The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interplanetary Network defines the architecture and protocols necessary to permit inter-operation of the Internet residents or systems on earth/spacecrafts with other remotely located Internet resident/systems on other systems/spacecrafts in transit in the hostile and unpredictable environment of space. Inter-networking in such environment requires new techniques other than traditional communication...
Detecting, filtering and blocking the illegal and inappropriate content on the Internet by using Internet content rating technology are important for Internet cultural security, but the lack of relevant technical standards impedes the industrialization and large-scale applications of this technology seriously. To solve this problem, this paper discusses how to establish the Internet Content Rating...
Enterprises must provide secure services for their customers in e-commerce. There are some threats that should consider in this area. Providing secure services is so extensive and difficult, using the appropriate models can facilitate implementing. Here we try to introduce a two level model which outlines managerial and technical requirements of this issue, that includes security standards and protocols...
Web services have emerged as a new Web-based technology paradigm for exchanging information on the Internet using platform-neutral standards, such as XML and adopting Internet-based protocols. They offer greater accessibility of data, dynamic establishment of inter-service relationships and communication paths, inter-applications interactions and data interchange on different platforms in different...
Correctional Service Canada (CSC) operates 57 Institutions equipped with a range of mission critical Security, Communications and Access Management systems. These include CCTV assessment, intrusion detection, radio communications and door control systems. User Interfaces range from colour graphic touch screens to knobs, push buttons etc. Operational and technical challenges include the following issues:...
DNS is vulnerable to cache poisoning attacks, whereby an attacker sends a spoofed reply to its own query. Historically, an attacker only needed to guess a predictable, or more recently, a 16 bit pseudorandom ID in order to be successful. The Kaminsky attack demonstrated successful poisoning attacks that required only 6 seconds on typical networks. Since then, source port randomization (spr) has been...
Personal information sharing is one of the most common online activities. Most of the times we feel forced to give up about some privacy in order to share a piece of information with others. This paper reflects on the anonymity, integrity, privacy of users' personal information and it's scattering across the Web by taking an approach to digital identity management concept. Consequently it also reflects...
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting security relevant events, currently no adequate and sophisticated solution for complex environments, such as Grid and Cloud Computing, exist. Current LOG file formats lack of several important factors, hindering automatic evaluation needed for distributed systems to comply...
Network Endpoint Assessment (NEA) is a set of protocols allowing an enterprise to automatically check a device's compliance with security policy when it attaches to the network. Compliance checks might specify, for example, that critical security patches and antivirus software are installed and up-to-date.
This article according to the enterprise top five security issues that are information security management, regulatory compliance, disaster recovery/business continuity, enterprise-based IT management and IT governance and challenges of managing IT risks which the survey results, then proposed helps enterprise using the Web data mining tool to solve these issues. This article proposed a Web data mining...
As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation...
The electronic commerce is studied from the security issue. Based on the relationships of e-commerce security and computer network security, an e-commerce security model is presented. Then aiming at the different application environments of B2B, B2C and C2C, the research status and existing problems of the e-commerce security support technologies are reviewed. Finally, the further researches are suggested.
This paper presents an approach to assess security of Web servers. This method can be used to compare the security features of different Web servers installations and to determine how secure a given Web server configuration is. The assessment is done by applying a set of tests designed to check if the system under evaluation fulfils a set of security practices defined by an extensive field study....
This paper deals with principles, architecture and solution to problems of virtual automation networks for purposes of automation. Virtual automation networks represent recent trend of communication in heterogeneous networks in industrial automation. Heterogeneous networks consist of industrial automation systems such as fieldbuses, office LANs, and public networks (Internet and telecommunication...
Within a virtual organisation collaborative environment, the organisations' security domains must be interconnected through Internet and information and communication technologies to allow these organisations to share data and exchange resources and competencies in a secure way. Each organisation must open its information system and thus, security concerns are raised when setting up collaboration...
Many governments have delivered their services in ways that meet the desires of the citizens and businesses they serve, enabling them to interact securely in places and at times that are convenient for them. E-government is one of the most important achievements of the Internet. Successfully implementing e-government requires a level of trust on the part of all transaction parties. There are several...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
IT security professionals' effectiveness in an organization is influenced not only by how usable their security management tools are but also by how well the organization's security management model (SMM) fits. Finding the right SMM is critical but can be challenging - trade-offs are inherent to each approach, but their implications aren't always clear. The authors present a case study of one academic...
This paper is a review of the history of business-to-business exchanges (e-business) from the perspective of standardization. The starting point is EDI (electronic data interchange), which has continued to thrive even as Web applications have increased their popularity. We then discuss the various approaches to assure EDI security on open networks, because they are gradually displacing private networks...
This paper presents the vulnerabilities of the Domain Name System (DNS) and shows the benefits of using a new Internet standard for a more secure DNS, called Domain Name System Security Extensions (DNSSEC). The succeeding section reports on several DNSSEC tests and shows the likely impact of DNSSEC implementation on a typical large ISP's DNS platform
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.