The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The secret intranets bring a lot of conveniences for teaching and scientific researching in many universities. However, there are some new challenges towards the information access controlling at the same time. The ferrying mechanism used in policy of the information access controlling. Aiming at the security issues about secret intranet information ferry, this paper focuses on the policy description,...
Sensor and earth observation data are becoming more and more available through service networks. In order to provide operational services, reliable and easy to use mechanisms for security, authentication and distributed access control are vital for service providers when offering their services. This paper describes a Service Access Control (SAC) framework which was developed as part of the SANY project,...
Given the proliferation of malware and malicious activities, the integrity of communication systems is an ever growing concern. In this work, we propose StaticTrust, an integrity measurement framework which enables a system to evaluate the integrity and state of a remote client prior to providing trusted communication services. StaticTrust is designed for a specific class of network devices that have...
Research teams collaborating across institutional, geographical and cultural boundaries are increasingly common. Funding agencies including the National Science Foundation (NSF) and National Institutes of Health (NIH) strongly encourage virtual organization building and collaboration across institutions and disciplines. A set of software tools that enables scientists to efficiently share information...
This paper proposes a security paradigm named self-existent mechanism of access control. The most distinct character is that it runs absolutely independent from program executing environment, even without cooperation of OS. That is to say, it has a unique structure to assure that computing is controlled under a secure mechanism that cannot be penetrated by software like virus, Trojan and other malicious...
Service composition is an effective way to achieve value-added service, which has found wide application in various areas. security design at architecture level is critical to achieve high assurance for these applications. However, most security design techniques for service composition were in ad hoc fashion and fell short in precise notations. This paper proposes a formal aspect-oriented approach...
A higher level, for the Nios II soft processor realizes the IFF encryption authentication technology is discussed in this paper. Through configuration Secure Hash Algorithm (SHA-1) on the Nios II soft processor within Altera FPGA, and communication with the secure EEPROM, an Identification Friend or Foe is completed. This method can provide secure IP protection and license management solution for...
Mobile ad hoc Networks refers to the infrastructure less, resource poor wireless networks whose interaction is unplanned in such a way that location of participating nodes and parties can not be identifiable. The mobile devices are used by people to access services in various environments. Before two or more mobile networks ready to interact, they must trust that each will satisfy the security and...
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness...
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public security issues. The most common attacking methods take advantage of the weakness of operating systems, the bugs found in certain applications such as Internet Explorer or Adobe Reader, or...
Software as a Service (SaaS) has been adopted in a fast pace for applications and services on software clouds. However, the success of SaaS in software cloud cannot obscure the integration challenges faced by developers and enterprise infrastructure IT. Among those challenges, firewall/NAT traversal and security issues often pose a serious bottleneck as enterprises may not be entirely comfortable...
As the modern society becomes increasingly dependent on software, how to develop Trustworthy Software(TS) systems is considered a critical issue by academia, government and industry. The domain of our work focused on the reliability research on UNIX system, which is the famous and widely used operation system in the world, and adopts C/S software architecture. However, when the user remote login the...
Web software development is one of the most active areas and fastest growing industries in software and services development in Europe. In particular, Java Enterprise Edition is the mainstream European technology option for one million European developers. Since web development is not still a mature area, the proliferation of frameworks and components has both increased the required skills of web...
This paper deals with software framework that is mainly for large organization where there is no proper security for IT inventory. How can we have a stabilized application which would help IT Admins and Managements to have a clear picture of what are the IT related usages and transactions that are carried out in an Organization? Then would help them frame a proper IT budget every year. To maintain...
Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring...
Usage control is a comprehensive access control model developed to cater the security needs of the wide range of application domains. Safety property of the usage control model ensures only the design level safety whereas the correctness of usage control in software application depends on the correctness of implementation as well. Most of the research in access control left the correctness of implementation...
The contemporary Web is heading towards its next stage of evolution. From a clump of unorganized information spaces, the Web is becoming more focused on the meaning of information that is a Semantic Web. Trust is an integral component in semantic web, allowing people to act under uncertainty and with the risk of negative consequences. In this paper we discussed trust management and its connection...
Strict Integrity Policy (SIP) of Biba model can maintain the integrity of data in computer systems, but it might deny some non-malicious access requests of subjects and hence decreases the compatibility of applications. An improved SIP with dynamic characteristics is presented, which can increase the compatibility of the software while keeping the integrity as well as SIP can. And the proof is also...
In an overview paper called State of the Art: Embedding Security in Vehicles, Wolf et al. give a general state-of- the-art overview of IT security in vehicles and describe core security technologies and relevant security mechanisms. In this paper we show that a formal analysis of many of the related properties is possible. This indicates that many expected aspects in the design of vehicular security...
Dynamic binary translation (DBT) is a well known software technology that enables seamless cross-ISA execution. Unfortunately, many malicious programs that may lead to unauthorized access can run easily and unrestrictedly under the DBT system. Because these malicious programs must go through the system call interface to take malicious action, system call interposition has become a widely used technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.