信息安全(英文)最新文献

筛选
英文 中文
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility 度量DoS攻击对可用性的影响:基于可访问性的实证研究
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132004
Suhail Qadir, Uzair Bashir
{"title":"Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility","authors":"Suhail Qadir, Uzair Bashir","doi":"10.4236/jis.2022.132004","DOIUrl":"https://doi.org/10.4236/jis.2022.132004","url":null,"abstract":"Information Security is determined by three well know security parameters i.e. Confidentiality, Integrity and Availability. Availability is an important pillar when it comes to security of an information system. It is dependent upon the reliability, timeliness and accessibility of the Information System. This paper presents an analytical view of the fact that when Accessibility is degraded during the presence of an ongoing attack, the other factors reliability and timeliness can also get affected, therefore creating a degrading impact on the overall Availability of the system, which eventually leads to the Denial of Service Attack and therefore affecting the security of the System.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture 一种保护隐私的基于身份的加密体系结构的安全性分析
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134018
C. Adams
{"title":"Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture","authors":"C. Adams","doi":"10.4236/jis.2022.134018","DOIUrl":"https://doi.org/10.4236/jis.2022.134018","url":null,"abstract":"Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple random-ly-chosen entities to complete certain tasks. The main result and primary contri-bution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion oppor-tunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction ap-pears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT) 与电脑保安事故应变小组(CSIRT)合作处理电子贸易网络攻击的知识管理策略
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134016
Fauziyah Fauziyah, Zhao Wang, Gabriel Joy
{"title":"Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)","authors":"Fauziyah Fauziyah, Zhao Wang, Gabriel Joy","doi":"10.4236/jis.2022.134016","DOIUrl":"https://doi.org/10.4236/jis.2022.134016","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments 政府机构和部门共享非机密网络威胁情报的经济学
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133006
J. Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
{"title":"The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments","authors":"J. Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou","doi":"10.4236/jis.2022.133006","DOIUrl":"https://doi.org/10.4236/jis.2022.133006","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Authoritative and Unbiased Responses to Geographic Queries 对地理查询的权威和公正的回应
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133007
M. Ramkumar, Naresh Adhikari
{"title":"Authoritative and Unbiased Responses to Geographic Queries","authors":"M. Ramkumar, Naresh Adhikari","doi":"10.4236/jis.2022.133007","DOIUrl":"https://doi.org/10.4236/jis.2022.133007","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the LWE Cryptosystem with More General Disturbance 具有更一般扰动的LWE密码系统
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133008
Zhiyong Zheng, Kun Tian
{"title":"On the LWE Cryptosystem with More General Disturbance","authors":"Zhiyong Zheng, Kun Tian","doi":"10.4236/jis.2022.133008","DOIUrl":"https://doi.org/10.4236/jis.2022.133008","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis 蜜罐攻击数据分析中图形可视化方法的系统综述
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134012
Gbenga Ikuomenisan, Y. Morgan
{"title":"Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis","authors":"Gbenga Ikuomenisan, Y. Morgan","doi":"10.4236/jis.2022.134012","DOIUrl":"https://doi.org/10.4236/jis.2022.134012","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Density Parity-Check Codes: Research Status and Development Direction 低密度奇偶校验码:研究现状与发展方向
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134014
Jie Xu, Zhiyong Zheng, Kun Tian
{"title":"Low-Density Parity-Check Codes: Research Status and Development Direction","authors":"Jie Xu, Zhiyong Zheng, Kun Tian","doi":"10.4236/jis.2022.134014","DOIUrl":"https://doi.org/10.4236/jis.2022.134014","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration 信息系统不稳定性与公共行政安全风险研究——以布基纳法索公共行政为例
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132005
Yanogo Kiswendsida Jean Hermann
{"title":"Study on the Instability of Information Systems and Security Risks in the Public Administration: Case of Burkina Faso Public Administration","authors":"Yanogo Kiswendsida Jean Hermann","doi":"10.4236/jis.2022.132005","DOIUrl":"https://doi.org/10.4236/jis.2022.132005","url":null,"abstract":"The purpose of this research is to show the instability and the security risks of the information system in Burkina-Faso public administration. In this paper, witnessing unsatisfactory services such as government messaging (mailer.gov.bf) as well as G-cloud services which are the government cloud were studied. The behavior of user agents on the administration’s IT infra-structures which could expose the information system to security risks was also studied. The expected result shows evidence of the weakness of the public administration information system and provides some recommenda-tion.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice 基于理想格的NTRUEncrypt -密码系统的推广
信息安全(英文) Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.133010
Zhiyong Zheng, Fengxia Liu, Wen-Tzeng Huang, Jie Xu, Kun Tian
{"title":"A Generalization of NTRUEncrypt —Cryptosystem Based on Ideal Lattice","authors":"Zhiyong Zheng, Fengxia Liu, Wen-Tzeng Huang, Jie Xu, Kun Tian","doi":"10.4236/jis.2022.133010","DOIUrl":"https://doi.org/10.4236/jis.2022.133010","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信