Application of Uncertain Reasoning in the Security Evaluation of Government Websites

2021 ◽  
Author(s):  
Yueliang Zhang ◽  
Junyu Wu ◽  
Shibin Zhang ◽  
Danchen Wang ◽  
Xin Shen
Author(s):  
Jin HOKI ◽  
Kosei SAKAMOTO ◽  
Fukang LIU ◽  
Kazuhiko MINEMATSU ◽  
Takanori ISOBE

2018 ◽  
Author(s):  
Tuba Kiyan ◽  
Heiko Lohrke ◽  
Christian Boit

Abstract This paper compares the three major semi-invasive optical approaches, Photon Emission (PE), Thermal Laser Stimulation (TLS) and Electro-Optical Frequency Mapping (EOFM) for contactless static random access memory (SRAM) content read-out on a commercial microcontroller. Advantages and disadvantages of these techniques are evaluated by applying those techniques on a 1 KB SRAM in an MSP430 microcontroller. It is demonstrated that successful read out depends strongly on the core voltage parameters for each technique. For PE, better SNR and shorter integration time are to be achieved by using the highest nominal core voltage. In TLS measurements, the core voltage needs to be externally applied via a current amplifier with a bias voltage slightly above nominal. EOFM can use nominal core voltages again; however, a modulation needs to be applied. The amplitude of the modulated supply voltage signal has a strong effect on the quality of the signal. Semi-invasive read out of the memory content is necessary in order to remotely understand the organization of memory, which finds applications in hardware and software security evaluation, reverse engineering, defect localization, failure analysis, chip testing and debugging.


2010 ◽  
Vol 12 (2) ◽  
pp. 301-308 ◽  
Author(s):  
Caige SUN ◽  
Kaiwen ZHONG ◽  
Xulong LIU ◽  
Liang XIE

Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Author(s):  
Imam Riadi ◽  
Iwan Tti Riyadi Yanto ◽  
Eko Handoyo

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.


2016 ◽  
Vol 4 (2) ◽  
pp. 1-9
Author(s):  
Lincy Joseph ◽  
Mathew George ◽  
Kalpesh K Malaviya ◽  
Kalpesh K Malaviya ◽  
Bincy K Chacko ◽  
...  

This aims to compare the generic drug approval and registration process in the regulatory market of Europe, USA andBrazil. Based on the information collected from various sources such as regulatory sites, Government websites,discussion with regulatory agent, interviewing pharma professionals and literature survey from various journals, aclear picture on the generic drug approval and registration process of each country was drawn. The differentauthorities’ viz. European Medicines Evaluation Agency (EMEA) of Europe, Food Drug Administration (FDA) ofUSA and National Health Surveillance Agency (ANVISA) of Brazil carried out the generic drug approval andregistration process in the respective countries. After analysing the various requirements for the generic drug approvalin the above stated countries, it was concluded that the regulatory guidelines of Europe and Brazil was not welldefined. But FDA gives very much well defined requirements. 


Sign in / Sign up

Export Citation Format

Share Document