The security of the web-service program is a very significant facet in the grid computing environment. A fuzzer is a program that attempts to discover security vulnerabilities by sending random input to an application...
详细信息
The security of the web-service program is a very significant facet in the grid computing environment. A fuzzer is a program that attempts to discover security vulnerabilities by sending random input to an application. How to efficiently reduce the fuzzing data scale with the assurance of high fuzzing veracity and vulnerability coverage is a very important issue for its effective practice. In this paper, aimed at the web-service program, a new heuristic method for fuzzing data generation named as H-Fuzzing is be presented, which has high program executing path coverage with the information from the static analysis and dynamic property of the program. The main thought of H-Fuzzing is collecting the information of the key branch predications and building its relations with the input variables in order to supervise the dimension reducing of the fuzzing data aggregation.
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), M...
详细信息
ISBN:
(纸本)9781424451012
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), Medical Record department (MRD) and X-Ray department in one of the leading government supported hospital in Malaysia. The hospital was equipped with Total Hospital Information system (THIS) environment. The data were collected using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows the most critical threat for the THIS is the power failure. In addition, acts of human error or failure threat also show high frequency of occurrence. The contribution of the paper will be categorization of threats in HIS and can be used to design and implement effective security systems and policies in healthcare setting.
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, lo...
详细信息
ISBN:
(纸本)9780769537443
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most important issue that should be solved. In this paper, we propose a RFID authentication scheme that achieves the goal of location privacy. We also cite the threat model to analysis security threat of our protocol. Moreover, our scheme can be implemented with low-cost and high efficiency.
In this paper, we propose 24-ary grid graphs corresponding to rectangular solid dissections for ruled line preserving operations. We also show a data structure called H9CODE that corresponds to the 24-ary grid graphs....
详细信息
ISBN:
(纸本)9789898111678
In this paper, we propose 24-ary grid graphs corresponding to rectangular solid dissections for ruled line preserving operations. We also show a data structure called H9CODE that corresponds to the 24-ary grid graphs. Furthermore, we describe a voxel unification method in the 24-ary grid graphs and show that the 24-ary grid graphs are an effective modei to represent solid graphics.
Accurate forecasting of the rice yields is very important for the organization to make a better planning and decision making. In this study, a hybrid methodology that combines the individual forecasts based on artific...
详细信息
Traditional model checking methods to find safety and liveness violations are usually applied in the abstract model, while existing runtime monitoring methods to check the predicates can not obtain the high path cover...
详细信息
ISBN:
(纸本)9781424452095
Traditional model checking methods to find safety and liveness violations are usually applied in the abstract model, while existing runtime monitoring methods to check the predicates can not obtain the high path coverage. This paper presents a hybrid model checking and runtime monitoring method to check the safety and liveness properties in real complex distributed C/C++ Web service systems,which can offer both a richer and more efficient way to search violations specified by linear temporal logic. Based on our model checking engine to walk different paths, we adopt the finite linear temporal logic engine to dynamically verify properties in C/C++ Web service systems. Then, we use the practical examples to illustrate its usage and applications in real C/C++ Web service systems.
This paper describes Data Modeling for unstructured data of Diffusion Tensor Imaging (DTI). Data Modeling is an essential first step for data preparation in any data management and data mining procedure. Conventional ...
详细信息
We describe a unique competition based on the novel concept of robotics and mechatronics products that included evaluation of the products' engineering function and interface design. Seventy-seven students of elev...
详细信息
This research aims to develop a combined sense system that uses both the sense of a force feedback as well as visual feedback in the shape of microscopic features from a micro sample. It is thought that the efficiency...
详细信息
Laboratory experiments were conducted to investigate the run-up of internal solitary waves (ISWs) on steep uniform slopes in a two-layered fluid system with a free surface. A 12 m long wave flume, which incorporated a...
详细信息
暂无评论