Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Enterprise networks have been a frequent target of data breaches and sabotage. In a widely used method, attackers establish a foothold in the target network by compromising a single computer or account. They then move laterally between computers to access valuable resources and information located deeper inside the network. To move laterally, attackers often steal valid user credentials. This paper...
This paper introduces cloud computing concepts and main features, and analyzes the security of cloud computing and the security strategies are proposed for security issues related to cloud computing.
At present, most enterprises have high demand on system security in order to protect confidential business information. According to the successful application of USB key and virtualization in secure field, combining virtual disk image (VDI) files encryption, this article proposes a general business protection system for enterprise (GEBPS). With GEBPS, enterprises can use different virtual machines...
Invoices are the voucher to reimburse for official expenses. However, fake paper invoices spread in our lives. The appearance of electronic invoices can solve the problem of fake invoices. Before the business purchases invoices from Inland Revenue, The Inland Revenue and the business identify the authenticities of each other and generate a temporary session key between them through Key Distribution...
In this paper, a online undividable electronic cash scheme based on Schnorr digital signature is proposed. In the scheme, we introduce an authentication method of the business behaviour by using a random number, which effectively guarantees the right of the two trade parts. With analyzing, we find our scheme has many secure characters, such as, anonymity, unforgeability, exemption from repetitious...
Security plays a large role in e-commerce application system, the physical layer structure, anti-SQL injection, RBAC, password policy are important aspects of E-commerce application system security policy which will be analyzed in this paper.
Authentication in the document context refers to the ability to trace the origins of a document to a given person or device used to produce it or to a given time or place it was produced. The general approach typically involves comparing physical, visual and/or linguistic properties of a questioned source to reproducible properties of a known or genuine source. The challenges lie in defining acceptable...
Millicent is a excellent micropayment protocol, its script is similar to the ticket of Kerberos protocol. So it can simplify Millicent protocol according to Kerberos protocol. It constructs a new authentication based on micropayment, absorbed Kerberos authentication idea. In the new authentication protocol, there are four symmetrical encryptions and two hashing functions, so authentication efficiency...
For many Internet-based service providers, client authentication is required before the delivery of services. Currently, most client authentication mechanism is only focusing on the identity authentication. In this paper, we claim that more business opportunities will be created if service providers obtain more information about clients. Then we propose the concept of the integrated authentication...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.