The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As cloud usage continues to increase, new issues with respect to managing and securing resources in the cloud are becoming more apparent. While some people may believe that security and privacy in the cloud can be addressed without the consumer considering the physical location and internal structure of the cloud, we show that this is clearly not the case. Furthermore, we describe a mechanism by which...
The transition from system-to information-based security has continued steadily over the last 30 years. Correspondingly, it is increasingly not the computer that is at risk, but the information in it. The human operator is ultimately the cornerstone of information security, an integral part of the information infrastructure. We are therefore forced to use techniques and methods that help us understand...
With the growing popularity of massive multiplayer online games (MMOG), the demand to protect these games and especially the participating players is increasing likewise. In this paper, we discuss a sequence-based solution to protect online games from being exploited by fully automated bots. Our research is based on various commercial and non-commercial bot implementations for the renowned game World...
In this paper, we analyze the trends of significant accidents in financial information systems from the user viewpoint. Based on the analyses, we show the priority issues for dependability improvement. First, as a prerequisite in this study, we define gaccidents, h gtypes of accidents, h gseverity of accidents, h and gfaults.h Second, we collected as many accident cases of financial information...
This paper presents the research on a practical and advanced image processing for intelligent human recognition and security system by using features of thermal images to enhance safety of vulnerable pedestrian. In this system, unique characteristics of thermal images were employed to detect the pedestrian along the roadway in varied conditions. Newly distribution of temperature regions, where correlation...
Fuzzing has proved successful in finding security vulnerabilities in large binary programs. Traditionally, reversing engineering technologies are used to locate codes that may lead to exceptions in Fuzzing, and this may demand a great amount of human efforts and consequently gives rise to low efficiency. In this paper, an automatic fault localization method for Fuzzing is proposed together with an...
CAPTCHA is a new kind of network security mechanism. Studying the recognition of CAPTCHA can help to discover its hidden defects and thus make it more secure. For closely-connected CAPTCHAs that can hardly be recognized by methods of state of art, this paper proposed a new recognition algorithm based on holistic verification. During the process of this algorithm, Recurrent Neural Network (RNN) was...
Container security and contraband interdiction in air cargo have become highly relevant topics at airports all over the world. The European Union (EU) requires detailed measures for standards in the field of aviation security that also cover training and certification of security personnel. In Switzerland, the same standards are being enacted by the Federal Office of Civil Aviation (FOCA). The training...
CAPTCHAs have been deployed ubiquitously by web sites to combat automated malicious programs. Security against web bots and usability to legitimate users are two main goals that have to be simultaneously satisfied when designing a useful CAPTCHA scheme. However, there exists a well-known and intricate trade-off between these goals. So far, balancing this trade-off remains an art rather than a science,...
Current events such as the Park51 Project in downtown Manhattan create "critical discourse moments," explosions of discourse around a topic that can be exploited for data gathering. Policymakers have a need to understand the dynamics of public discussion in real time. Human values, which are cognitively related to attitudes and serve as reference points in moral argument, are important indicators...
Supervisory Control and Data Acquisition(SCADA) systems are deeply ingrained in the fabric of critical infrastructure sectors. These computerized real-time process control systems, over geographically dispersed continuous distribution operations, are increasingly subject to serious damage and disruption by cyber means due to their standardization and connectivity to other networks. However, SCADA...
Threat trees are notable tools in the security analysis process called "threat modeling"'. The trees are used to identify how and under what condition threats can be realized, which will help proper estimation of risks and planning of countermeasures. However, it is difficult for an average analyst to construct adequate trees, because security expertise, particularly from an attacker's perspective,...
In order to improve the security of Steganography System, according to the principle of Minimizing Embedding Impact, make use of Syndrome-Trellis Codes which is near-optimal embedding and Human Visual System, this paper proposed a distortion function used for Minimizing Impact for Embedding in discrete wavelet transform domain. The approach analysed the influences of luminance, frequency and texture...
Business-process-management (BPM) systems are increasingly used in service-oriented architectures (SOA), coordinating activities of web services and of human actors. The openness and flexibility of SOA causes new challenges regarding security of business processes. This is because they have to deal with unexpected situations at run time. Respective solutions must be inherent to a BPM system (BPMS)...
This paper has adopted an OLG Model to study the regulatory mechanism of public education and social security on income distribution. According to the research, public education can effectively narrow the gap in educational investment among families, and thereby reduce income disparity. Social security can bring down income disparity by reducing the labor supply and increasing effective family instructional...
The security of railway and mass-transit systems is increasingly dependant on the effectiveness of integrated Security Management Systems (SMS), which are meant to detect threats and to provide operators with information required for alarm verification purposes. In order to lower the false alarm rate and improve the detection reliability of threat scenarios, event correlation capabilities need to...
Tragically, mass gatherings such as music festivals, sports events or pilgrimage quite often end in terrible crowd disasters with many victims. In the past, research focused on developing physical models that model human behavior in order to simulate pedestrian flows and to identify potentially hazardous locations. However, no automatic systems for detection of dangerous motion behavior in crowds...
In the perspective of the analysis of regional integration of talents, this paper expounds the significance of regional talents with market integration, explains the connotation and features, and tries to provide theoretical guidance in the process of constructing regional talent market integration framework and establishing a unified, open, competitive and orderly regional talent market based on...
In the fourth quarter of 2008, US subprime crisis swept through all over the world, whipping up an international financial storm. China was also involved in this around of crisis, with weak and fatigue market performance, lead to the depression of the macro-economy and the operation difficulties of domestic enterprises. It became a challenge facing the management layer to adjust human resource strategies...
Based on the background of incentive mechanism of AA Co., first analyzes the current situation of incentive mechanism, and then has an in-depth understanding of incentive mechanism of the company. Based on motivation theory analyzes the incentive situation in qualitative and quantitative way, and find the main problems existing in the incentive mechanism, and the reason of negative of staff. Work...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.