Dynamic Trust Model of Internet-Ware Based on Task Classification

2012 ◽  
Vol 155-156 ◽  
pp. 221-225 ◽  
Author(s):  
Gui Sheng Yin ◽  
Shu Yin Wang

with the Internet popularity and the widely application of information storage technology, people pay more and more attention on the information security. Trust model is the hot spot of present information security field. It is connected with the safety interaction and operation of the entire system. Internet has the characteristic of openness, anonymity, and autonomy. All these extrude the security problems. How to build the safety and reliable trust model is the most reliable approach to solve the network security problems. Trusted computing is the core center of trust model. Through the trusted computing, we will get the perfect security design.

2019 ◽  
Vol 16 (7) ◽  
pp. 174-194 ◽  
Author(s):  
Weijin Jiang ◽  
Yang Wang ◽  
Yirong Jiang ◽  
Jiahui Chen ◽  
Yuhui Xu ◽  
...  

2021 ◽  
pp. 648-658
Author(s):  
Yoko Nitta

This chapter studies how the significant cyberattacks perpetrated against the Japan Pension Services (JPS) served to heighten awareness of the significance of cyber threats among political and corporate executives. According to the Japanese cybersecurity strategy, cyberattacks constitute a global risk and remain a prime concern for the development of appropriate countermeasures. As a result, Japan has regarded the strengthening of cybersecurity as a priority and outlined this to the National Security Council in 2014. At present, information security institutions in Japan are chaperoned by the cybersecurity strategy headquarters, which aims to promote constructive and efficient cybersecurity policies. In addition, Japan has implemented its third action plan on information security for critical infrastructure and revised its cybersecurity strategy in 2015. By working in partnership with countries around the world, Japan pursues its own national security as well as the peace and stability of the international community. International cooperation and partnerships also contribute to the international campaign against cyberattacks, especially those in which foreign state actors may be implicated.


2019 ◽  
Vol 2 (2) ◽  
pp. 64-80
Author(s):  
Saleh Dwiyatno ◽  
Ayu Purnama Sari ◽  
Agus Irawan ◽  
Safig Safig

Information security is very important in today's technology. Information storage and crossing is currently no longer using paper media, but has used a lot of computer and internet media. PT. Torini Jaya Abadi is one that uses computer and internet media for information storage and crossing. However, there are disturbances such as heavy server access, which cannot be accessed and sometimes it cannot enter into the database server from the indication that the server might be exposed to a virus or DDoS (Distributed Danial of Service) type attacks occur on the server. Based on these problems, the author uses a honeypot to detect an attack based on alerts that have been accommodated in the log and can also provide information about the attacks that occur, from the results obtained honeyd is able to resemble an original system that pretends to have services that are not real , also able to detect attacks in real time and provide information from attackker, honeyd can emulate virtual hosts that are similar to the original computer, by obtaining logs from the honeyd admin system to find out information that occurs on the server, with honeyd network systems can help detect attacks in real time.


Author(s):  
Kent Marett ◽  
Tim Barnett

Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be significantly influenced by the decisions of other local SMEs. A hot-spot analysis of information security practices suggested that local trends lead to prioritizing certain security practices and not adopting others. Follow-up interviews with business owners and Chamber of Commerce directors provided insights on how security hotspots developed or not. The study identified both hot spot and cold spot communities, and sought to assess how local business networking conduits like chambers of commerce help promote best security practices


Author(s):  
Fre´de´ric Damian

Along with the GFR another gas-cooled reactor identified in the Gen IV technology roadmap, the VHTR is studied in France. Some models have been developed at CEA relying on existing computational tools essentially dedicated to the prismatic block type reactor. These models simulate normal operating conditions and accidental reactor transients by using neutronic [1], thermal-hydraulic, system analysis codes [2], and their coupling [3, 4]. In the framework of the European RAPHAEL project, this paper presents the results of the preliminary investigations carried out on the VHTR design. These studies aimed at understanding the physical aspects of the annular core and to identify the limits of a standard block type VHTR with regard to a degradation of its passive safety features. Analysis was performed considering various geometrical scales: fuel cell and fuel column located at the core hot spot, 2D and 3D core configurations including the coupling between neutronic and thermal-hydraulic. From the thermal analysis performed at the core hot spot, the capability to reduce the maximum fuel temperature by modifying the design parameters such as the fuel compact and the fuel block geometry was assessed. The best performances are obtained for an annular fuel compact geometry with coolant flowing inside and outside the fuel compact (ΔT > 50°C). The reliability of such design option should however be addressed with respect to its performance during the LOFC transient (the residual decay heat will be evacuated by radiation during the transient instead of conduction through graphite). As far as the fuel element geometry is concerned, a gain of approximately 50°C can be achieved by making limited changes on the fuel compact distribution in the prismatic block: reduction of the number of fuel compact in the outer ring of the fuel element where the average ratio between coolant channels and fuel compact is smaller. On the other hand, the adopted modifications should also be evaluated with respect to the maximum temperature gradient achieved in the fuel (amoeba effect). In the end, calculations performed on the full core configuration taking into account the thermal feedback showed that the radial positioning of the fuel elements allows to reduce significantly the power peaking factor and the maximum fuel temperature. The gain on the fuel temperature, which varies during the core irradiation, is in the range 100 – 150°C. Several modifications such as the increase of the bypass fraction and the replacement of a part of the graphite reflector by material with better thermal properties were also addressed in this paper.


Author(s):  
Y. Hirao ◽  
G. Su ◽  
K. Sugiyama ◽  
T. Narabayashi ◽  
M. Mori ◽  
...  

When LOCA occurs in proposed nuclear reactor systems, the coolability of the core would be kept by the SI core injection system and therefore the probability of the core meltdown is negligible small. In this research work, we make it clear that the coolability of the RPV bottom is secured even if a part of the core should melt and a substantial amount of debris should be deposited on the lower plenum. In this report, we examined experimentally the coolability of the RPV bottom that a Zircaloy-based loose debris layer is deposited on. We set up a heat supply section made by SUS304 on the loose debris layer and measured the heat flux released into the loose debris bed and the temperature at the lower surface of the heat supply section. In addition, we measured the temperature distribution at the bottom of the loose debris bed. It became clear in this study that the coolability depends on the amount of coolant supplied, and the hot spot would not occur when coolant is supplied. Even if a hotspot should occur in the oxidization of loose metal debris accompanied with rapid heat generation. It is found that when a small amount of coolant can be supplied, it disappears because of a high capillary force of oxidized loose debris. So it is confirmed that the soundness of RPV is basically maintained.


Sign in / Sign up

Export Citation Format

Share Document