Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. Using layered method, it divides CIS into modules and reduces system complexity. Web service technology is widely adopted in layers to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability in different aspects. It uses system management layer to make CIS administrable. It suits highly security-critical environment such as government and bank. Been properly simplified, it can be applied to relative simple information system too.
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com...
详细信息
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable command on disaster recovery. It uses selfsupervision function to monitor the integrality and security of system itself. Through GIS, this model makes disaster recovery system easier to use, manage and maintain. RDRSM possesses features of security, robustness and controllability and can be applied to environments such as e-government and bank. This model successfully conducted the construction of an important e-government disaster recovery system, which verified its feasibility and the significance of its components, such as disaster recovery planning, system supervision and robust communication support.
This paper presents the design and implementation of an Internet home automation system. The design is based on an embedded controller which is connected to a PC-based home Web server via RS232 serial port. The home a...
详细信息
This paper presents the design and implementation of an Internet home automation system. The design is based on an embedded controller which is connected to a PC-based home Web server via RS232 serial port. The home appliances are connected to the input/output ports and the sensors are connected to the analog/digital converter channels of the embedded controller. The software of the system is based on the combination of Keil C, Java Server Pages, and JavaBeans, and dynamic DNS service (DDNS) client. Password protection is used to block the unauthorized from accessing to the server. The system is scalable and allows additional appliances to be added to it with no major changes to its core, the home appliances can be monitored and controlled locally, or remotely through a web browser from anywhere in the world provided that an Internet access is available.
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC...
详细信息
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm ECDSA and achieves both privacy and authenticity in the method of ECDLP which is the most practical cryptographic primitive in the future. The scheme saves 78%-82% computation costs in all. It also saves 14% storage costs for current security parameters and 9% storage costs for high level security in average. The saving is significant potentially, especially in power restricted applications such as embedded systems and mobile computing. Arguments show that the scheme is secure at present. Compared with RFC1421 and existed results, the scheme for multiple users also discussed.
Based on the comparison and analysis of several worms containment strategy, a new and effective strategy of dynamic defence and worm containment (DDWC) is proposed. The effectiveness for containing top-speed scan worm...
详细信息
Based on the comparison and analysis of several worms containment strategy, a new and effective strategy of dynamic defence and worm containment (DDWC) is proposed. The effectiveness for containing top-speed scan worm and slow-speed scan worm is demonstrated. The impact of normal network traffic on the containment strategy is also analyzed so that it brings down false positives largely. The simulation results have verified that the improved two-rotation quarantine algorithm can contain worms effectively and create lower false alarms.
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analy...
详细信息
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analyze the Davis Swick protocol and successfully prove the security of this protocol. Therefore, we can draw a conclusion that Running-Mode Analysis of three-principal cryptographic protocol is available.
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time interval...
详细信息
A new signcryption based on elliptic curve cryptosystems that combines ECDSA and PSCE-1 is presented. The signcryption scheme is a publicly verifiable scheme which can be verified by the third party after the specific...
详细信息
ISBN:
(纸本)1581139551
A new signcryption based on elliptic curve cryptosystems that combines ECDSA and PSCE-1 is presented. The signcryption scheme is a publicly verifiable scheme which can be verified by the third party after the specific recipient removes his keyinformation. Analysis shows that the proposed scheme is secure against the adaptive chosen ciphertext attack. The signcryption saves the communication cost at least 1.25 times and enhances computation cost 1.19 times over ECDSA-then-PSCE-1. Compared with other signcryption schemes, such as Y. Zheng's ECSCS, the new signcryption uses a uniform elliptic curve cryptosystem platform instead of four kinds of cryptosystem components: hash function, keyed hash function, symmetric cipher and elliptic curve. While keeping high security and efficiency, the scheme can be implemented in software and hardware at low price because of above advantages. Based on the presented signcryption, a broadcast scheme for multiple recipients and a threshold scheme with key Distributed Generation for multiple senders are also proposed. Copyright 2004 ACM.
Currently, risk assessment has been an effective technology of protecting networkinformation system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introd...
详细信息
ISBN:
(纸本)0780384032
Currently, risk assessment has been an effective technology of protecting networkinformation system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introduces the idea of network node correlation (NNC), and based on NNC, we give the conception and characteristic of risk propagation. Also, we design a quantitative taxonomy of network node, and describe the assessment process. Compared with other works, our approach more truly reflects the existence of the correlative risk.
When solving a distributed problem based on a multiagent system, the local behaviors of agents will be aggregated to the global behaviors of the multi-agent system towards a solution state. This paper presents a distr...
详细信息
暂无评论