Modeling the intrusion is an open problem which is necessary to be solved in Intrusion Tolerance System. A model of state transition and its constructing algorithm is presented which is described with the capability o...
详细信息
In recent years, internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the internet. So people began to find methods to detect worms as quickly ...
详细信息
In this paper, the constructions of cheating immune secret sharing and multisecret sharing are studied. Based on the theories of matrix and linear block codes over finite field, some new methods to construct cheating ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u...
详细信息
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges...
详细信息
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges. Because they are not suitable for the WSN systems which have low computational power and limited memory size. To get an efficient broadcast authentication protocol, the traditional μTESLA and multi-level μTESLA are utilized and studied. The problems of these protocols are pointed out. Then E-μTESLA is presented on the basis of 2-level μTESLA. At the end, the performances of E-μTESLA are compared with m-level E-μTESLA. The comparison results show that E-μTESLA is more efficient in less computational power, and less storage memory than those of m-level E-μTESLA.
This paper studies the problem of degree constrained minimum radius (DCMR) spanning tree in overlay multicast routing. A new heuristic greedy routing algorithm called degree-delay compact tree (DDCT), which is based o...
详细信息
This paper studies the problem of degree constrained minimum radius (DCMR) spanning tree in overlay multicast routing. A new heuristic greedy routing algorithm called degree-delay compact tree (DDCT), which is based on both degree constraints-delay integration and application layer topology optimum strategies, is proposed. The simulation results show that, comparing with similar algorithm having the same computing time complexity, the DDCT algorithm presents better performance all in radius, cost and link's reduplicate packages of the overlay multicast tree.
information security is very important in CSCW and digital signature is one of the valid methods to resolve these problems. Based on research on multisignature and proxy signature, we present a new type of signature: ...
详细信息
ISBN:
(纸本)184000025
information security is very important in CSCW and digital signature is one of the valid methods to resolve these problems. Based on research on multisignature and proxy signature, we present a new type of signature: Multisignature with proxy, in which some signers can delegate their proxies to do the signatures. The common multisignature and the proxy multisignature are specific to this signature. Two new schemes of multisignatures mingled with proxy signers are introduced in this paper, and their security issues are analyzed as well.
By paying attention to tussle's impact on the research of network architecture, a set of design principles for constructing new generation network architecture are summarized in this paper, and then an interaction...
详细信息
By paying attention to tussle's impact on the research of network architecture, a set of design principles for constructing new generation network architecture are summarized in this paper, and then an interaction based, service oriented model of network architecture, INSA, is proposed under the direction of those design principles. Furthermore, the design thinking, general characteristics and formal modeling techniques of INSA model are described and discussed. Maintaining the openness, simplicity and flexibility of the traditional Internet, the INSA model introduces the manageability, controllability, customizability, evolvability and reusability into the new generation network architecture. So it provides good guidance for the research and development of the next generation network.
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability o...
详细信息
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability of attackers. With the attention on the influence upon system, the intrusion is described by the capability of the attacker in this model. And the intrusion model is formalized by the definition of meta-attack. Then an approach to cluster the hyper-alerts into meta-attack using correlation-algorithm is presented. In the end, the method on modeling the intrusion by meta-attack is presented, and the proof of existence and uniqueness of the model constructed by this approach are given.
暂无评论