The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a simplified secured database access model, privileged group and public group can access data with any distribution. In order to secure the database, the confidentiality policy must be applied. Often, the management of the database privacy is neglected. This paper looks into the data confidentiality management and suggests to use semi-Markov chains to model the policy and the simulation results...
In recent years, web applications have become tremendously popular. However, vulnerabilities are pervasive resulting in exposure of organizations and firms to a wide array of risks. In spite of many tools and techniques, attacks on web application especially through SQL Injection Attacks are at a rise. Threat modeling is an important risk assessment and mitigation practice that provides the capability...
In this paper, aiming at the characteristics of intrusion detection methods' limitations and the low detection accuracy, we analyze the course of intrusion and classify the detection data sources, and then establish a common intrusion detection model based on data fusion of multi-data sources. Through analyze each part's function of the intrusion detection model, summarizes its characteristics, using...
Multilevel security requirements introduce a new dimension to traditional database schedulers as they cause covert channels. To prevent covert channels, scheduler for multilevel secure database should ensure that transactions at low security level are never delayed by high security level transactions in the event of a data conflict. This may subjected to an indefinite delay if it is forced to abort...
Although barcode was invented about sixty years ago, barcode technology became applicable for value-added services in telecommunication industry just few years back. Nevertheless, some issues regarding reliability, security and performance still exist, and therefore mobile ticket lifecycle has to be analysed carefully in order to be adopted and implemented into a given system. This paper presents...
In this paper, a data extraction model to support the traffic safety integrated information database is presented, which is conformed to the requirements of the public security traffic management departments. And the relative data that were stored in the diverse media and computer systems can be extracted efficiently, and transformation of different kinds of data constructions and dynamic updating...
This paper presents the knowledge acquisition model of traffic accident cause analysis method from the point of structured information. Moreover, this paper introduces the modified knowledge acquisition model based on relative rough set theory, which can obtain effective information based on the database otherwise data ware. By this model, we can efficiently obtain relative information real-time,...
In large-scale grid applications, relationship between VOs is not simple information aggregating for autonomy and visiting security. This paper presents a virtual grid information database (VGID) which implements a hierarchical and distributed information management mechanism. An information model is presented with extensible resource metadata management and hierarchical information organization that...
Reliability analyses of software systems often focus only on the number of faults reported against the software. Using a broader set of metrics, such as problem resolution times and field software usage levels, can provide a more comprehensive view of the product. Some of these metrics are more readily available for open source products. We analyzed a suite of FEDORA releases and obtained some interesting...
The statistical analysis of data stored in data warehouses is an important phase in the organisation's strategic planning process. For the maximum benefit to be gained from such data warehouses, a relationship of trust needs to exist between all parties involved. In this paper we investigate its importance with respect to the statistical security problem. Understanding trust relationships in this...
With recent flourishing of wireless communication infrastructures such as 3G, WiMax and RFID, ubiquitous multimedia computing becomes a major focus in scientific research. It would be helpful if we are able to trace the latest development in this particular science and technology field. However, it is a challenging task to swiftly and efficiently filter out information for elevating scholastic research...
Data provenance (information about the origin of data items and the transformations that they have gone through) can be a useful security tool, particularly for forensic investigation. Provenance information can also be used to enforce information assurance concepts like integrity and authenticity. The current techniques for finding data source and lineage information are annotations and query inversion...
Building information modelling (BIM) is only a tool in the procurement of a building, but it is changing the way the whole process is undertaken. Having a single model which is used by all disciplines requires a different management structure and by consequence a restructuring of the resources required to complete a project.These changes are encompassed in Integrated Practice and more recently Integrated...
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Ensuring public security is an important issue for every government, and effective public security depends on the efficiency of criminal justice processes and procedures. The procedures of the criminal justice may be viewed as the upper-, middle-, and down-stream sections of a supply chain. Like their business counterparts, most law enforcement agencies have to deal with logistics, information flow,...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Multi-core SoC created great opportunities to increase overall system performance while keeping the power in check but also created many design challenges that designers must now overcome. The challenge of doubling performance every two years used to drive superscalar design with more functional units running concurrently or deeper pipeline racing for highest frequency at the cost of higher power...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
In order to find out the common features and general patterns in criminal cases, a new improved frequent predicate algorithm was proposed, with which multi-dimension association rules were drawn according to the minimum support and minimum confidence. This new algorithm was applied in the data mining model of criminal cases of Dalian Municipal Public Security Bureau.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.