Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
In this paper, the constructions of cheating immune secret sharing and multisecret sharing are studied. Based on the theories of matrix and linear block codes over finite field, some new methods to construct cheating ...
详细信息
A new q-ary generalized self-shrinking generator is presented. The main difference between the new generator and the old one is the output mode. It is shown that there is good correlation between sequences in the larg...
详细信息
A new q-ary generalized self-shrinking generator is presented. The main difference between the new generator and the old one is the output mode. It is shown that there is good correlation between sequences in the large sequence family, and sequences are balanced in a least period. Simultaneously, the lower bounds of the least period are provided, and the family of sequences takes on a rich group structure and linear space structure.
This paper presents a new fast algorithm for constructing depressed functions g based on cryptographic functions splitting idea. By splitting different selected variables using the algorithm, we can construct a system...
详细信息
This paper presents a new fast algorithm for constructing depressed functions g based on cryptographic functions splitting idea. By splitting different selected variables using the algorithm, we can construct a system of equations after ⌊k/2⌋ times of function decomposition and solving the system of equations will result in the depressed functions g. The degree of the functions g solved by this algorithm is at most ⌊k/2⌋ such that the degree of f*g is at most ⌈k/2⌉. Its computational complexity is given as O(2k/2)w+2, which is lower than the computational complexity O((2k-1)w) available when k is large. The result turns out that depressed functions g can be constructed in lower complexity.
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly ...
详细信息
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly as possible. The paper first describes a worm behavior and propagation model. And then based on it, a new approach for early detection of Internet worms is proposed. This approach determines whether a worm incident has occurred by the change of the computers' connection degree. The approach is proved to be effective on early detection of unknown worms by experiments.
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability o...
详细信息
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability of attackers. With the attention on the influence upon system, the intrusion is described by the capability of the attacker in this model. And the intrusion model is formalized by the definition of meta-attack. Then an approach to cluster the hyper-alerts into meta-attack using correlation-algorithm is presented. In the end, the method on modeling the intrusion by meta-attack is presented, and the proof of existence and uniqueness of the model constructed by this approach are given.
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model uses mathematical method to express diverse entities in information and disaster recovery system such as applications, facilities, resources, sub disaster recovery plans, budget, etc. It classifies various resources according to their utilization and payment, and identifies the significance of applications and the conflicts among sub disaster recovery plans. Through expressing relationships among applications, facilities, resources and sub plans, this model selects the best set of sub plans. This model has less subjective parameter and can evaluate disaster recovery planning objectively and quantitatively.
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. Using layered method, it divides CIS into modules and reduces system complexity. Web service technology is widely adopted in layers to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability in different aspects. It uses system management layer to make CIS administrable. It suits highly security-critical environment such as government and bank. Been properly simplified, it can be applied to relative simple information system too.
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com...
详细信息
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable command on disaster recovery. It uses selfsupervision function to monitor the integrality and security of system itself. Through GIS, this model makes disaster recovery system easier to use, manage and maintain. RDRSM possesses features of security, robustness and controllability and can be applied to environments such as e-government and bank. This model successfully conducted the construction of an important e-government disaster recovery system, which verified its feasibility and the significance of its components, such as disaster recovery planning, system supervision and robust communication support.
暂无评论