The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information security risk analysis method is now a hot issue of information security management field. Fault tree analysis method has proposed since the 1960s, obtain the widespread application in many large-scale complicated system's security fall-safe analyses. It's recognized as an effective method for the complex system reliability, security analysis. The basic principle, qualitative analysis...
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce...
In wireless environment, the channels are really affected by a number of factors such as: fading, interference, noise. In most of wireless communications, we have applied the training sequences as known signal at the receiver for estimating the channel as well as the transmitted signal. Nowadays, many paid services in the entertainment industry have required the high security for their data and this...
The article analyzes the advantages and disadvantages of Apriori, AprioriTid and AprioriHybrid simply. To solve the bottleneck of AprioriHybrid algorithm, a kind of Hash-based method to condense candidate itemset is presented, and providing the corresponding algorithm. Finally the experiment proves the efficiency of improved AprioriHybrid-H is better than AprioriHybrid Algorithm's, there is strong...
A new blind geometric robust watermarking scheme is presented based on singular value decomposition (SVD) and discrete wavelet transform (DWT). In the scheme, the host image is decomposed with n-level DWT and the low frequency sub-band is divided into nonoverlapping blocks. SVD is applied to every block. The watermark is embedded into the low frequency DWT coefficients by modifying the largest singular...
A model of database anomalous detection is designed in this paper. The model can not only describe the users' behavioral profile more accurately, but also improve the accuracy of database anomalous detection. Based on the designed model, Apriori-kl algorithm, which combines the K-means clustering algorithm with the improved Apriori algorithm, is presented to mine users' behavior profile preferably...
With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing - the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud computing, it is necessary to securely identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on. This paper designs a system of trusted connection...
The development of cloud storage services makes companies who outsourced their data to cloud storage server can't control their data by themselves as before. Then comes the security issues, especially the privacy preserving has become an more important security problem. The users always search their documents through keyword in plaintext, which may leak privacy of users in cloud storage environment...
As an important nature of subjective trust, uncertainty should be preserved and exhibited in trust definition, representation and inference. In view of the problems in existing mechanisms based on random mathematics and fuzzy set theory, this paper designs a trust inference mechanism based on cloud model theory. We define trust and trust level in form of cloud. Then we propose new measure for formalized...
Automated verification of noninterference is commonly considered more precise than type-based approach on enforcing secure information flow for program. We propose an approach on model checking symbolic pushdown system generated from Java bytecode, and develop a deployment-time verification framework to ensure noninterference of bytecode. In order to overcome the constraints brought by the nature...
Network security is becoming an increasingly important issue, since the rapid development of the Internet. Network Intrusion Detection System (IDS), as the main security defending technique, is widely used against such malicious attacks. Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns...
As a new generation of basal construction has been established on Internet, Grid has great potentials and advantages. This paper focus on establishing a security architecture for E-Business in the grid environment based on OGSA grid security system structure. It is shown that the security framework not only can satisfy all of the security demands of e-business in grid, but also may better protect...
To explore more efficient mechanism so that P2P network can perform more use of it in applications is important. But the algorithms and mechanisms for P2P should been evaluated before deplore in real system and many existing simulation platforms are have many defaults such high cost in constructing or can not be used in generally, so explore simple and efficient simulator for P2P network is an interesting...
In today's digital era, one major problem for a corporation is securing its Information Systems (IS). So, now more than ever, we realize how significant it is, to both know as well as measure, the security risks of a corporation. The aim of this study is to try and zoom in, into the corporate risks taken when deciding for IS security and provide a new model for measuring security. It will attempt...
Considering the actual situation and the use requirements of electric locomotive operation readiness in our country, we designed a security network control system based on PROFIBUS-DP. The systems implement the communications between a master class and third-party equipment, as well as the interactive operation from PLC and non-contact IC card to SCM System. We described the Multi-task scheduling...
In the trusted computing platform, trust is typically established solely based on software measurements. Few works consider the trust of platform hardware. However, hardware trust is pretty important to a trusted computing platform. In this paper, we propose the notion of measuring hardware trust and introduce the defintion of hardware integrity measurement, which is similar to the software integrity...
With the rapid development of e-commerce and the growth of Internet business market, security risks in e-commerce become the obstacle which hinders consumers' online purchasing. This paper outlines several kinds of consumers' perceived security risks in e-commerce, and online consumers' assessment information with regard to each security risk are obtained by using well-designed questionnaire. The...
More and more people setup their own blogs due to the popularization of web 2.0 and maturation of Internet techniques. People love to share their thoughts and moods even new products experiences through their blogs. This phenomenon pushes the business models and web technologies forward in a rapid speed. It is also becoming an important research topic of how to improve the search results by using...
As organizations become larger and larger, a worldwide enterprise may involve many regional branches, and also form partnerships with other organizations. Therefore it becomes necessary to implement authentication systems which are capable of working across multiple security domains or internet domains. We proposed an effective scheme which can implement virtual identity federation by establishing...
This Quantum evolutionary algorithm is a newly developed method of probability optimization based on principles of quantum computing. Regarding complex optimization problems, quantum evolutionary algorithm has a strong search capability and the most optimal performance. Network intrusion detection problem can be converted into the one of data optimal classification, thus this paper introduces the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.