With the rapid development of information technology, the secrutiy problems of information systems are being paid more and more attention, so the Chinese government is carrying out information security classified prot...
详细信息
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo...
详细信息
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost.
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...
详细信息
Exclusion Basis Systems (EBS) is a combinatorial optimization methodology for key management of group communication. The EBS approach proves to be very scalable for large networks and enables great flexibility in netw...
详细信息
security problems of an information system are mainly due to its internal vulnerabilities, by exploiting which external threats do harm to the system. security Assessment of Vulnerabilities(SAV) is, with appropriate m...
详细信息
security problems of an information system are mainly due to its internal vulnerabilities, by exploiting which external threats do harm to the system. security Assessment of Vulnerabilities(SAV) is, with appropriate methods, to assess an information system by investigating vulnerabilities in its architecture, hardware, software, networks, and protocols. These methods can be divided into two categories: rule-based and model-based, and the later draws more research focuses at present. In this paper we make an extensive survey on existing model-based approaches to security assessment of vulnerabilities in information systems, analysing their working mechanics, advantages and disadvantages. Finally, conclusions are made on open problems in model-based security assessment, and on the possible future directions of the research.
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
ISBN:
(纸本)9781457720031
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to provide services for their own domain name. Secondly, these computers can be served as agents to hide mother-ship. The character of FFSN is that the DNS records of domain name changes constantly at a high frequency. In this paper, we analyze the issue on the reliability of FFSN. The issue is resulted from the uncontrollable nodes of FFSN. We establish a model to describe the reliability by the theory of Poisson Process, and analyze the relationship between the reliability of FFSN and its size.
Based on the adoption of dependency grammar to analyze the structure of Chinese sentences, this paper suggests to analyze Chinese sentence with semantic dependency method. The correlation between words and phrases can...
详细信息
Based on the adoption of dependency grammar to analyze the structure of Chinese sentences, this paper suggests to analyze Chinese sentence with semantic dependency method. The correlation between words and phrases can be gotten by way of analysis and calculation of the similarity between the words and phrases from How net, and then the formula to analyze the similarity between sentences can be designed. Fully considering the relationship between structure and semantics of Chinese sentences, this methodology can be adopted to analyze the correlation between topics and to categorize them. It has certain prospect in the field of Chinese language research, personalized online education and recommendation of resources for the users.
In Eurocrypt'2005, Waters' identity-based encryption scheme suffers a drawback that the scheme only guarantees chosen plaintext security but chosen ciphertext security, and to give concurrent consideration bot...
详细信息
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia...
详细信息
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentiality and authenticity when message is transmitted over an insecure channel. The previous AE scheme only can allow one signer to generate the authenticated ciphertext. Recently, Chung et al. proposed a (t, n) threshold authenticated encryption scheme (TAE scheme) in which any t or more signers cooperate to produce a signature for a message and no one except the designated verifier can obtain the message from the ciphertext and verify the authenticity and integrity of the message. The scheme is based on elliptic curve cryptosystem. Moreover, the scheme applies a division-of-labour signature technique to reduce the load of every signer. In other words, every signer only needs to sign a message block assigned to it. Therefore, the (t, n) TAE scheme is more efficient than other AE schemes. However, some flaws of the scheme are found in this paper. Several security defects of the scheme are elaborated: (i) It suffers from conspiracy attack. (ii) It does not hold robustness. (iii) It is insecure against insider attacks. In addition, there exist some design defects in the TAE scheme. Some measures to remove these weaknesses are given in this paper.
暂无评论