Showing 1 - 10 of 31
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in...
Persistent link: https://www.econbiz.de/10010676146
This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how...
Persistent link: https://www.econbiz.de/10010816998
Based on quantum computation, a novel quantum block cryptographic algorithm that can be used to encrypt classical messages is proposed. The security of this algorithm is analyzed from several aspects. It is shown that the quantum block cryptographic algorithm, in which the key can be reused...
Persistent link: https://www.econbiz.de/10010874587
By combining quantum key with classical one, a novel block cryptographic algorithm that can be applied to encrypt qubits is presented. The security of the algorithm is analyzed from several aspects. It is shown that the qubit block encryption algorithm can prevent quantum attacking strategy as...
Persistent link: https://www.econbiz.de/10010871843
Cloud computing has been a hot topic in the research community since 2007. In cloud computing the online services are conducted to be pay as you use. Services need not to be in a long term contract with service providers. Service level agreements (SLAs) are agreements signed between a service...
Persistent link: https://www.econbiz.de/10009434855
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities involved. QuanTM, a QTM system, selectively combines elements from trust management and reputation management to create...
Persistent link: https://www.econbiz.de/10009439114
Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or...
Persistent link: https://www.econbiz.de/10009483535
The purpose of this research has been to explore the role of agent certification in the process of global sourcing. While some research has been done in the area of exporter-intermediary relationship, little has been done to study the importance of buyer-agent relationship and how the process of...
Persistent link: https://www.econbiz.de/10009431337
Trust is not only one key ingredient of prosperous organizations and societies, but also an essential factor in decision-making processes. And when it comes to trust, the latest advances in computing sciences area are increasingly supporting the related processes by deployment of so-called trust...
Persistent link: https://www.econbiz.de/10011011043
Раскрываются понятия имущественного комплекса предприятия, эффективное управление имущественным комплексом, анализируются подходы к определению...
Persistent link: https://www.econbiz.de/10011247176