System Security
780 Followers
Recent papers in System Security
The recently introduced Galois/Counter Mode (GCM) of op- eration for block ciphers provides both encryption and message authenti- cation, using universal hashing based on multiplication in a binary finite field. We analyze its security... more
This paper presents the design and implementation of a new PKI-based electronic document protection system named EDPro (Electronic Document Protection management system). We first present the highlights of EDPro system; then introduce the... more
Corporate adoption of new server virtualization technologies offered by VMWare, Microsoft, the open source community (Xen) and others raises both new opportunities and new risks for system security. Security issues of virtualization have... more
Online Examination System is the most important component of E-Education because of the security issues. Cheating-free is the main challenge that faces the online examination system versus the traditional paper and pencil exams. This... more
The TCP/IP protocol suite is known to be lacking security in many aspects, which may allow an attacker to leverage them using some techniques in the form of covert communications. Secret messages could be embedded into one of the TCP/IP... more
What are the relative advantages and disadvantages of bank-based financial systems (as in Germany and Japan) and market-based financial systems (as in England and the United States). Does financial structure matter? In bank-based systems... more
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of... more
Security awareness is very essential in securing intellectual property, in particular internal corporate information assets and its “Knowledge”. The dynamic nature of security attacks and the need to comply with government policies in... more
In 2005, the University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP seeks to close the gap between the current corporate... more
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of... more
In the networked economy, strategic partnerships and collaboration are an important way to develop and maintain competitive advantages. At the same time, enterprises also need to reduce costs, increase revenues and seize new business... more
The successful initiation and execution of a virtual team is gaining increasing attention in the design and construction community. From opportunities to integrate international and multidisciplinary teams to the opportunity to leverage... more