Showing 1 - 10 of 31
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in...
Persistent link: https://www.econbiz.de/10010676146
This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how...
Persistent link: https://www.econbiz.de/10010816998
By combining quantum key with classical one, a novel block cryptographic algorithm that can be applied to encrypt qubits is presented. The security of the algorithm is analyzed from several aspects. It is shown that the qubit block encryption algorithm can prevent quantum attacking strategy as...
Persistent link: https://www.econbiz.de/10010871843
Based on quantum computation, a novel quantum block cryptographic algorithm that can be used to encrypt classical messages is proposed. The security of this algorithm is analyzed from several aspects. It is shown that the quantum block cryptographic algorithm, in which the key can be reused...
Persistent link: https://www.econbiz.de/10010874587
The purpose of this research has been to explore the role of agent certification in the process of global sourcing. While some research has been done in the area of exporter-intermediary relationship, little has been done to study the importance of buyer-agent relationship and how the process of...
Persistent link: https://www.econbiz.de/10009431337
Cloud computing has been a hot topic in the research community since 2007. In cloud computing the online services are conducted to be pay as you use. Services need not to be in a long term contract with service providers. Service level agreements (SLAs) are agreements signed between a service...
Persistent link: https://www.econbiz.de/10009434855
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities involved. QuanTM, a QTM system, selectively combines elements from trust management and reputation management to create...
Persistent link: https://www.econbiz.de/10009439114
Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or...
Persistent link: https://www.econbiz.de/10009483535
At the beginning of the XXI century, human societies are entering a period of "late modernity" characterized by new forms of trust and risk, untransparent social situations and economic, political and cultural globalization. These processes are associated with the presence of abstract systems...
Persistent link: https://www.econbiz.de/10011163533
The financial market is one of the most important elements of the economic system of the state. Improving the efficiency of redistribution through this market temporarily free funds is one of the main goals of its development. Redistribution is carried out by intermediaries, which from the point...
Persistent link: https://www.econbiz.de/10010779553