A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib...
详细信息
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control,...
详细信息
The privilege in the operating system (OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, Separation of Duty. However, these mechanisms can not eliminate the privilege in OS kernel layer. This paper proposes a Separation of Three Powers Architecture (STPA). The authorizations in OS are divided into three parts: System Management Subsystem (SMS), security Management Subsystem (SEMS) and Audit Subsystem (AS). Mutual support and mutual checks and balances which are the design principles of STPA eliminate the administrator in the kernel layer. Furthermore, the paper gives the formal description for authorization division using the graph theory. Finally, the implementation of STPA is given. Proved by experiments, the Separation of Three Powers Architecture we proposed can provide reliable protection for the OS through authorization division.
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, ...
详细信息
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, Separation of Duty. However, these mechanisms can not eliminate the privilege in OS kernel layer. This paper proposes a Separation of Three Powers Architecture(STPA). The authorizations in OS are divided into three parts: System Management Subsystem(SMS), security Management Subsystem(SEMS) and Audit Subsystem(AS). Mutual support and mutual checks and balances which are the design principles of STPA eliminate the administrator in the kernel layer. Furthermore, the paper gives the formal description for authorization division using the graph theory. Finally, the implementation of STPA is given. Proved by experiments, the Separation of Three Powers Architecture we proposed can provide reliable protection for the OS through authorization division.
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for inner-product ...
详细信息
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for inner-product predicates (IPBE) was proposed by combining with Waters dual system encryption methodology and inner-product predicate encryption. Based on the standard model, the scheme can not only achieve constant-size key and ciphertext, but also guarantee the security of the plaintext M as well as the security of the attribute vectors. Furthermore, the scheme is proved by using a non-interactive static assumption and the analysis results indicated that the scheme is fully secure.
Considering construct a chosen-ciphertext secure unidirectional PRE in the adaptive corruption model is still an important question and the broadcast encryption with wide applications in the real world, the first CCA-...
详细信息
Currently, a majority of existing algorithms for sparse optimization problems are based on regularization framework. The main goal of these algorithms is to recover a sparse solution with k non-zero components(called ...
详细信息
This paper focuses on path-inclusion secure two-party computation problem,and an efficient protocol for securely computing the path-inclusion problem is *** problem is defined in the two parties setting,where Alice an...
详细信息
This paper focuses on path-inclusion secure two-party computation problem,and an efficient protocol for securely computing the path-inclusion problem is *** problem is defined in the two parties setting,where Alice and Bob both have a *** goal of Bob is to learn whether his path is included by the path Alice holds,without revealing it to Alice or learning anything else about Alice's *** construction is based on an automata evaluation *** our protocol,each path is coded into a string which reserves all information about the original *** both parties are involved in the automata evaluation *** one of them can learn whether one path includes the other one.
The standard optimized link state routing (OLSR) introduces an interesting concept, the multipoint relays (MPRs), to mitigate message overhead during the flooding process. This paper propose a new algorithm for MPRs s...
详细信息
Cloud computing is an active and prosperous field of computer science, both academically and industrially. Meanwhile, security is one of major concerns that may prevent the wide acceptance of cloud computing. In parti...
详细信息
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection sch...
详细信息
ISBN:
(纸本)9781467330930
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares.
暂无评论