According to a recent report by research firm ABI Research, location-based social networks could reach revenues as high as $13.3 billion by 2014 [1]. Social Networks like Foursquare and Gowalla are in a dead heat in t...
详细信息
Gold farming is a set of illicit practices in which players in massively multiplayer online games gather and distribute virtual goods for real money. Using anonymized data from a popular online game to construct netwo...
详细信息
Location Based Services (LBSs) have recently attracted much attention due to the advancement of GPS facilitates. In LBS, the private and confidential information of user may disclose to others since LBS need a user...
详细信息
To solve the security issues of cross-domain authentication in SOA, the paper proposed a Cross-Domain Authentication Model in SOA based on Enterprise Service Bus. The CDAM-ESB took use of Enterprise Service Bus as a t...
详细信息
Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low up...
详细信息
ISBN:
(纸本)9781450300896
Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront investments, are shadowed by security challenges which inhibit its adoption. Managed through a web-services interface, users can configure highly flexible but complex cloud computing environments. Furthermore, users misconfiguring such cloud services poses a severe security risk that can lead to security incidents, e.g., erroneous exposure of services due to faulty network security configurations. In this article we present a novel approach in the security assessment of the end-user configuration of multi-tier architectures deployed on infrastructure clouds such as Amazon EC2. In order to perform this assessment for the currently deployed configuration, we automated the process of extracting the configuration using the Amazon API. In the assessment we focused on the reachability and vulnerability of services in the virtual infrastructure, and presented a way for the visualization and automated analysis based on reachability and attack graphs. We proposed a query and policy language for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. We have implemented the security assessment in a prototype and evaluated it for practical scenarios. Our approach effectively allows to remediate today's security concerns through validation of configurations of complex cloud infrastructures.
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present problems that may discourage potential users. Hence, high confidence...
详细信息
Application environment is the necessary condition for an application system running. If the application environment can be trusted, then the application system could run safely and reliably. This paper firstly analyz...
详细信息
Self-monitoring is an important mechanism for the security of wireless sensor networks. In this work we propose a novel distributed node self-monitoring mechanism for wireless sensor networks. Assuming a sensor node c...
详细信息
The service and cloud computing oriented architecture is a very promising architecture for practical implementation of the next generation geographical information systems. This paper investigated the service and clou...
详细信息
Recently, Chung and Ku showed that the S-3PAKE (simple three-party password-based authenticated key exchange) protocol proposed by Lu and Cao is vulnerable to an impersonation-of-initiator attack, an impersonation-of-...
详细信息
暂无评论