In this paper, we propose a new security protocol enhancement for LEMP, which is a novel application-layer protocol, specifically designed for data streaming applications with large client sets, offering distributed m...
详细信息
privacy and anonymity on the Internet are gaining increasing attention from boththe scientific and the large Internet user community. WonGoo is a peer-to-peer scalable anonymous communication system that provides str...
详细信息
ISBN:
(纸本)076952432X
privacy and anonymity on the Internet are gaining increasing attention from boththe scientific and the large Internet user community. WonGoo is a peer-to-peer scalable anonymous communication system that provides strong anonymity and high efficiency with layered encryption and random forwarding. It reduces the message overhead and lengthens the covert path. In this paper we firstly describe the system briefly and evaluate its payload. then we present a detailed security analysis of the system. the results reveal that the degree of anonymity provided by the system increases withthe increase of forward probability and the path length, and reduces withthe increase of corrupted nodes. In addition, it is hard to increase its anonymity significantly only by increasing the size of the system.
privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining techniques are applied to a large collect...
详细信息
Hesitant about Internet security has been a major obstacle to consumers' acceptance of electronic commerce. the objective of this paper is to assess how consumers in Pacific Asia perceive Internet security and how...
详细信息
Hesitant about Internet security has been a major obstacle to consumers' acceptance of electronic commerce. the objective of this paper is to assess how consumers in Pacific Asia perceive Internet security and how much they know about the topic. A total of 182 university students from Australia and Hong Kong SAR participated in this study. the results show that respondents in these two Pacific Asia regions had similar level of e-literacy. Both groups were unsure about Internet security and their self-assessed knowledge of Internet security was relatively low. A closer analysis of the data suggests that respondents have a tendency to over-estimate their understanding of the Internet security.
In many companies data is distributed among several sites, i.e. each site generates its own data and manages its own data repository. Analyzing and mining these distributed sources requires distributed data mining tec...
详细信息
ISBN:
(纸本)0769522785
In many companies data is distributed among several sites, i.e. each site generates its own data and manages its own data repository. Analyzing and mining these distributed sources requires distributed data mining techniques to find global patterns representing the complete information. the transmission of the entire local data set is often unacceptable because of performance considerations, privacy and security aspects, and bandwidth constraints. Traditional data mining algorithms, demanding access to complete data, are not appropriate for distributed applications. thus, there is a need for distributed data mining algorithms in order to analyze and discover new knowledge in distributed environments. One of the most important data mining tasks is clustering which aims at detecting groups of similar data objects. In this paper, we propose a distributed model-based clustering algorithm that uses EM for detecting local models in terms of mixtures of Gaussian distributions. We propose an efficient and effective algorithm for deriving and merging these local Gaussian distributions to generate a meaningful global model. In a broad experimental evaluation we show that our framework is scalable in a highly distributed environment.
Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying those applications. there is a clear need for a versatile deployment of distributed ap...
详细信息
ISBN:
(纸本)3540260323
Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying those applications. there is a clear need for a versatile deployment of distributed applications. In the same time, a security architecture must be able to cope with large variations in application deployment: from intra-domain to multiple domains, going over private, to virtually-private, to public networks. As a consequence, the security should not be tied up in the application code, but rather easily configurable in a flexible and abstract manner. To cope withthose issues, we propose a high-level and declarative security framework for object-oriented Grid applications. this article presents the transparent deployment-based security we have developed. In a rather abstract manner, it allows one to set security policies on various security entities (domain, runtime, nodes, objects) in a way that is compatible withsecurity needs according to a given deployment.
In recent years, the form of medical records already slowly changed from paper form to electronic form. the new information science and technology makes the transmission of information easier and convenient. On the ot...
详细信息
In recent years, the form of medical records already slowly changed from paper form to electronic form. the new information science and technology makes the transmission of information easier and convenient. On the other hand, the exposedness of individual privacy and information secret would be too difficult to keep and the use of new science and technology has increased the risk of information leakiness. the information security problem appears slowly in the electronic medical record. People that are indiscreet and negligent could cause improper damage to the information management. For this reason, the security guidelines could help healthcare institutions to improve insider and outsider security problem. the security guidelines should refer to BS7799 and HIPAA that we would take many advantages. Finally, we must estimate the benefit from purchase, integration, management, operations, maintenance, time lost, clumsy interfaces and procedures etc. these may spend a lot memory and time, so we should evaluate the cost and risk of BS7799 and HIPAA in each item;it could help us to guide how to select low cost, low risk and high benefits standard item to create the security guidelines.
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID;...
详细信息
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID;the technology promises to relieve repetitive strain injury, speed patron self-checkout, and make possible comprehensive inventory. Unlike supply-chain RFID, library RFID requires item-level tagging, thereby raising immediate patron privacy issues. Current conventional wisdom suggests that privacy risks are negligible unless an adversary has access to library databases. We show this is not the case. In addition, we identify private authentication as a key technical issue: how can a reader and tag that share a secret efficiently authenticate each other without revealing their identities to an adversary? Previous solutions to this problem require reader work linear in the number of tags. We give a general scheme for building private authentication with work logarithmic in the number of tags, given a scheme with linear work as a sub-protocol. this scheme may be of independent interest beyond RFID applications. We also give a simple scheme that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations. Copyright 2004 acm.
A lot of information can be found in the media about the possibility of using micro-chips in banknotes. this mostly comes from chip manufacturers whose technology is becoming mature for thisapplication. A lot of paten...
详细信息
ISBN:
(纸本)0819452130
A lot of information can be found in the media about the possibility of using micro-chips in banknotes. this mostly comes from chip manufacturers whose technology is becoming mature for this
application. A lot of patents have been applied therefore but what must be noticed is that all these patents concern the processes to insert chips in banknotes and not a lot is said about the product
itself and for what use. the Banque de France is a Central Bank involved in all tasks concerning banknotes from design, production, issue, recirculation and sorting, action against counterfeiting and finally destruction. these activities concern, of course, the banknotes in circulation in France (formerly the French francs notes, presently the Euro notes as Banque de France is part of the Eurosystem) and in other countries in the world. the Banque de France approach in looking to the future of chips in banknotes is at first a product approach. Banknotes are means of payment for which security of authentication is fundamental. they could carry chips to provide more security in the transactions but without altering their nature: the anonyminity and immediacy of the transactions.
the proceedings contain 48 papers. the special focus in this conference is on Practical Aspects of Knowledge Management. the topics include: Integrating knowledge conversions and business process modeling;a JXTA-based...
ISBN:
(纸本)9783540240884
the proceedings contain 48 papers. the special focus in this conference is on Practical Aspects of Knowledge Management. the topics include: Integrating knowledge conversions and business process modeling;a JXTA-based framework for mobile cooperation in distributed knowledge spaces;towards an evaluation framework for knowledge management systems;decision aid to support the building of competencies development scenarios within networks of SMES;using text mining to create actionable knowledge;integrating knowledge management and groupware in a software development environment;knowledge management in data and knowledge intensive environments;knowledge management in an enterprise-oriented software development environment;collaborative knowledge transfer by annotating documents;security design, organization dynamics and performance;developing an integrated retrieval system for web databases;incremental knowledge management of web community groups on web portals;integration of business process support with knowledge management;towards a systematic approach for capturing knowledge-intensive business processes;the concept of elimination of barriers to the implementation of integrated systems withthe use of i-case tools;a midterm report in introducing a decentralized semantics-based knowledge sharing application;managing knowledge assets for NPD performance improvement;knowledge management in the semiconductor industry;incremental knowledge acquisition for building sophisticated information extraction systems with KAFTIE;enhancing knowledge management through the use of GIS and multimedia;an approach for knowledge management in civil engineering;issues in moving to a semantic web for a large corporation and towards an ontology for data in business decisions.
暂无评论