In recent years, P2P networks have become a focus in the industry. The P2P network is open and anonymous, providing the opportunity for false documents, malicious attacks and other malicious acts, so its trust and sec...
详细信息
In recent years, P2P networks have become a focus in the industry. The P2P network is open and anonymous, providing the opportunity for false documents, malicious attacks and other malicious acts, so its trust and sec...
详细信息
Privacy Preserving Computational Geometry (PPCG) is a new study field of Secure Multi-party Computation(SMC), its main contents include: Point Inclusion problem, Polygon Intersection problem, Closest Pair problem, Con...
详细信息
Location Based Service(LBS) becomes very popular in mobile computing platforms, such as Android. However, it could also leak highly personal information about the phone owner if used by Malwares. It has been witnessed...
详细信息
I The paper puts forward the Web security password authentication scheme based on the single-block hash function. The scheme can solve the problem effectively that exists in the traditional password authentication or ...
详细信息
I The paper puts forward the Web security password authentication scheme based on the single-block hash function. The scheme can solve the problem effectively that exists in the traditional password authentication or digital signature in the Web authentication of user's identity to realize the defect. It can resist replay attacks, eavesdropping, modification of messages and common attacks, and low cost, high efficiency, satisfying security and efficient needs of structural features for identifiable authentication in the network service. Generally, MD5 or SHA1 is used. But these algorithms are too cumbersome for the Web authentication of user's identity, and the amount of computation is also too huge. The experimental results show that the scheme guarantees safety at the time, and increases the efficiency of the security authentication.
Searchable encryption is used to support searches over encrypted data stored on cloud servers. Traditional searchable encryption only supports exact keyword search instead of more flexible fuzzy keyword search. To sol...
详细信息
I The paper puts forward the Web security password authentication scheme based on the single-block hash function. The scheme can solve the problem effectively that exists in the traditional password authentication or ...
详细信息
I The paper puts forward the Web security password authentication scheme based on the single-block hash function. The scheme can solve the problem effectively that exists in the traditional password authentication or digital signature in the Web authentication of user's identity to realize the defect. It can resist replay attacks, eavesdropping, modification of messages and common attacks, and low cost, high efficiency, satisfying security and efficient needs of structural features for identifiable authentication in the network service. Generally, MD5 or SHA1 is used. But these algorithms are too cumbersome for the Web authentication of user's identity, and the amount of computation is also too huge. The experimental results show that the scheme guarantees safety at the time, and increases the efficiency of the security authentication.
The Future Internet (FI) comprises scenarios where many heterogeneous and dynamic entities must interact to provide services (e.g., sensors, mobile devices and information systems in smart city scenarios). The dynamic...
详细信息
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know th...
详细信息
The number of insider threats hitting organizations and big enterprises is rapidly growing. Insider threats occur when trusted employees misuse their permissions on organizational assets. Since insider threats know the organization and its processes, very often they end up undetected. Therefore, there is a pressing need for organizations to adopt preventive mechanisms to defend against insider threats. In this paper, we propose a framework for insiders identification during the early requirement analysis of organizational settings and of its IT systems. The framework supports security engineers in the detection of insider threats and in the prioritization of them based on the risk they represent to the organization. To enable the automatic detection of insider threats, we extend the SI* requirement modeling language with an asset model and a trust model. The asset model allows associating security properties and sensitivity levels to assets. The trust model allows specifying the trust level that a user places in another user with respect to a given permission on an asset. The insider threats identification leverages the trust levels associated with the permissions assigned to users, as well as the sensitivity of the assets to which access is granted. We illustrate the approach based on a patient monitoring scenario.
暂无评论