Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems

    Jinxin Zuo1,2, Yueming Lu1,2,*, Hui Gao2,3, Tong Peng1,2, Ziyv Guo2,3, Tong An1,2, Enjie Liu4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2579-2595, 2021, DOI:10.32604/cmc.2021.016623

    Abstract With the skyrocketing development of technologies, there are many issues in information security quantitative evaluation (ISQE) of complex heterogeneous information systems (CHISs). The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently. In this paper, we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process. The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively. Firstly, with the support of asset More >

  • Open Access

    ARTICLE

    HealthyBlockchain for Global Patients

    Shada A. Alsalamah1,2,3,*, Hessah A. Alsalamah1,4, Thamer Nouh5, Sara A. Alsalamah6

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2431-2449, 2021, DOI:10.32604/cmc.2021.016618

    Abstract An emerging healthcare delivery model is enabling a new era of clinical care based on well-informed decision-making processes. Current healthcare information systems (HISs) fall short of adopting this model due to a conflict between information security needed to implement the new model and those already enforced locally to support traditional care models. Meanwhile, in recent times, the healthcare sector has shown a substantial interest in the potential of using blockchain technology for providing quality care to patients. No blockchain solution proposed so far has fully addressed emerging cross-organization information-sharing needs in healthcare. In this paper, More >

  • Open Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293

    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images… More >

  • Open Access

    ARTICLE

    A Novel Approach to Steganography: Enhanced Least Significant Bit Substitution Algorithm Integrated with Self-Determining Encryption Feature

    Resul Das1,∗, Muhammet Baykara1, Gurkan Tuna2

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 23-32, 2019, DOI:10.32604/csse.2019.34.023

    Abstract One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice… More >

  • Open Access

    ARTICLE

    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management,… More >

  • Open Access

    ARTICLE

    Enhancing Embedding-Based Chinese Word Similarity Evaluation with Concepts and Synonyms Knowledge

    Fulian Yin, Yanyan Wang, Jianbo Liu*, Meiqi Ji

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 747-764, 2020, DOI:10.32604/cmes.2020.010579

    Abstract Word similarity (WS) is a fundamental and critical task in natural language processing. Existing approaches to WS are mainly to calculate the similarity or relatedness of word pairs based on word embedding obtained by massive and high-quality corpus. However, it may suffer from poor performance for insuf- ficient corpus in some specific fields, and cannot capture rich semantic and sentimental information. To address these above problems, we propose an enhancing embedding-based word similarity evaluation with character-word concepts and synonyms knowledge, namely EWS-CS model, which can provide extra semantic information to enhance word similarity evaluation. The More >

  • Open Access

    ARTICLE

    The Development of Proxy Re-Encryption

    Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4

    Journal of Cyber Security, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jcs.2020.05878

    Abstract With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss More >

  • Open Access

    ARTICLE

    A Hybrid Method of Coreference Resolution in Information Security

    Yongjin Hu1, Yuanbo Guo1, Junxiu Liu2, Han Zhang3, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1297-1315, 2020, DOI:10.32604/cmc.2020.010855

    Abstract In the field of information security, a gap exists in the study of coreference resolution of entities. A hybrid method is proposed to solve the problem of coreference resolution in information security. The work consists of two parts: the first extracts all candidates (including noun phrases, pronouns, entities, and nested phrases) from a given document and classifies them; the second is coreference resolution of the selected candidates. In the first part, a method combining rules with a deep learning model (Dictionary BiLSTM-Attention-CRF, or DBAC) is proposed to extract all candidates in the text and classify… More >

  • Open Access

    ARTICLE

    Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography

    Sahib Khan1, *, Arslan Arif1, Syed Tahir Hussain Rizvi2, Nasir Ahmad3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.1, pp. 1-16, 2018, DOI:10.31614/cmes.2018.04141

    Abstract Cryptography and steganography are two important and related fields of infor- mation security. But, steganography is slightly different in the sense that it hides the ex- istence of secret information from unauthorized users. It is one of the most appealing research domains, have applications like copyright protection, data integrity protection and manipulation detection. Several steganography techniques have been proposed in literature. But, in this work a new information hiding algorithm is presented. The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for… More >

  • Open Access

    ARTICLE

    Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data

    Guangyong Yang1,*, Mengke Yang2,*, Shafaq Salam3, Jianqiu Zeng4

    Journal of Cyber Security, Vol.1, No.1, pp. 19-28, 2019, DOI:10.32604/jcs.2019.05947

    Abstract Big data is becoming increasingly important because of the enormous information generation and storage in recent years. It has become a challenge to the data mining technique and management. Based on the characteristics of geometric explosion of information in the era of big data, this paper studies the possible approaches to balance the maximum value and privacy of information, and disposes the Nine-Cells information matrix, hierarchical classification. Furthermore, the paper uses the rough sets theory to proceed from the two dimensions of value and privacy, establishes information classification method, puts forward the countermeasures for information More >

Displaying 31-40 on page 4 of 45. Per Page