首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms 介绍基于量子密码学的安全加解密算法
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.02
V. Padmavathi, B. Vardhan, A. V. Krishna
With the expansion in electronic communication, the significance of cryptography is apparently increasing every year. Encryption is a cryptography technique to send unintelligible information and decryption to restore the information. These techniques usually undergo difficulty with eavesdropping of plaintext and ciphertext. The conventional cryptography is vulnerable to attacks using high computational resources. Necessarily, an elegant concept of Quantum cryptography based on laws of quantum mechanics is introduced to offer secure and private communication. This paper gives a method for encryption and decryption using Toffoli quantum gate named as VBA Quantum Encryption and Decryption Algorithms. The incorporation of gate renders security which acts as a cumbersome to eavesdropping attack. Besides, a way to detect known plaintext, ciphertext only and chosen plaintext attack through public discussion is explained.
随着电子通信的发展,密码学的重要性逐年明显增加。加密是一种发送难以理解的信息和解密恢复信息的密码学技术。这些技术通常难以对明文和密文进行窃听。传统的密码学容易受到高计算资源的攻击。为了保证通信的安全性和私密性,必须引入基于量子力学定律的量子密码学概念。本文给出了一种利用Toffoli量子门进行加解密的方法——VBA量子加解密算法。门的加入使安全性提高,对窃听攻击起到了累人的作用。通过公开讨论,给出了一种检测已知明文、纯密文和选择明文攻击的方法。
{"title":"Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms","authors":"V. Padmavathi, B. Vardhan, A. V. Krishna","doi":"10.14257/IJSIA.2017.11.7.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.02","url":null,"abstract":"With the expansion in electronic communication, the significance of cryptography is apparently increasing every year. Encryption is a cryptography technique to send unintelligible information and decryption to restore the information. These techniques usually undergo difficulty with eavesdropping of plaintext and ciphertext. The conventional cryptography is vulnerable to attacks using high computational resources. Necessarily, an elegant concept of Quantum cryptography based on laws of quantum mechanics is introduced to offer secure and private communication. This paper gives a method for encryption and decryption using Toffoli quantum gate named as VBA Quantum Encryption and Decryption Algorithms. The incorporation of gate renders security which acts as a cumbersome to eavesdropping attack. Besides, a way to detect known plaintext, ciphertext only and chosen plaintext attack through public discussion is explained.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"17-24"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46454612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable and Enhanced Third Party Auditing in Cloud Server Data Storage 云服务器数据存储中可靠且增强的第三方审核
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.05
N. Nagar, U. Suman
Cloud computing provides a service based environment for data storage and resource sharing that are available to user through internet with on-demand basis. Thus, users can access their data across any geographical location at any time. Cloud environment also provides better scalability, flexibility, high performance, availability and less storage cost as compared to other physical storage of data. Maintaining data integrity and security in cloud environment is difficult especially, when the stored data is not completely reliable and trustworthy. However, the security of stored data is the major concerned for organizations and individual user to adopt cloud based environment. In this paper, we have proposed and enhanced the functionalities of third party auditor server to protect the availability and integrity of outsourced data in a cloud environment. The proposed approach uses the functionality such as, public verifiability, metadata generation, data dynamics, storage access point, encryption and decryption of data through RSA algorithm and IP range in case of private cloud. The proposed work also focuses on a solution to reliability, availability and integrity of data that are the major issues in the cloud adoption.
云计算为数据存储和资源共享提供了一个基于服务的环境,用户可以通过互联网按需获取这些数据和资源。因此,用户可以在任何时间、任何地理位置访问他们的数据。与其他物理数据存储相比,云环境还提供了更好的可伸缩性、灵活性、高性能、可用性和更低的存储成本。在云环境中维护数据的完整性和安全性是非常困难的,特别是当存储的数据不是完全可靠和可信的时候。然而,存储数据的安全性是组织和个人用户采用云环境的主要关注点。在本文中,我们提出并增强了第三方审计服务器的功能,以保护云环境中外包数据的可用性和完整性。在私有云环境下,该方法利用了公共可验证性、元数据生成、数据动态、存储接入点、通过RSA算法对数据进行加密和解密以及IP范围等功能。拟议的工作还侧重于解决数据的可靠性、可用性和完整性,这些都是采用云的主要问题。
{"title":"Reliable and Enhanced Third Party Auditing in Cloud Server Data Storage","authors":"N. Nagar, U. Suman","doi":"10.14257/IJSIA.2017.11.7.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.05","url":null,"abstract":"Cloud computing provides a service based environment for data storage and resource sharing that are available to user through internet with on-demand basis. Thus, users can access their data across any geographical location at any time. Cloud environment also provides better scalability, flexibility, high performance, availability and less storage cost as compared to other physical storage of data. Maintaining data integrity and security in cloud environment is difficult especially, when the stored data is not completely reliable and trustworthy. However, the security of stored data is the major concerned for organizations and individual user to adopt cloud based environment. In this paper, we have proposed and enhanced the functionalities of third party auditor server to protect the availability and integrity of outsourced data in a cloud environment. The proposed approach uses the functionality such as, public verifiability, metadata generation, data dynamics, storage access point, encryption and decryption of data through RSA algorithm and IP range in case of private cloud. The proposed work also focuses on a solution to reliability, availability and integrity of data that are the major issues in the cloud adoption.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"59-72"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43017764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Searchable Encryption Scheme in a Multi-user Setting for Cloud Storage 云存储多用户环境下的可搜索加密方案
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.04
Qingqing Gan, Xiaoming Wang
To support encrypted keyword queries on encrypted data and to access data in a multi-user setting for cloud storage, a searchable encryption scheme is proposed by combining Chinese Remainder Theorem with Public Encryption with Keyword Search. The proposed scheme enables data owners to outsource their encrypted data to the storage of cloud servers for a number of users, who are given the ability to generate valid queries and to access data without leaking any information. More importantly, the proposed scheme does not rely on shared keys to realize multi-user searchable encryption and user dynamics. Each authorized user in the proposed scheme has a unique key and can perform encrypted keyword queries on encrypted data as well as access data without knowledge of the keys of other users, such that when some users are added or removed, other users are unaffected. We prove that the proposed scheme is secure under Bilinear Diffie-Hellman and Hash Diffie-Hellman assumptions. The performance analysis shows that the proposed scheme has lower communication and storage overheads for both cloud servers and users than other existing schemes. In addition, the proposed scheme possesses features similar to that of most existing schemes in a single-user setting and does not downgrade because of supporting multiple users.
为了支持对加密数据进行加密关键字查询,以及在云存储的多用户环境下访问数据,提出了一种将中文剩余定理与公共加密与关键字搜索相结合的可搜索加密方案。所提出的方案使数据所有者能够将其加密数据外包给许多用户的云服务器存储,这些用户能够生成有效的查询并在不泄露任何信息的情况下访问数据。更重要的是,该方案不依赖于共享密钥来实现多用户可搜索加密和用户动态。在该方案中,每个授权用户都有一个唯一的密钥,可以对加密数据执行加密关键字查询,也可以在不知道其他用户密钥的情况下访问数据,这样当添加或删除一些用户时,其他用户不受影响。在双线性Diffie-Hellman和Hash Diffie-Hellman假设下证明了该方案的安全性。性能分析表明,与现有方案相比,该方案对云服务器和用户的通信和存储开销都较低。此外,该方案具有与大多数现有单用户方案相似的特性,并且不会因为支持多用户而降级。
{"title":"A Searchable Encryption Scheme in a Multi-user Setting for Cloud Storage","authors":"Qingqing Gan, Xiaoming Wang","doi":"10.14257/IJSIA.2017.11.7.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.04","url":null,"abstract":"To support encrypted keyword queries on encrypted data and to access data in a multi-user setting for cloud storage, a searchable encryption scheme is proposed by combining Chinese Remainder Theorem with Public Encryption with Keyword Search. The proposed scheme enables data owners to outsource their encrypted data to the storage of cloud servers for a number of users, who are given the ability to generate valid queries and to access data without leaking any information. More importantly, the proposed scheme does not rely on shared keys to realize multi-user searchable encryption and user dynamics. Each authorized user in the proposed scheme has a unique key and can perform encrypted keyword queries on encrypted data as well as access data without knowledge of the keys of other users, such that when some users are added or removed, other users are unaffected. We prove that the proposed scheme is secure under Bilinear Diffie-Hellman and Hash Diffie-Hellman assumptions. The performance analysis shows that the proposed scheme has lower communication and storage overheads for both cloud servers and users than other existing schemes. In addition, the proposed scheme possesses features similar to that of most existing schemes in a single-user setting and does not downgrade because of supporting multiple users.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"43-58"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45750289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking HTTPS Secure Search Service through Correlation Analysis of HTTP Webpages Accessed 通过访问HTTP网页的相关性分析攻击HTTPS安全搜索服务
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.03
Qian Liping, Wang Lidong
It is very common for Internet users to query a search engine when retrieving web information. Sensitive data about search engine user’s intentions or behavior can be inferred from his query phrases and the webpages he visits subsequently. In order to protect contents of communications from being eavesdropped, a search engine can adopt HTTPS-by-default to provide bidirectional encryption to protect its users’ privacy. Since the majority of webpages indexed in search engine’s results pages are still on HTTP-enabled websites and the contents of these webpages can be observed by attackers once the user click on the indexed web-links. We propose a novel approach for attacking secure search through correlating analysis of encrypted search with unencrypted webpages the user visits subsequently. We show that a simple weighted TF-DF mechanism is sufficient for selecting guessing phrase candidates. Imitating search engine users, by querying these candidates and enumerating webpages indexed in results pages, we can hit the definite query phrases and meanwhile reconstruct user’s web-surfing trails through DNS-based URLs comparison and flow feature statistics-based network traffic analysis. In the experiment including 180 Chinese and English search phrases, we achieved 67.78% hit rate at first guess and 96.11% hit rate within three guesses. Our empirical research shows that HTTPS traffic can be correlated and de-anonymized through HTTP traffic and secure search of search engine is not always secure unless HTTPS-by-default enabled everywhere.
互联网用户在检索网络信息时查询搜索引擎是非常常见的。关于搜索引擎用户意图或行为的敏感数据可以从他的查询短语和他随后访问的网页中推断出来。为了保护通信内容不被窃听,搜索引擎可以默认采用HTTPS来提供双向加密,以保护用户的隐私。由于搜索引擎结果页面中索引的大多数网页仍在启用HTTP的网站上,一旦用户单击索引的网页链接,攻击者就可以观察到这些网页的内容。我们提出了一种攻击安全搜索的新方法,通过将加密搜索与用户随后访问的未加密网页进行关联分析。我们证明了一个简单的加权TF-DF机制足以选择猜测短语候选者。模仿搜索引擎用户,通过查询这些候选者并枚举结果页面中索引的网页,我们可以命中确定的查询短语,同时通过基于DNS的URL比较和基于流量特征统计的网络流量分析来重建用户的网络浏览轨迹。在包含180个中英文搜索短语的实验中,我们获得了67.78%的第一次猜测命中率和96.11%的三次猜测命中度。我们的实证研究表明,HTTPS流量可以通过HTTP流量进行关联和去匿名化,除非在所有地方默认启用HTTPS,否则搜索引擎的安全搜索并不总是安全的。
{"title":"Attacking HTTPS Secure Search Service through Correlation Analysis of HTTP Webpages Accessed","authors":"Qian Liping, Wang Lidong","doi":"10.14257/IJSIA.2017.11.7.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.03","url":null,"abstract":"It is very common for Internet users to query a search engine when retrieving web information. Sensitive data about search engine user’s intentions or behavior can be inferred from his query phrases and the webpages he visits subsequently. In order to protect contents of communications from being eavesdropped, a search engine can adopt HTTPS-by-default to provide bidirectional encryption to protect its users’ privacy. Since the majority of webpages indexed in search engine’s results pages are still on HTTP-enabled websites and the contents of these webpages can be observed by attackers once the user click on the indexed web-links. We propose a novel approach for attacking secure search through correlating analysis of encrypted search with unencrypted webpages the user visits subsequently. We show that a simple weighted TF-DF mechanism is sufficient for selecting guessing phrase candidates. Imitating search engine users, by querying these candidates and enumerating webpages indexed in results pages, we can hit the definite query phrases and meanwhile reconstruct user’s web-surfing trails through DNS-based URLs comparison and flow feature statistics-based network traffic analysis. In the experiment including 180 Chinese and English search phrases, we achieved 67.78% hit rate at first guess and 96.11% hit rate within three guesses. Our empirical research shows that HTTPS traffic can be correlated and de-anonymized through HTTP traffic and secure search of search engine is not always secure unless HTTPS-by-default enabled everywhere.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"25-42"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45198639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Region-based Active Contour Segmentation Model with Local Discriminant Criterion 基于局部判别准则的区域主动轮廓分割模型
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.06
F. Zhao, H. Liang, X. L. Wu, D. Ding
This paper presents a novel region-based active contour model for image segmentation in a variational level set formulation. We define a local discriminant criterion on the basis of the global and local region-based active contour model. The objective function in this model is thereafter minimized via level set method. By introducing the local discriminant criterion to separate background and foreground in local regions, our model not only achieves accurate segmentation results, but also is robust to initialization. Extensive experiments are reported to demonstrate that our method holds higher segmentation accuracy and more initialization robustness, compared with the global region-based and local region-based methods. Experimental results for synthetic images and real medical images show desirable performances of our method.
本文提出了一种新的基于区域的活动轮廓模型,用于变分水平集公式中的图像分割。我们在基于全局和局部区域的活动轮廓模型的基础上定义了一个局部判别准则。该模型中的目标函数随后通过水平集方法最小化。通过引入局部判别准则来分离局部区域中的背景和前景,我们的模型不仅获得了准确的分割结果,而且对初始化具有鲁棒性。大量实验表明,与基于全局区域和基于局部区域的方法相比,该方法具有更高的分割精度和更强的初始化鲁棒性。合成图像和真实医学图像的实验结果表明,我们的方法具有良好的性能。
{"title":"Region-based Active Contour Segmentation Model with Local Discriminant Criterion","authors":"F. Zhao, H. Liang, X. L. Wu, D. Ding","doi":"10.14257/IJSIA.2017.11.7.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.06","url":null,"abstract":"This paper presents a novel region-based active contour model for image segmentation in a variational level set formulation. We define a local discriminant criterion on the basis of the global and local region-based active contour model. The objective function in this model is thereafter minimized via level set method. By introducing the local discriminant criterion to separate background and foreground in local regions, our model not only achieves accurate segmentation results, but also is robust to initialization. Extensive experiments are reported to demonstrate that our method holds higher segmentation accuracy and more initialization robustness, compared with the global region-based and local region-based methods. Experimental results for synthetic images and real medical images show desirable performances of our method.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"73-86"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47911503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MIRBAC: A Role-Based Access Control Model for Multi-Domain Interoperability MIRBAC:一种基于角色的多域互操作访问控制模型
Pub Date : 2017-06-30 DOI: 10.14257/IJSIA.2017.11.6.01
Ting Cai, J. Wang
How to achieve both cross-domain authorization and access control in a multi-domain environment and ensuring local autonomy and security are hot research field of network security. Due to the centralized management, traditional access control has been unable to meet the security needs of cross-domain interoperability under a distributed environment. In this article, we introduce three types of inter-domain role relations, such as transitive mapping, non-transitive mapping and restricted access, extend the standard single-domain RBAC model to a multi-domain interoperable environment, and establish a role-based access control model based on multi-domain interoperability (MIRBAC). Compared with the prior studies, MIRBAC model supports separation of duties constraint under multi-domain environments, the security and management flexibility of interdomain authorization is greatly improved. Moreover, based on MIRBAC model, we further research detection method of security violation during interoperability, propose a complete security conflict detection algorithm according to various conflict types caused by implementing interoperability activities, and conduct computational complexity analysis and case analysis of our proposed algorithm. Finally, we develop a prototype system based on the definitions of our proposed model to conduct experimental studies to demonstrate the feasibility and performance of our approach.
如何在多域环境下实现跨域授权和访问控制,保证局部自治和安全是网络安全研究的热点。传统的访问控制由于集中管理,已经不能满足分布式环境下跨域互操作的安全需求。本文引入了传递映射、非传递映射和受限访问三种域间角色关系,将标准的单域RBAC模型扩展到多域互操作环境,建立了基于角色的多域互操作访问控制模型(MIRBAC)。与前人研究相比,MIRBAC模型支持多域环境下的职责分离约束,大大提高了跨域授权的安全性和管理灵活性。此外,基于MIRBAC模型,我们进一步研究了互操作过程中安全冲突的检测方法,根据实现互操作活动所产生的各种冲突类型,提出了完整的安全冲突检测算法,并对我们提出的算法进行了计算复杂度分析和案例分析。最后,我们根据我们提出的模型的定义开发了一个原型系统来进行实验研究,以证明我们的方法的可行性和性能。
{"title":"MIRBAC: A Role-Based Access Control Model for Multi-Domain Interoperability","authors":"Ting Cai, J. Wang","doi":"10.14257/IJSIA.2017.11.6.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.6.01","url":null,"abstract":"How to achieve both cross-domain authorization and access control in a multi-domain environment and ensuring local autonomy and security are hot research field of network security. Due to the centralized management, traditional access control has been unable to meet the security needs of cross-domain interoperability under a distributed environment. In this article, we introduce three types of inter-domain role relations, such as transitive mapping, non-transitive mapping and restricted access, extend the standard single-domain RBAC model to a multi-domain interoperable environment, and establish a role-based access control model based on multi-domain interoperability (MIRBAC). Compared with the prior studies, MIRBAC model supports separation of duties constraint under multi-domain environments, the security and management flexibility of interdomain authorization is greatly improved. Moreover, based on MIRBAC model, we further research detection method of security violation during interoperability, propose a complete security conflict detection algorithm according to various conflict types caused by implementing interoperability activities, and conduct computational complexity analysis and case analysis of our proposed algorithm. Finally, we develop a prototype system based on the definitions of our proposed model to conduct experimental studies to demonstrate the feasibility and performance of our approach.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45342525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Credit Risk Rating System of Small Enterprises Based on the Index Importance 基于指标重要性的小企业信用风险评级体系
Pub Date : 2017-06-30 DOI: 10.14257/IJSIA.2017.11.6.04
Chi Guo-tai, Zhao Zhichong, Mohammad Zoynul Abedin
The main criteria to establish the credit risk evaluation index system is the indicators default identification ability. There is mutual influence between indices, a single index which has the default identification ability, but if put this indicator into the index system, and it will no longer have the default identification ability because of the impact of other indicators. This study therefore deletes the indicators of repeated information using colinearity diagnostics, and determines the order of indicators into the index evaluation system by calculating the score statistic of every indicator. We established credit risk evaluation index system of small businesses, including 14 indicators, such as cash ratio, the corporate credit situation nearly 3 years, by extracting the related data of 28 regional commercial bank branches of China, and the judgment accuracy of default and non default samples is 99.0%.
建立信用风险评价指标体系的主要依据是指标的违约识别能力。指标之间存在着相互影响,单个指标具有默认识别能力,但如果将该指标纳入指标体系,就会因为其他指标的影响而不再具有默认识别能力。因此,本研究采用共线性诊断剔除重复信息的指标,并通过计算各指标的得分统计量来确定指标进入指标评价体系的顺序。我们通过提取中国28家区域性商业银行分行的相关数据,建立了小企业信用风险评价指标体系,包括现金比率、近3年企业信用状况等14个指标,违约和非违约样本的判断准确率为99.0%。
{"title":"Credit Risk Rating System of Small Enterprises Based on the Index Importance","authors":"Chi Guo-tai, Zhao Zhichong, Mohammad Zoynul Abedin","doi":"10.14257/IJSIA.2017.11.6.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.6.04","url":null,"abstract":"The main criteria to establish the credit risk evaluation index system is the indicators default identification ability. There is mutual influence between indices, a single index which has the default identification ability, but if put this indicator into the index system, and it will no longer have the default identification ability because of the impact of other indicators. This study therefore deletes the indicators of repeated information using colinearity diagnostics, and determines the order of indicators into the index evaluation system by calculating the score statistic of every indicator. We established credit risk evaluation index system of small businesses, including 14 indicators, such as cash ratio, the corporate credit situation nearly 3 years, by extracting the related data of 28 regional commercial bank branches of China, and the judgment accuracy of default and non default samples is 99.0%.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"52 1","pages":"35-52"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67048481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data Warehouse Signature: High Performance Evaluation for Implementing Security Issues in Data Warehouses through a New Framework 数据仓库签名:通过新框架实现数据仓库安全问题的高性能评估
Pub Date : 2017-06-30 DOI: 10.14257/IJSIA.2017.11.6.05
Mayada J. AlMeghari
In this globalized world, the Internet services and uses are growing exponentially. Hence, the data stores contain a huge amount of business data used for decision-making and for financial analysis at sensitive organizations called Data Warehouses (DWs). DW is necessary for financial and business information making them an attractive purpose for hackers. The achievement of security issues in DW is very important for a proper and secure continuation of DW system work. This paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS), which is distributed in two models: DWSend model and DWReceive model. The DWS framework solves one of the common security problems such as unavailability in network by using parallel computing through a middleware named View Manager Layer (VML). This framework ensures the security issues, such as Confidentiality, Integrity, and Availability (CIA) and it also reaches high performance in Average Execution Time (AET) evaluated in experimental studies. The execution of a large query result as blocks of a number of records in parallel computing saves more time than serial computing. The high performance has a limited increase in executor's numbers because there are time complexity factors, such as transmission time, separation and collection time. This paper presents a mathematical model used when the organization applies the DWS framework in DW systems to get the adequate number of executors joined in VML middleware to reach the high performance.
在这个全球化的世界里,互联网的服务和使用呈指数级增长。因此,数据存储包含大量的业务数据,这些业务数据被称为数据仓库(data warehouse, dw),用于敏感组织的决策和财务分析。DW对于金融和商业信息是必需的,这使它们成为黑客的一个有吸引力的目的。数据仓库安全问题的解决对于数据仓库系统正常、安全地继续工作至关重要。本文提出了一种新的数据仓库安全问题实现框架——数据仓库签名(DWs),该框架分为两个模型:DWSend模型和DWReceive模型。DWS框架通过名为视图管理层(View Manager Layer, VML)的中间件使用并行计算,解决了网络不可用等常见安全问题之一。该框架确保了机密性、完整性和可用性(CIA)等安全问题,并且在实验研究中评估的平均执行时间(AET)方面也达到了高性能。在并行计算中,将大型查询结果作为大量记录的块来执行比串行计算节省更多的时间。由于存在时间复杂性因素,例如传输时间、分离时间和收集时间,高性能对执行器数量的增加有限。本文给出了组织在数据仓库系统中应用DWS框架以获得足够数量的执行器加入到VML中间件中以达到高性能的数学模型。
{"title":"Data Warehouse Signature: High Performance Evaluation for Implementing Security Issues in Data Warehouses through a New Framework","authors":"Mayada J. AlMeghari","doi":"10.14257/IJSIA.2017.11.6.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.6.05","url":null,"abstract":"In this globalized world, the Internet services and uses are growing exponentially. Hence, the data stores contain a huge amount of business data used for decision-making and for financial analysis at sensitive organizations called Data Warehouses (DWs). DW is necessary for financial and business information making them an attractive purpose for hackers. The achievement of security issues in DW is very important for a proper and secure continuation of DW system work. This paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS), which is distributed in two models: DWSend model and DWReceive model. The DWS framework solves one of the common security problems such as unavailability in network by using parallel computing through a middleware named View Manager Layer (VML). This framework ensures the security issues, such as Confidentiality, Integrity, and Availability (CIA) and it also reaches high performance in Average Execution Time (AET) evaluated in experimental studies. The execution of a large query result as blocks of a number of records in parallel computing saves more time than serial computing. The high performance has a limited increase in executor's numbers because there are time complexity factors, such as transmission time, separation and collection time. This paper presents a mathematical model used when the organization applies the DWS framework in DW systems to get the adequate number of executors joined in VML middleware to reach the high performance.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"53-68"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45270983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation Research on Emergency Capability of Emergent Events in Chinses Coal Mine 中国煤矿突发事件应急能力评价研究
Pub Date : 2017-06-30 DOI: 10.14257/IJSIA.2017.11.6.02
Cheng Miao, Liyan Sun, Li Yang
The frequent occurrence of coal mine emergent events caused great impact on the social order and economic stability. In order to effectively prevent the occurrence of coal mine emergent events, it is necessary to focus on upgrading the level of emergency capability. This paper proposes the evaluation model of emergency capability of coal mine emergent events by the multistage fuzzy quality synthetic evaluation method. The evaluation weights are determined by AHP, the multistage fuzzy comprehensive appraisal on emergency capability is made by the fuzzy mathematics method, the rank status of emergency capability of coal mine emergent events is determined according to the empirical analysis results. Finally, an empirical analysis is made, the results of first grade fuzzy comprehensive evaluation show that emergency rescue capability is good and others are general, the results of second grade show that coal enterprises emergency capability is general, the average score is 74.445 less than 80 which indicates that the overall situation of emergency capability of coal mine emergent events is general.
煤矿突发事件的频繁发生对社会秩序和经济稳定造成了极大的影响。为了有效防止煤矿突发事件的发生,必须注重提高应急能力水平。采用多阶段模糊质量综合评价方法,提出了煤矿突发事件应急能力的评价模型。采用层次分析法确定评价权重,采用模糊数学方法对应急能力进行多阶段模糊综合评价,根据实证分析结果确定煤矿突发事件应急能力的等级地位。最后进行实证分析,一级模糊综合评价结果显示应急救援能力较好,其他一般,二级模糊综合评价结果显示煤炭企业应急能力一般,平均得分为74.445分,小于80分,说明煤矿突发事件应急能力总体情况一般。
{"title":"Evaluation Research on Emergency Capability of Emergent Events in Chinses Coal Mine","authors":"Cheng Miao, Liyan Sun, Li Yang","doi":"10.14257/IJSIA.2017.11.6.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.6.02","url":null,"abstract":"The frequent occurrence of coal mine emergent events caused great impact on the social order and economic stability. In order to effectively prevent the occurrence of coal mine emergent events, it is necessary to focus on upgrading the level of emergency capability. This paper proposes the evaluation model of emergency capability of coal mine emergent events by the multistage fuzzy quality synthetic evaluation method. The evaluation weights are determined by AHP, the multistage fuzzy comprehensive appraisal on emergency capability is made by the fuzzy mathematics method, the rank status of emergency capability of coal mine emergent events is determined according to the empirical analysis results. Finally, an empirical analysis is made, the results of first grade fuzzy comprehensive evaluation show that emergency rescue capability is good and others are general, the results of second grade show that coal enterprises emergency capability is general, the average score is 74.445 less than 80 which indicates that the overall situation of emergency capability of coal mine emergent events is general.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"19-26"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42621860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of String Matching Algorithms and Recent Implementations using GPU 回顾字符串匹配算法和最近在GPU上的实现
Pub Date : 2017-06-30 DOI: 10.14257/IJSIA.2017.11.6.06
Rolando Ramos-Frías, Miguel Vargas-Lombardo
String matching algorithms are an important element used in several computer sciencebb fields. These algorithms process strings of characters to find coincidences. The amountof processing required for modern applications that use string matching algorithms hasincreased over the years and new algorithms and solutions have been developed. In thispaper we present a state of the art for the various types of string matching algorithms;and also review recent implementations done in GPU.
字符串匹配算法是计算机科学领域中使用的一个重要元素。这些算法处理字符串以找到巧合。多年来,使用字符串匹配算法的现代应用程序所需的处理数量不断增加,并开发了新的算法和解决方案。在本文中,我们介绍了各种类型的字符串匹配算法的最新技术;并且还回顾了最近在GPU中完成的实现。
{"title":"A Review of String Matching Algorithms and Recent Implementations using GPU","authors":"Rolando Ramos-Frías, Miguel Vargas-Lombardo","doi":"10.14257/IJSIA.2017.11.6.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.6.06","url":null,"abstract":"String matching algorithms are an important element used in several computer science\u0000bb fields. These algorithms process strings of characters to find coincidences. The amount\u0000of processing required for modern applications that use string matching algorithms has\u0000increased over the years and new algorithms and solutions have been developed. In this\u0000paper we present a state of the art for the various types of string matching algorithms;\u0000and also review recent implementations done in GPU.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":"11 1","pages":"69-76"},"PeriodicalIF":0.0,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48695436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1