The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, ...
详细信息
The privilege in the operating system(OS) often results in the break of confidentiality and integrity of the system. To solve this problem, several security mechanisms are proposed, such as Role-based Access Control, Separation of Duty. However, these mechanisms can not eliminate the privilege in OS kernel layer. This paper proposes a Separation of Three Powers Architecture(STPA). The authorizations in OS are divided into three parts: System Management Subsystem(SMS), security Management Subsystem(SEMS) and Audit Subsystem(AS). Mutual support and mutual checks and balances which are the design principles of STPA eliminate the administrator in the kernel layer. Furthermore, the paper gives the formal description for authorization division using the graph theory. Finally, the implementation of STPA is given. Proved by experiments, the Separation of Three Powers Architecture we proposed can provide reliable protection for the OS through authorization division.
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for inner-product ...
详细信息
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for inner-product predicates (IPBE) was proposed by combining with Waters dual system encryption methodology and inner-product predicate encryption. Based on the standard model, the scheme can not only achieve constant-size key and ciphertext, but also guarantee the security of the plaintext M as well as the security of the attribute vectors. Furthermore, the scheme is proved by using a non-interactive static assumption and the analysis results indicated that the scheme is fully secure.
Considering construct a chosen-ciphertext secure unidirectional PRE in the adaptive corruption model is still an important question and the broadcast encryption with wide applications in the real world, the first CCA-...
详细信息
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection sch...
详细信息
ISBN:
(纸本)9781467330930
In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares.
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum...
详细信息
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal *** the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the *** receiver then performs projective determinate measurement to decode the secret message ***,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity.
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ...
详细信息
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe...
详细信息
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop...
详细信息
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of spacetime. Most researchers are only concerned about the learner's cognitive and construct a great amoun...
详细信息
暂无评论