The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most researches in the field of covert channel concerned a specific channel, and few works resolved the general situations. This paper focuses on the system that can be modeled as a finite state machine, introduces an approachto modify the machine. Researcher can use the modified finite state machine to set up a noiseless covert channel in the system, calculate the covert channel's information leakage,...
This paper firstly analyzed the current complicated campus network security condition especially its' active protection; then introduced principle of UTM (United Threat Management), and applied Multi-Core UTM technology in BIGC campus network at last made a related analysis and research of this project.
With the development of remote sensing technology, the use of remote sensing images collected by space platforms is becoming more and more pervasive. There is more and more need to distribute processing of remote sensing images. At present, WebService can figure out non-security remote sensing images network processing, but due to network transmit without non-encryption at client side, which may lead...
This paper investigates the security of the projected C*- cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakness caused by the structure of the private key to find a number of linear equations. The attack can recover the private keys efficiently when the parameters are q ≤ 23, n≤10 and s=1.
The following topics are dealt with: multimedia computing; information networking; information security; communication security; network security; cultural heritage environment security; information privacy; social network; watermarking; multimedia search; multimedia mining; mobile Internet; wireless network security; network steganography; service-oriented architecture; services computing; and multimedia...
Many enterprises, organizations, governments and militaries are all facing a problem: how to protect their confidential documents, especially how to prevent them from being unauthorized copied or redistributed is a serious trouble as lacking of mechanism to forbid this action at present. In this paper we propose a Secure Confidential Document Model (SCDM). The document under the proposed model is...
It's convenient for people's communication by Internet's rapid growth. Tengxun QQ is IM with excellent function using by large amount of Internet users and because of its large cardinal number of users, it becomes a target which is attacked by many Internet illegal users. This paper firstly introduces us QQ virus and their classification, virus phenomenon and several solutions about attacking for...
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Intrusion detection is prominently important for civil and military applications in wireless sensor networks (WSNs). It is defined as the mechanism to detect moving intruder(s) by single-sensing or jointly-sensing detection. To date, related works focus on the problem of network configuration for detecting intruder(s) within a pre-specified time/distance threshold by assuming a straight line intrusion...
Data mining techniques are able to derive highly sensitive knowledge from unclassified data that is not even known to database holders. Usually, data mining contains the secured information such as financial and healthcare records. To handle such large private database with, data mining algorithms with privacy is required. The privacy preserving becomes important concern when we dealing security related...
The recent years have seen a flurry of research inspired by social and biological models to achieve the software autonomy. This has been prompted by the need to automate laborious administration tasks, recovery from unanticipated systems failure, and provide self-protection from security vulnerabilities, whilst guaranteeing predictable autonomic software behavior. However, runtime assured adaptation...
Association rule mining discovers interesting association or correlations among a large set of data items. Association rule mining make decision making process easier by providing the important information to the user. The most of the work done in this field is concerned with mining in an isolated form, but it is not only the case and many times more than one parties are involved in this process....
Secure multicasting is used in a wide range of multicast applications such as commercial pay-per-view video multicast and pay-per view digital library. The multicast protocol used must be secure with copyright protection to prevent the users from leaking the information. This paper focuses on the problem of leaker identification using a swarm intelligence (Ant Colony Optimization) based approach....
In this paper, we proposed an efficient dual watermark scheme for image tamper detection and recovery. In the proposed watermarking algorithm each block in the image contains watermark of other two blocks, i.e. two copies of watermark of the whole image is maintained and second chance for block recovery is provided in case one copy is destroyed. The algorithm proposed by Lee and Shinfeng is unable...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Since Java web applications are used widely in Internet today, the security of it becomes an outstanding problem. The attacks, including SQL injection attack, XSS attack, and etc, are great challenges for the Java application. This paper presents the vulnerability analysis framework to detect the security hole in the Java web applications. The framework combines the techniques of the static points-to...
Steganography is the art of hiding message in order to have a secure communication. In this paper, we present a novel technique for wave steganography for covert communication. The basic idea proposed in this paper is replacement of the bits according to the distortion afforded, with lossy or lossless hiding and recovery. Numbers of bits of the samples in cover file are replaced in accordance with...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
The continuous, effective and efficient performance of business processes is the central element for entrepreneurial success. In order to achieve the abovementioned goal various disciplines are involved: The improvement from an economical viewpoint is mainly performed by the domain of business process management, whereas the consideration of risks and continuous execution of business processes is...
The availability of real-time CAN-ECU data and the emerging vehicular networks are critical for advanced vehicle monitoring and control. This paper presents our integrated info-security scheme, real-time hardware/software solutions and their application scenarios. The core is the Integrated Info-Security Circuit Board to communicate with ECUs and sensors inside a vehicle through CAN Bus, LIN Bus,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.