It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based ...
详细信息
Most network attack models have the problem of lacking ablility to describe all types of attack patterns in deltail, with no consideration of attacker's skill and policy. To address the problem, this paper propose...
详细信息
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one...
详细信息
ISBN:
(纸本)9780769542119
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy andsecurity policies. In this paper, we show through concrete examples that constraints involving topologies are common for composed services but are rarely supported by existing service composition policy languages. We then present a rule-based constraint policy language built on top of a general graph-based service composition model. The language provides a unified treatment to support both attribute-based and topology-based constraints. We further design an ontology-based policy framework for effective policy enforcement and analysis. Finally, we implement a prototype policy management system for service composition, and conduct extensive experiments to evaluate the effectiveness of the proposed techniques.
The weak security of the digital digest algorithm used in the authentication system of SNMPv3 has been analyzed, an improved suggest taking SHA-2 to replace SHA-1 and MD5 used originally in SNMPv3 has been presented, ...
详细信息
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these a...
详细信息
Malicious code is any code that has been modified with the intention of harming its usage or the user. Typical categories of malicious code include Trojan Horses, viruses, worms etc. With the growth in complexity of c...
详细信息
In recent years, the artificial neural networks theory and the application obtained the swift development. Especially the artificial neural networks BP model reflected the functional relations which need not to use th...
详细信息
Due to the lack of objectively reflecting the macro situation of large-scale complex network availability, this paper proposes a new definition of availability index for macro situation and its flow-based quantitative...
详细信息
Most researches in the field of covert channel concerned a specific channel, and few works resolved the general situations. This paper focuses on the system that can be modeled as a finite state machine, introduces an...
详细信息
The emergence of electronic commerce has changed the traditional business model, it has changed vendors and customers. Expanded customer choice makes them pay more attention to the value of goods, rather than before t...
详细信息
暂无评论