This paper presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users/consumers. The KUCAS system makes use of environment...
详细信息
This paper presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous authentication mechanism of users/consumers. The KUCAS system makes use of environmental context information, users behavior analysis, the behavior theories of Skinner and the Mathematical Confidence of Dempster-Shafer Evidences Theory, that establishes trust levels to authenticate the user by his behavior analysis, during an application software, in a specific domain of the computernetworks, in a period of time. The dynamics of enclosed management in this system compares the current behavior with the user's previous behaviors description and with the trust restrictions. In case of indications of changes in the user's behavior, the system provides the behavior analysis of the user using database restrictions information. If there are uncertainties and divergences, mechanisms of security and alert signals are triggered.
In order to achieve self-adaptation to run-time environment and self-management of Web service composition, an extended hierarchical Petri net is presented to reflect the feasible configuration scheme of composite ser...
详细信息
This paper presents a continuous authentication system based on user behavior analysis that makes use of environmental context information, users' behavior analysis and Neuro-Fuzzy Logic. This system must be able ...
详细信息
ISBN:
(纸本)9781424458790
This paper presents a continuous authentication system based on user behavior analysis that makes use of environmental context information, users' behavior analysis and Neuro-Fuzzy Logic. This system must be able to acquire information in context, making them into a computational environment. This information is the basis of user behavior. The System, based on the evidences of the behavior, establishes if it can trust the user or not. According to the user behavior, levels of trust are released, to access the application software. Weights are attributed in the fuzzyfication process, according to the rules that were previously established for the parameters which help to establish the evidences of behavioral trust, in its different degrees. The neuro-fuzzy logic allows that the user behavioral database be continuously updated, interacting with the fuzzyfication mechanism, so as to keep trust levels updated according to the user behavior, in a more accurate and faithful way.
We study single and multi-wavelength clock recovery functionality based on a fabry-pérot filter followed by a quantum-dot SOA at 40 Gb/s and we demonstrate its performance for various pseudo-random binary sequenc...
详细信息
Spino Cerebellar Ataxia type 2 is an autosomal dominant cerebellar hereditary ataxia with the highest prevalence in Cuba. Typical symptoms in patients of SCA2 ataxia include modifications in latency, peak velocity, an...
详细信息
Spino Cerebellar Ataxia type 2 is an autosomal dominant cerebellar hereditary ataxia with the highest prevalence in Cuba. Typical symptoms in patients of SCA2 ataxia include modifications in latency, peak velocity, and deviation in visual saccadic movements. After applying some electro-oculography based tests to both healthy and SCA2 afflicted individuals, differences in saccade morphology were found, mainly for 60° of stimulus amplitude. In this work, independent component analysis (ICA) is used to decompose the pulse and step components for the control of saccadic ocular movements, finding significant differences in time and amplitude ratio of both components. The obtained results point out the validity of the proposed methodology in order to study the effects of ataxia SCA2 in the oculomotor system.
The user interface generation process is still a complex issue. The manual creation process is time consuming and complex because it requires the combination of the application developer work and the user interface de...
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks ...
详细信息
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks on 7-round AES-192 and 8-round AES-256 were presented by using the time-memory tradeoff approach. It is shown that the new results are better than the cryptanalytic results presented at FSE2008 on reduced AES in terms of the time complexity and the memory complexity.
The article presents the architecture of a distributed platform for the future Internet of Services, where services can be provided and sold over so-called service market places. We focus on the description of the mon...
详细信息
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of ...
ISBN:
(纸本)9781605584393
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of the CASE-MANS 2009 workshop and gives an overview of the papers that are selected for presentation and publication. Copyright 2009 ACM.
To obtain high resolution ISAR image of ship target in motion with narrow-bandwidth T/R devices and a low-speed A/D sampler, an effective imaging method based on Linearly Modulated Stepped Frequency (LMSF) is proposed...
详细信息
暂无评论