Cloud computing is widely accepted dominant paradigm that provides a number of resources and cost effective software services to their clients as they demand such as Software as a Service, Platform as a Service and In...
详细信息
ISBN:
(纸本)9781479987924
Cloud computing is widely accepted dominant paradigm that provides a number of resources and cost effective software services to their clients as they demand such as Software as a Service, Platform as a Service and Infrastructure as a Service. However these services provide a lot of benefits for their clients, but still there is a need of data security against unauthorized access of services (data). Access control is an important aspect of cloud computing to enhance the system security. This paper focus on securing the pay-as-you-go model used by cloud service access model (CSAC) using combination of RSA and AES algorithm to ensure that only authorized user access the services from cloud. It also provides the mechanism to detect the conflicts between policies and inhibits the access due to conflicts in the environment of cloud computing. This paper gives an insight into the enhancement of the security to access the services from cloud by proposed access control model. With this aim, this paper presents a secure access control model which allows legal access of services.
This paper analyses network security issues for the majority of enterprise-class CMS website's framework, carrying out safety analyses detailed on all servers by using safety testing tools such as X-Scan. After a ...
详细信息
ISBN:
(纸本)9781424420957
This paper analyses network security issues for the majority of enterprise-class CMS website's framework, carrying out safety analyses detailed on all servers by using safety testing tools such as X-Scan. After a detailed study of data, the paper put forward the idea of security evaluation algorithm for constructing enterprise-class CMS.
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships. These interrelationships may be built into the enterprise information infrastructure, as in ...
详细信息
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships. These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware elements in network architecture, or in the installation of software or in the information assets. As a result, access to one element may enable access to another if they are connected. An enterprise may specify conditions on the access of certain assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead to managerial vulnerabilities in the enterprise information system. These vulnerabilities, if exploited by threats, may cause disruption to the normal functioning of information systems. This paper presents a formal methodology for detection of managerial vulnerabilities of, and threats to, enterprise information systems in linear time.
Privacy preservation has become an essential requirement in today's computing environment;abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information s...
详细信息
Privacy preservation has become an essential requirement in today's computing environment;abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information systems, it would be desirable to develop a new method in the standard paradigm. This paper investigates practical methods for privacy preservation with X.509 standard certificates by providing conditional traceability for both identity and attribute certificates in the legacy systems. We separate certificate authorities, one for verifying identities and the other for validating contents, in a blinded manner without requiring a trusted third party. We design a concrete method with its more generic and applicative extensions, and prove security formally. We also evaluate performance through rigorous experiments and discuss possible applications. (C) 2011 Elsevier Inc. All rights reserved.
This paper analyses network security issues for the majority of enterprise-class CMS website's framework, carrying out safety analyses detailed on all servers by using safety testing tools such as X-Scan. After a ...
详细信息
This paper analyses network security issues for the majority of enterprise-class CMS website's framework, carrying out safety analyses detailed on all servers by using safety testing tools such as X-Scan. After a detailed study of data, the paper put forward the idea of security evaluation algorithm for constructing enterprise-class CMS.
As the communication technology weighs heavily in the power system, so the security issues becomes major concerns. So far most security research has focused on the SCADA system. In this paper we consider the security ...
详细信息
As the communication technology weighs heavily in the power system, so the security issues becomes major concerns. So far most security research has focused on the SCADA system. In this paper we consider the security problems in the network environment of the distribution automation system (DAS) which is much different from the SCADA system. First we analyze the types of cyber threats in many applications of the distribution system, and formulate the security goals. Then we propose the efficient security algorithms to achieve these goals. The algorithm avoids complex computation of any encryption algorithm, considering the resource-constraint network nodes. We also propose the efficient secret key distribution algorithm without resort to the public key encryption. Finally we demonstrate the feasibility of the proposed security protocol by experiment.
Cluster formation of nodes in wireless sensor network is an effective approach and key technology to implement energy saving and flexible management. To improve security and efficiency of clustering network, a secure ...
详细信息
ISBN:
(纸本)9781424417339
Cluster formation of nodes in wireless sensor network is an effective approach and key technology to implement energy saving and flexible management. To improve security and efficiency of clustering network, a secure clustering model was proposed to identify and get rid of malicious nodes, to achieve cluster-range self-management and on-demand cluster maintenance based on the random and parallel cluster header election algorithm and pre-distributed key scheme, a integrated solution is built to reach efficient management, energy saving and secure information for wireless sensor network, the performance of this algorithm is analyzed and evaluated
暂无评论