The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A cyber-physical system (CPS) is an integration process between the cyber-world and the physical world. Because the cyber-world affects the physical world with actuators, CPS security is crucial. Limited by characteristics of low computation power and small storage capacity of embedded devices, cloud computing is enabling technology to provide computation resources. As a result of complexity and diversity...
To improve the information security level of the wide area protection system, the functions of the system and IED are analyzed. The communication data types of the system and their communication requirement are offered. The main security threatens and key information security technologies are analyzed emphatically. The key information security technologies include digital signature technology, encryption...
To improve the ability of system providing service when encounter malicious invasion, a new model of tolerance invasion system is given based on dynamic threshold encryption. The real-time detection of the model is realized by the Collaboration between servers and hosts. The sensitive data in the system apply dynamic threshold encryption, and can change their share with the distribution. The model...
The following topics are dealt with: securware; authentication protocol; data privacy; information security; intrusion detection; data security; authorisation; role-based access control; malware; cryptography and network security.
The following topics are dealt with: availability, reliability and security; distributed systems and grid; SOA security; enterprise security; intrusion and fraud detection; digital forensics and security in communication; cryptography; software security; privacy and trust; dependable systems and trusted computing; authentication and authorization; security & privacy enhancement in data warehouses;...
In an e-enterprise, the tight coupling between business process and the underlying information technology infrastructure amplifies the effect of hardware and software security failures. This accentuates the need for comprehensive security management of the infrastructure. This paper outlined the challenges posed by fulfilling myriad security requirements throughout the various stages of enterprise...
Password authentication is a common approach to system security. The conventional verification table approach has significant drawbacks. Recently, neural networks have been used for password authentication to overcome the shortcomings of traditional approaches. In neural network approaches to password authentication, no verification table is needed; rather, encrypted neural network weights are stored...
Notice of Violation of IEEE Publication Principles"An Intrusion Detection Architecture for Ad hoc Network Based on Artificial Immune System"by Hongxia Xie and Zhengyun Huiin the Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), Taipei, Taiwan, Dec. 2006After careful and considered review of the content and authorship...
Location or mobility information of nodes, GPS information, load, link change rate, and routing information, etc., have been used for security purposes for wireless networks, such as intrusion detection in ad hoc networks. However, existing intrusion detection approaches usually focus on one of the aspects of nodes to detect statistical anomaly or malicious signatures. In this paper, a new model is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.