The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We address the problem of combining information from diversified sources in a coherent fashion. A generalized evidence processing theory and an architecture for data fusion that accommodates diversified sources of information are presented. Different levels at which data fusion may take place such as the level of dynamics, the level of attributes, and the level of evidence are discussed. A multi-level...
In this paper we study the problem of network exchange in trust based social networks. Network exchange is of two types: Specialized Exchange and Generalized Exchange, this can be characterized in terms of reciprocity, triads, graph motifs across these networks. Given the lack of standard metrics for Generalized Exchange, we propose a metric to quantify generalized exchange. We observe that the phenomenon...
Systematic and practical approaches to risk-driven operational security evidence help ensure the effectiveness and efficiency of security controls in business-critical applications and services. This paper introduces an enhanced methodology to develop security effectiveness metrics that can be used in connection with correctness assurance of security controls. This methodology is then applied to an...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
With the rapid and profound changes in computing technology, distributed computing, as an important branch of it, is becoming increasingly important, and gradually shifts from academia to specific areas of application. Currently, extensive researches on cloud computing, grid computing, large-scale E-Commerce web sites are all manifestations of a distributed system. Participating entities in a distributed...
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
This paper describes the mechanism of the object sharing in Java Card and analysis of the existed security problems which lead to the attack, at same time it puts forward two methods to solve the attack. By comparing and analyzing the two methods, we will develop more protecting mechanism to protect the security of Java Card.
As a means of resources sharing, peer-to-peer (P2P) networks are currently receiving much attention. However, the open and anonymous nature of P2P networks also paves the way for malicious users to abuse the systems such as disseminating of inauthentic files or even viruses. To counter such menacing vulnerabilities in P2P networks, this paper presents a reputation-based approach that combines personal...
ISyRAmI (Intelligent Systems Research for Ambient Intelligence) proposed by IST is an Artificial Intelligence oriented methodology and architecture for the development of Ambient Intelligence (AmI) systems. The ISyRAmI architecture considers the following four modules: Data/Information/Knowledge acquisition; Data/Information/Knowledge storage, conversion, and handling; Intelligent Reasoning; and Decision...
Users can have access to resources and obtain services at anytime and anywhere in ubiquitous computing environment. By virtue of behavior experience in human society, according to dynamic evolution discipline of the contradiction between the lag of trust and the anteriority of service, and the self-organization, distributed computing and regenerative feedback characteristics of ant colony algorithm,...
Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns...
ISyRAmI (intelligent systems research for ambient intelligence) is an artificial intelligence oriented methodology and architecture for the development of ambient intelligence (AmI) systems. The ISyRAmI architecture considers the following four modules: data/information/knowledge acquisition; data/information/knowledge storage, conversion, and handling; intelligent reasoning; and decision support/intelligent...
In this paper, we introduce an m-commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce...
As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious "input of coma" can trigger high-complexity behavior such as deep recursion in a carelessly implemented server, exhausting CPU time or stack space and making the server unavailable to legitimate clients. These DoS attacks exploit the...
Online backup service software provides automated, offsite, secure online data backup and recovery for remote computers. How to satisfy functional requirements and guarantee the fault tolerance of online backup service software is a difficult but crucial problem faced by software designers. In this paper, we investigate to incorporate the fault tolerant techniques in the system design, and propose...
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving independently from each other. Modern IDEs have started to incorporate support for these highly distributed environments, by adding new collaborative features. As a result, assessing and controlling system quality (e.g. security...
We present ASPIER - the first framework that combines software model checking with a standard protocol security model to automatically analyze authentication and secrecy properties of protocol implementations in C. The technical approach extends the iterative abstraction-refinement methodology for software model checking with a domain-specific protocol and symbolic attacker model. We have implemented...
Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software complexity and the specific expertise needed for the integration of modern security solutions. In this paper we present the SERENITY Project which proposes a framework addressing this issue. SERENITY is based on the separation of the development of security solutions from...
In view of the limitation of the traditional security technique in Web service (WS) session domain, it researched the session security management model based on Web service and analyzed the security specifications of WS-Security and WS-Conversation proposed by IBM and Microsoft. In combination with a specific E-Commerce project, it discussed the design of session security model, analyzed the process...
Workflow management systems (WFMS) are concerned with the control and coordination of operational business processes, called workflows. When workflow technology is deployed in domains where processes have simple coordinative requirements, the flow of control and data may be easily mapped onto process effectiveness. With the diversity of resources, subjects and activities in the system, ensuring a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.