Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents a new hybrid intelligent algorithm for assessing and enhancing voltage security. The problem is decomposed into two stages. Firstly, the security of current operating point is assessed by learning vector quantization (LVQ) network according to the pre-specified criterion. Throughout the paper, continuation power flow (CPF) is adopted as a tool for defining voltage security margin...
We discuss how the notion of gradual information disclosure can be incorporated into basic social computing protocols, such as reputation based service selection. Our technique links the decrease in anonymity a subject is ready to endure (e.g., by disclosing the values of some of her attributes) to the weight her views will carry in the final outcome of the protocol.
Interval multicast was defined as to send a message to a subset of a group, rather than all of the members in the group, which is important in battle fields and other applications. A key-tree based approach was proposed to achieve interval-multicast security, i.e., to securely multicast the message to the subgroup. The cost of the proposed approach is defined as the number of different keys needed...
In this paper we compare three static code analysis tools. The tools represent three different approaches in the field of static analysis: fortify SCA is a non-annotation based heuristic analyzer, Splint represents an annotation based heuristic analyzer, and Frama-C an annotation based correct analyzer. The tools are compared by analysing their performance when checking a demonstration code with intentionally...
Monitoring the preservation of security and dependability (S&D) properties during the operation of systems at runtime is an important verification measure that can increase system resilience. However it does not always provide sufficient scope for taking control actions against violations as it only detects problems after they occur. In this paper, we describe a proactive monitoring approach that...
Threat analysis gives how potential adversaries exploit system weakness to achieve their goals. It identifies threats and defines a risk mitigation policy for a specific architecture, functionality and configuration. In a threat analysis security metrics are a challenging requirement in order to determine the status of network security performance and to further enhance it by minimizing exposure to...
The InternationalWorkshop on Security in Systems and Networks is a forum for the presentation and discussion of approaches, research findings, and experiences in the area of privacy, integrity, and availability of resources in distributed systems. This workshop aims to bring together the technologies and researchers who share interest in the area of network and distributed system security. The main...
In the word, lots of consumers choose to buy their commodity on the Internet, so e-commerce is playing an increasingly important role and its safety caused more and more concern. The success or failure of transactions, the confidentiality of client information, and e-commerce system stability are directly related to the safety of e-commerce. In this paper, we use the method for e-commerce security...
In this paper we analyze a class of n-person supermodular games that arise in the context of interdependent security analysis. More specifically, we quantify the number and the distribution of Nash equilibria in pure strategies and their impact on the tipping set.
Individuals in computer networks not only have to invest to secure their private resources from potential attackers, but have to be aware of the existing interdependencies that exist with other network participants. Indeed, a user's security is frequently negatively impacted by protection failures of even just one other individual, the weakest link. In this paper, we are interested in the impact of...
This paper focuses on the factors that influence the consumers' willingness to buy from an e-commerce vendor. We develop 4 structural equation models (SEM) integrated these factors to test our hypotheses. The result shows that perceived reputation, perceived risk and ease of use are positively associated with the level of consumers' willingness to buy, however, perceived size, perceived system assurance,...
Physical layer security is an emerging security concept that achieves perfect secrecy data transmission between the intended network nodes, while the eavesdropping malicious nodes obtain zero information. The so-called secrecy capacity can be improved using friendly jammers that introduce extra interference to the eavesdropping malicious nodes while the interference to the intended destination is...
When there is a need to compare the characteristics of several similar global communications systems, security is often an important factor to consider in the comparison. However, in most situations it is difficult to deduce whether a system is more secure than other; and it is even more difficult to deduce how much more secure a system is compared to another. This paper presents a method based on...
Worldwide it is more and more common that the systems of the national governance, army, education etc. are retooled to open source systems - mainly because of the economical operation. The purpose of the article is to analyze and compare - in the aspects of security and performance - the abilities of the Web server ensured by the newest version of the most commonly spread closed source operation system...
The concept of the multi-signature was first proposed by Itakura and Nakamura, in which multiple signers can cooperate to sign the same message and any verifier can verify the validity of the multi-signature. After that, a lot of multi-signature schemes were proposed, but almost all of the multi-signature schemes are either sequence multi-signature or broadcasting multi-signature, but a lot of examples...
The AHP-Fuzzy assessment method is a combination which unifies the AHP method and the fuzzy mathematics. AHP can synthesize human's subjective qualitative judgment, form the weighting of each policy- making factor, and avoid appearing the logic reasoning fault in the complex decision-making question. The fuzzy mathematics, simulating the characteristic of human in making the judgment, is good at processing...
Attacks are evolving towards exploiting network services' or applications' vulnerabilities, which results in more and more focus on security of distributed mission-critical system whose aim is to satisfy users' service requirements. According to the resource dependencies in networked system, a hierarchical security situational evaluation metric model (SHL model) for distributed mission-critical system...
Authenticated key agreement protocols are a foundation for delivering an authenticated session key between the intended two-party participants from a set of parties over an insecure network. Wang et al proposed protocol ECKE-1N to overcome KCI-R attacks in ECKE-1 as an implicit authenticated key agreement protocol based on Diffie-Hellman elliptic curve. In this paper, we show that ECKE-1N is vulnerable...
Web applications support more and more our daily activities, it's important to improve their reliability and security. The content which users input to Web applications' server-side is named un-trusted content. Un-trusted content has a significant impact on the reliability and security of Web applications, so detecting the un-trusted variables in server-side program is important for improving the...
In this paper, we present security primitives required to achieve privacy in content-based opportunistic networks. We define three privacy models adapted to content-based networking and detail what are the requirements that the security primitives have to achieve in order to fit in each of these models. We also propose an original approach based on multiple layer commutative encryption that features...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.