The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security module. Through analyzing the overall survivability of storage systems, and importing survivable requirement into the design phase of storage systems, security and other attributes is easily...
For the security issue in intranet storage systems, we design a data security storage system, which integrates information isolation, accessing control, virus detection, metadata safeguard of crucial data and fast-speed retrieval. This system can provide a solid foundation for data protection and multilevel storage in enterprise intranet. The result on trial displays that this system can ensure the...
E-mail isn't just a simple way of delivering information, but is a core tool of task process. A company mainly uses e-mail as a way to internally communicate and to process main tasks of business. Currently, mail capacity being used in a company has been increasing in rate of 40% and 70% of company information is being preserved in e-mail. However, most of the companies manage e-mail by using diverse...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
With the rapid development of wireless communication technology and Internet, the mobile office emerges as a new requirement of the times. At the same time, the security problem of mobile office is increasingly prominent. Based on the existing WLAN security technologies for Infrastructure mode and Ad hoc mode and combined with environmental requirements and characteristic of mobile office, this paper...
With the development of remote sensing technology, the use of remote sensing images collected by space platforms is becoming more and more pervasive. There is more and more need to distribute processing of remote sensing images. At present, WebService can figure out non-security remote sensing images network processing, but due to network transmit without non-encryption at client side, which may lead...
Many two-factor authenticated key exchange protocols have been proposed, and the common ones are based on a secure device and a user's password. But most of them do not use the one-time password system. In one-time password systems, users have many passowrds and use each password only once. This paper presents a new two-factor authenticated key exchange protocol using one-time passwords and a secure...
Encryption has been a widely used technology for protecting secure data. However, recent threats show that encrypted data are being hacked and decrypted. A 128-bit encryption can be broken by a few weeks of supercomputing processing. These data are very critical to an organization and could be lethal if accessed by unauthorized group. Here a new transmission model is proposed for securing structured...
System security is a crucial constraint for secure transfer of data. Because of the nature of the SSH protocol, anyone with access to the central server can manipulate files, it is imperative that only authorized users be able to access the central server. Secure transfer has taken steps that will discourage several common attempts to forcefully gain access to the system. These steps include implementing...
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.