent upon highly distributed network systems, whose survivability is an unsolved science problem. This paper surveys and discusses research results in recent years, including definition and development of survivability system, survivability analysis and architecture. At the end, this paper points out the key problems of survivability research...
Research on secure multi-party computation is of great interest in the field of information security. To determine convex hull algorithm for planar point set or polygons may be applied in a large number of research fields, and at present, there are a lot of methods to solve this problem. In this paper, a protocol is schemed out to determine a line by two secret points. The method is applied to determine...
Of late in the field of Information Security, we have plenty of security tools which are made to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less. In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. This model combines cryptography, steganography (taken as security layers)...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Governance has emerged as an important issue for organisations across the world. Governance is the combined activities of developing and managing cohesive and consistent policies, processes and decisions right for a given area of responsibility. For an e-learning ecosystem to work effectively, it is essential that we have the right regulatory, technological and social conditions. This paper discusses...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.