The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a secure Content Protection Secure Management Scheme about electronic documents (named CPSec EDMS) will be proposed, in which the architecture, key technology and authorization protocol, security analysis of CPSec EDMS will be discussed. To prevent document leakage, the client of CPSec EDMS adopts transparent encryption technology based on filter driver, in which the client encrypts...
This paper, based on the survey of students' online behavior and the Netflow statistics which turned out to be the fact that P2P flow accounts for about 70% of the total compus netflow and that the Thunder connection greatly endangers the firewall load, analyzed the download principle of thunder P2P software and put forward some methods on how to control Netflow.
Because of the rapid growth in e-commerce, we can buy things walking around. Its not the expensive items, but the small and cheap items such as text files, music files, movies that we buy while walking around. As this kind of e-commerce grows, micro-payment system develop these days. Since its so convenient, and simple, more and more people use it. Despite its merit, it has some problems to be solved...
There is a problem of Linux security arising as Linux system has come out as a core of electric automated system and played a role of important operating system of mobile communications. This paper describes security of Linux and requirements, analyzes well-known weakness of Linux, suggests solutions through existing security solution, and introduces an improved Linux kernel module. It also suggests...
Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password...
The paper introduces the design and the realization of the gating management system of reading room. It is a multi-user and multi-task system which based on Windows98/NT. It contains client and server. One Client is made up of a Reading-Card part and a PC, which communicate through Rs232 port. SQL Server2000 is used as the background database server.
With the gradual popularization of the Internet, campus network construction has become more sophisticated, to the intelligent direction. Apart from that, the campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated,...
Through the in-depth study of the existing network information security technologies, combined with the actual situation of the small and medium enterprise information systems, this paper puts forward a security implementation program based on small and medium enterprises and describes the implementation details of which. This network information security design is simple, easy to operate and so on.
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and...
This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos...
The rapid growth in network heterogeneity, applications complexity, services and size due to increase number of users, have introduced more challenges in access control management in traditional networks. The emerging nature of Delay/Disruption Tolerant Networking (DTN) and its design assumptions like long delay, intermittent connectivity, asymmetric data rates etc make access control management even...
Abstract-Attackers exploit software vulnerabilities, such as stack overflow, heap overflow, and format string errors, to break into victim machines and implant backdoors to maintain access. They typically use obfuscation techniques, such as encryption and covert channels, to hide their command-and-control traffic and avoid detection. In this paper, we show how a vulnerable program can be used to create...
The current paper presents an activity pattern based session specific server side software authentication framework which exploits the fact that software usage pattern of each user has a unique signature. This uniqueness in behavior or activity pattern of a user is described to be a potentially better candidate for software authentication. The identification of signature usage pattern has been developed...
Anonymity is an important feature in many two party communication systems. Its main meaning is that either the message sender or the receiver (or both) is unidentifiable to other users, even between themselves. Many mechanisms have been proposed to hide the identity of the sender, receiver, or both. Similarly, anonymity is an important feature in multi-party computing environments, but, little research...
The entire telecommunications and services world has focused its attention on the newest 3GPP architecture, 4G. Proposing high speed data transfer, all flat-IP network for the core systems and stronger authentication and AAA methods, this architecture seems to be the answer for the mobile networks of the future. Another architecture described by 3GPP as well, but based on IETF standards is the IMS...
Mobile IPv6 has been developed for quite a few years now, but it has yet to bring its constant connectivity and global reachability benefits to mobile devices in real world scenarios, mainly due to lack of trouble-free and secure network access and data transmission for devices as they roam. In this paper we propose a Unified Architecture that combines the strengths of Mobile IPv6 and AAA services...
There has been a constant growing security concern on insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily intrusions. Developing a solution for such a problem is challenging...
To enable secure content trade between peers with good scalability and efficiency in Peer-to-Peer (P2P) file-sharing systems, we propose a decentralized authorization scheme for Digital Rights Management (DRM). Based on proxy re-encryption mechanism, our scheme deploys authorization functions on semi-trusted authorization proxy peers who re-encrypt the ciphertext of content keys and issue licenses...
With the advances in the growth of wireless technologies, the usage of cell phones (i.e.) mobile users and the location based services have been increasing. However the location privacy of an individual user has become the challenging problem in the location based service providers. Here we propose an Anonymity server which is enclosed within an authentication server and a security key generator....
During a user's transactions over the Internet, there are risks of unauthorised third party transactions carried out on the user's account, using the man-in-the-middle (MITM) attack and Trojan horse. In this paper, we propose a new interactive input method of sensitive information such as credit-card numbers and account numbers against these attacks. The proposing method relatively decides the input...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.