The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As EU directives require that all administration should perform their procurement processes electronically by 2010, an open-source application framework for building electronic public procurement (ePP) solutions was developed within the ELLECTRA-WeB project. As a part of this project the FYR of Macedonia adapted the ePP solution to support the public procurement lifecycle. This paper presents an assessment...
Network security requirements have recently gained widespread attention in the requirements engineering community. Despite this, it is not yet clear how to systematically validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity...
Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles in the...
Due to the large number of possible variants in typical software product lines (SPLs), the modeling of, explicit knowledge of, and predictability of the quality tradeoffs inherent in certain feature selections are critical to the future viability of SPLs. This paper presents IQ-SPLE, an integrated tool supported approach that considers both qualitative and quantitative quality attributes without imposing...
It introduced an option-theoretical approach to value illiquidity security discount, taking an empirical study about the close-end fund discount for example. The empirical results show that illiquidity can't be a main reason of CEF puzzle in china. However, the empirical research shows it is practical by using lookback option approach to evaluate illiquidity security discount. This approach can help...
Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact are also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arising from the presence of network...
Security requirements analysis is gaining growing attention as new vulnerabilities and threats are emerging on daily basis, the systematic evaluation of security requirements is of utmost importance among the various decisions to be made related to security. This short contribution proposes using a 3-dimensional vector for quantitative evaluation of security requirements, which takes into account...
Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting properties will often be weaker due to the possibility of new attacks. In this paper we introduce a mechanism that leads towards a generic process for pattern integration. As an example, we use the interesting case in which the proper...
The security of the web-service program is a very significant facet in the grid computing environment. A fuzzer is a program that attempts to discover security vulnerabilities by sending random input to an application. How to efficiently reduce the fuzzing data scale with the assurance of high fuzzing veracity and vulnerability coverage is a very important issue for its effective practice. In this...
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collectorpsilas retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption...
The paper analyzes plug-in technology ways to be used in vulnerability scanners at home and abroad. So far plug-in development in the vulnerability scanners has not arrived the unified standard. If the public standard is designed for plug-in in vulnerability scanners, it will add flexibility of write plug-in (not confined to special language). Plug-in is designed by system development staff. The terminal...
Trust management plays an important role in improving the cooperation of agents in multi-agent system. This paper proposes a trust evaluation method based on rough sets theory. The method divides attributes into necessary or unnecessary, calculates attribute weight, and then evaluates trust values by using a decision-making method of multi-attributes. Finally, an example shows that it is efficient...
After the worldpsilas largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made...
This paper proposes a technology for histopathological diagnostic support that utilizes the correlation-based features of histopathological tissues. In histopathological diagnosis, a clinical pathologist conducts a diagnosis of normal tissues and cancerous tissues. However, recently, the shortage of clinical pathologists is posing increasing burdens to meet the demands for such diagnoses, and this...
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, they are instead provided with are restricted view, from which all confidential information has been removed. The program that generates the view effectively embodies a confidentiality policy for the underlying source data. However,...
Nowadays, the E-Commerce plays a very important role in peoples' life; many people like to shop on Internet. At the same time, people left so much information in Internet, which include the privacy information. Malicious users in Internet can get users' privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema to prevent...
ldquoMulti-levelrdquo wavelength-time codes with asymptotic-optimal code cardinality and flexible code length are constructed and analyzed. The codes can be partitioned into multiple levels of codes with different cross-correlation functions, thus supporting the trade-off between code cardinality and performance for different system requirements (e.g., capacity and throughput).
Nowadays, the e-commerce plays a very important role in peoplespsila life; many people like to shop on internet. At the same time, people left so much information in Internet, which include the privacy information. Malicious users in internet can get userspsila privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema...
Network security situation is a hot research realm in the area of network security, which helps security analysts to solve the challenges they encounter. This paper presents the evaluation index, and the characteristic attributes to describe the state of network situation, discusses the grey model includes grey correlation model and grey forecast algorithm to get the evaluation index and predication...
The Berman-Hartmanis conjecture states that all NP-complete sets are P-isomorphic each other. On this conjecture, we first improve the previous result of Agrawal and show that all NP-complete sets are lesli,1-1P/poly-reducible to each other based on the assumption that there exist regular one way functions that cannot be inverted by randomized polynomial time algorithms. Secondly, we show that, besides...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.