A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov...A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system.展开更多
In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent...In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent technique can not solve the complicated and elaborate investment planning problems.Itis necessary to study those problems synthetically by combining the multiple intelligent techniques.Weemployed fussy algorithms,genetic algorithms,etc.to solve complicated financial portfolio managementin this paper.We analyse and design an agent-based hybrid intelligent system by following the methodolo-gy for constructing agent-based hybrid intelligent system(MAHIS).The system starts with the financialrisk tolerance evaluation based on fussy algorithms.Asset allocation,portfolio selections,interest predic-tions,and ordered weighted averaging can be conducted by using hybrid intelligent techniques.The plan-ning agent in the system can easily access all the intelligent processing agents,including the agents of fi-nancial risk tolerance assessment,asset allocation,portfolio selection,interest prediction,and decisionaggregation.Overall system robustness is facilitated.展开更多
In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogon...In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogonal function system to achieve the piece-based orthogonal transform on the image. The significant middle frequency coefficients in the transformation matrix are picked up, based on characteristics of the image visual system and the Haar orthogonal transform. The watermark is adoptively weighed to the middle frequency matrix. The method improves the validity of watermarking and shows excellent advantage against shearing attack. Experimental results show that the Haar orthogonal function system based watermark approach can provide an excellent protection under geometric attacks.展开更多
The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organ...The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organization and points out that inadequate variable choice may influence validity of IT analysis. First part of the article describes both variables analyzed in presented research--IT dissemination and IT acceptance. It also presents how in theory IT can influence organizational structure. The main part of the article describes empirical studies conducted in order to verify if the influence of IT on the organizational structure exists. First, the main goal and methodology of the empirical studies are presented. Variables used to assess IT and organizational structure in organizations are discussed. Then, there is a description of research results--statistical correlation between analyzed variables and regression models is shown. Conclusion of the article is that IT can influence organizational structure, but the most important factor ensuring this influence is the actual use of IT by employees of the organization--their access to IT is not enough.展开更多
Technology plays a key role in today's business environment. Many companies greatly rely on computers and software to provide accurate information to effectively manage their business processes. It is becoming increa...Technology plays a key role in today's business environment. Many companies greatly rely on computers and software to provide accurate information to effectively manage their business processes. It is becoming increasingly necessary for all businesses to incorporate information technology solutions to operate successfully. One way for many corporations to adopt information technology (IT) on a large scale is by installing enterprise resource planning (ERP) systems to accomplish their business transactions and data-processing needs. ERP systems are software packages that enable the integration of business processes throughout an organization. This study aims to determine the effect of the ERP system on the cost of auditing period compared with traditional computerized (non-ERP) systems. According to cost analysis, the study also points out the changes in audit price. The methodology used in this research is survey-based data collection. The questionnaires are sent to auditors who are working with companies with ERP systems. The answers are processed and analyzed using Statistical Package for Social Sciences (SPSS) 20. The data are performed using the statistical test to determine the effect of ERP usage on the cost of auditing process and pricing policy of auditors. The findings of this study are: (1) Companies with ERP systems are reducing their auditing costs; and (2) Auditing companies are not implying a low rate of price to their customers using ERP.展开更多
This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student in...This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.展开更多
基金the National Natural Science Foundation of China (No. 60773049)the Natural Science Foundation of Jiangsu Province (No. BK2007086)+1 种基金the Fundamental Research Project of the Natural Science in Colleges of Jiangsu Province (No. 07KJB520016)the Person with Ability Project of Jiangsu University (No. 07JDG053), China
文摘A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system.
基金the Overseas Scholar Research Foundation of Heilongjiang,China(No.LC0609)
文摘In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent technique can not solve the complicated and elaborate investment planning problems.Itis necessary to study those problems synthetically by combining the multiple intelligent techniques.Weemployed fussy algorithms,genetic algorithms,etc.to solve complicated financial portfolio managementin this paper.We analyse and design an agent-based hybrid intelligent system by following the methodolo-gy for constructing agent-based hybrid intelligent system(MAHIS).The system starts with the financialrisk tolerance evaluation based on fussy algorithms.Asset allocation,portfolio selections,interest predic-tions,and ordered weighted averaging can be conducted by using hybrid intelligent techniques.The plan-ning agent in the system can easily access all the intelligent processing agents,including the agents of fi-nancial risk tolerance assessment,asset allocation,portfolio selection,interest prediction,and decisionaggregation.Overall system robustness is facilitated.
文摘In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogonal function system to achieve the piece-based orthogonal transform on the image. The significant middle frequency coefficients in the transformation matrix are picked up, based on characteristics of the image visual system and the Haar orthogonal transform. The watermark is adoptively weighed to the middle frequency matrix. The method improves the validity of watermarking and shows excellent advantage against shearing attack. Experimental results show that the Haar orthogonal function system based watermark approach can provide an excellent protection under geometric attacks.
文摘The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organization and points out that inadequate variable choice may influence validity of IT analysis. First part of the article describes both variables analyzed in presented research--IT dissemination and IT acceptance. It also presents how in theory IT can influence organizational structure. The main part of the article describes empirical studies conducted in order to verify if the influence of IT on the organizational structure exists. First, the main goal and methodology of the empirical studies are presented. Variables used to assess IT and organizational structure in organizations are discussed. Then, there is a description of research results--statistical correlation between analyzed variables and regression models is shown. Conclusion of the article is that IT can influence organizational structure, but the most important factor ensuring this influence is the actual use of IT by employees of the organization--their access to IT is not enough.
文摘Technology plays a key role in today's business environment. Many companies greatly rely on computers and software to provide accurate information to effectively manage their business processes. It is becoming increasingly necessary for all businesses to incorporate information technology solutions to operate successfully. One way for many corporations to adopt information technology (IT) on a large scale is by installing enterprise resource planning (ERP) systems to accomplish their business transactions and data-processing needs. ERP systems are software packages that enable the integration of business processes throughout an organization. This study aims to determine the effect of the ERP system on the cost of auditing period compared with traditional computerized (non-ERP) systems. According to cost analysis, the study also points out the changes in audit price. The methodology used in this research is survey-based data collection. The questionnaires are sent to auditors who are working with companies with ERP systems. The answers are processed and analyzed using Statistical Package for Social Sciences (SPSS) 20. The data are performed using the statistical test to determine the effect of ERP usage on the cost of auditing process and pricing policy of auditors. The findings of this study are: (1) Companies with ERP systems are reducing their auditing costs; and (2) Auditing companies are not implying a low rate of price to their customers using ERP.
文摘This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.