The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, construction of electronic government is hot issues, security risk is one of the most important problems. This paper discusses the procedures of security risk management for the e-government construction. This paper point outs risk identification is the first step of risk management to charge the security risks of e-government effectively.Risk analyzing is to find the motivations and calculate...
From the auto-start behavior of rootkit, this paper presented a rootkit detection mechanism based on the hidden registry information, and designed a Windows rootkit detection method based on cross-view. This method by comparing from the kernel mode and user mode enumeration of the registry information found the registry hidden items by rootkit, and then detected the rootkit. Finally, a representative...
The 21st century is an age of information; e-government has become an inevitable trend for social information development. However, most e-government system currently just gives emphasis to construction but not security. Security evaluation to e-government system is a necessary means to master security of e-government system. The paper makes researches and analysis to many aspects of e-government...
Aiming at the shortages of the existing data-mining model for forecasting the industry security, a classification model based on rough sets and BP neural network (BPNN) is put forward in this paper. First, the theory of rough set is applied to pick up and reduce the index attributes. Then, the training samples are sent to the BPNN to train and learn. After that, the sorts of the coal industry security...
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security module. Through analyzing the overall survivability of storage systems, and importing survivable requirement into the design phase of storage systems, security and other attributes is easily...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
Information Flow Control (IFC) is mandatory to enforce the confidentiality and the integrity of data. It is a technique implemented in recent operating systems to track the information flow in the applications and therefore detect security leakage. In this paper, we apply this technique to a component-based Framework for securing embedded systems. We demonstrate the gain the component-based architecture...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
There's a profound changes on the concept of administration with the coming of information society. To meet the need of this change, a new method of administration about E-government emerged with the combination of administration and modern science technology. The specification and consummating of E-government is the need of protecting the security of information. This article will focus to discuss...
The trust of the critical systems is very important, for the corruption of these software can result in uncountable losses. This paper describes the policy of high-reliability critical system development, including its' attributes, means and impairments. The idea, employing with redundant diverse modules to reduce the risk of failure, works very well in other many fields. According to the idea, we...
In cooperative intrusion detection, several intrusion detection systems (IDS), network analyzers, vulnerability analyzers and other analyzers are deployed in order to get an overview of the system under consideration. In this case, the definition of a shared vocabulary describing the different information is prominent. Since these pieces of information are structured, we first propose to use description...
Intrusion detection systems (IDS) usually trigger a great number of alarm messages that frequently overwhelm their human operators. Hierarchically clustering technique is able to help IDS operators to get meaningful overviews from the great number of alarms. A dilemma is encountered when the clusters are generated. If the clusters are obtained one by one, they cannot be prevented from overlapping...
In this paper we describe some new ideas to improve recommendations to groups of people. Our approach maximizes the global satisfaction for the group taking into account people personality and the social relationships among people in the group. We present some results with two cases of study based on the movie recommendation domain with heterogeneous groups. The first case study uses synthetically...
This network security information in the confrontation as the research object, starting from the information model of confrontation to study the current dynamics of the network defense technology and defense systems. From the dynamic security deployment, attack the information decision-making, the three aspects of public knowledge acquisition to build a dynamic defense system model, through the confrontation...
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
Virtualization has been widely used in cloud computing systems to cut costs, and to provide dynamically scalable resources over the internet. Many ideas have been proposed to increase the security of the virtualized systems. But, a big unspoken assumption of these ideas is that the cloud users have to trust the cloud provider totally and unconditionally. In reality, however, this assumption can't...
In order to degrade the selfish behavior and encourage more members to participate in anonymous communication, a reputation-based incentive mechanism is used in the structured peer-to-peer overlay networks. According to the initiator's reputation, the request is transmitted or retransmitted by the members in the system. The performance of the reputation-based anonymous communication system is analyzed...
Data loss incidents, where data of sensitive nature are exposed to the public, have become too frequent and have caused damages of millions of dollars to companies and other organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by user negligence, misconfiguration of software, or inadequate understanding of an application's functionality...
Information Hiding is a good method to transmit important information secretly. Video sequences usually include many frames, so they have more room to hide information. In the paper, in order to increase the amount of hiding information, we choose MPEG sequences as hosts, and we present a practical method to hide information in MPEG compressed video. Generally, there are many B-frames in each GOP...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.