The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is a model that offers on-demand computational resources to clients as services. In this concept, users are charged based on a pay-per-use business model. Therefore, it dramatically reduces operating costs associated with the maintenance of the local data center. Recently, database is provided as a service to fulfill clients' demand. Following this, companies can rely on a remote database...
The Authorized Economic Operator (AEO) system is designed to establish a partnership involving all related business parties of an international supply chain to achieve a supply chain system which satisfies a framework of standards for the security and convenience of global trades. The Taiwanese government started the programs about the AEO in May 2008. With the Taiwan's international freight forwarders...
Various security-oriented static analysis tools are designed to detect potential input validation vulnerabilities early in the development process. To verify and resolve these vulnerabilities, developers must retrace problematic data flows through the source code. My thesis proposes that existing tools do not adequately support the navigation of these traces. In this work I will explore the strategies...
Advanced Metering Infrastructure (AMI) includes hardware and software, which combine interval data measurement with continuously available remote communication. Consequently, AMI enables measurement of detailed, time-based information and frequent collection and transmittal of such information to various parties (utilities, users, regulators others). It is a robust architecture for automated, two-way...
The development and delivery of secure software is a challenging task, that gets even harder when the developer tries to adhere to both application and organization-specific security requirements translated into security guidelines. These guidelines serve as best practices or recommendations that help reduce application exposure to vulnerabilities, and provide hints about the application's adherence...
This scheme is a method for controlling functionality of a mobile device. The operation of the element function of the mobile device is blocked by a blocking code, and the operation of the blocked element function is unblocked by an unblocking code. The blocking code is a code used to block the operation of the element function of the mobile device in an area in which a user is located, and the unblocking...
● An in-package interconnect for in-package memory application in InFO package has been demonstrated ■ Technology: TSMC 16FF + InFO ● 89.6GByte/s total bandwidth is achieved with 256-DQ operating in 2.8Gbit/s and 0.3V-swing ■ Low power: IO (0.062pJ/bit); PHY (0.424pJ/bit) ■ Low latency: Write (4.75T+1.5T=6.25T); Read (2+1.875=3.875T) ● 0.3V signal integrity on the un-probed IO has been clarified ■...
Information technology investment in a company driven by the importance of the information needed by a company. The company seeks to increase the value of IT investments that has been spent on the field. The board of directors of the company has also understood the importance of an effective and efficient IT environment. In the present study, we will plan IT governance framework that will be aligned...
Information is one of the organization's assets. It also determines the values of the company whether the company is a professional and trustworthy in keeping information both internal corporate information as well as information from the user side. But in carrying out its functions, the company would meet a variety of information security threats. Confidentiality, integrity, authenticity, and non-repudiation...
In today's knowledge society data plays a central role. Large parts of an organization's critical data currently resides in databases which makes them an attractive target for cyber-attacker. The increasing digitization and interconnection of organizations combined with growing complexity of IT systems led to increased attack surface of most organizations. At the same time cyber-adversaries increased...
Today's Cloud based render farm usually requires end users to transfer modeling data into the Cloud for rendering and makes the end users to trust the providers of the cloud infrastructure with many security policies. However, the end users have no basis to determine if these Cloud services are trustworthy, except the assurances of the service provider. This brings up a serious security concern on...
Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel...
Recommender systems assist users in the daunting task of sifting through large amounts of data in order to select relevant information or items. Unfortunately, such systems may be subject to attack by malicious users who want to manipulate the system's recommendations to suit their needs: to promote their own (or demote a competitor's) product/service, or to cause disruption in the recommender system...
In this paper, we can find the defects of the security mechanism through the analysis of the security mechanism of iOS system. And in accordance with known vulnerabilities, we achieve to exploit the loopholes, and then complete the breaking out of sandbox, Obtaining arbitrary code executio, root privilege, patching kernel. Finally we achieve to jailbreak the iOS system.
Stray voltages have always been a concern to utility companies and customers. But methods to troubleshoot and monitor nonroutine stray voltage problems are very limited. This paper presents a passive, measurement-based method to identify the contributors to the common cause of stray voltages, the neutral-to-earth voltage (NEV) rise at the service entrance point. The paper shows that the NEV can be...
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
While many cyber security organizations urge the corporate world to use defence-in-depth to create vigilant network perimeters, the human factor is often overlooked. Security evaluation frameworks focus mostly on critical assets of an organization and technical aspects of prevailing risks. There is consequently no specific framework to identify, categorize, analyse and mitigate social engineering...
Critical Infrastructures (CIs) are among the main targets of activists, cyber terrorists and state sponsored attacks. To protect itself, a CI needs to build and keep updated a domestic knowledge base of cyber threats. It cannot indeed completely rely on external service providers because information on incidents can be so sensible to impact national security. In this paper, we propose an architecture...
Companies and individuals are becoming more dependant on technology, automated processes, the Internet of Things (IoT) and daily use of internet, mobile devices, and other tools that the technological revolution has created. But against the back-drop of rapid technological progress, cyber-threats have become a serious challenge that require immediate, continuous action. As cyber-crime poses an ever-present...
Promote the merger and reorganization of coal enterprises and improving coal industry concentration is currently the main development trend of coal enterprises in China. However, with the control problems are increasing. At present, the scholars often research and exploration of coal enterprise management-control model in subsidiary view. This article combines with CCNH case to analyze main problems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.