Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ...Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.展开更多
Materials on the environmental impacts of natural cataclysm and their possible implications, as well as the types of natural disasters the most frequently encountered in recent years in Azerbaijan have been shown in t...Materials on the environmental impacts of natural cataclysm and their possible implications, as well as the types of natural disasters the most frequently encountered in recent years in Azerbaijan have been shown in the article. Some of them have been described in more details of solving the most common problems. In addressing these challenges, using advanced information technology plays a huge role. In this respect, the paper provides information about new technologies used in the country to protect the environment and about international projects involving a State Committee on land and cartography of Azerbaijan Republic.展开更多
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ...There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.展开更多
With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modifi...With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modification of the original concept of set covering problem. It is also different from the concept of exact cover defined by J.E. Hopcmft. Some properties of (k, n ) -exact cover are investigated; a sufficient condition for a set to be ( k, n ) -exactly coverable is given. It follows that a feasible assignment scheme of a set for the ( k, n) -exact eover is obtained if this set satisfies the sufficient condition.展开更多
This paper deals with the problem of how to take full use of prices information to model financial markets.A range decomposition technique is proposed to decompose the returns into two components.It is proved theoreti...This paper deals with the problem of how to take full use of prices information to model financial markets.A range decomposition technique is proposed to decompose the returns into two components.It is proved theoretically that these two components are bi-directional Granger causality,which makes it convenient to establish a vector autoregressive model(VAR).Both simulations and empirical studies are performed,and the results are consistent with the theoretical ones.The range decomposition approach presented in this paper is more efficient in information employment and suggests a new framework to model financial markets.展开更多
基金supported by National Key Technology Support Program(No.2013BAD17B06)Major Program of National Social Science Fund(No.15ZDB154)
文摘Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.
文摘Materials on the environmental impacts of natural cataclysm and their possible implications, as well as the types of natural disasters the most frequently encountered in recent years in Azerbaijan have been shown in the article. Some of them have been described in more details of solving the most common problems. In addressing these challenges, using advanced information technology plays a huge role. In this respect, the paper provides information about new technologies used in the country to protect the environment and about international projects involving a State Committee on land and cartography of Azerbaijan Republic.
文摘There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
基金Supported by the National Natural Science Foundation of China (No. 60673053 90718011 )
文摘With the ( k, n )-threshold scheme of secret sharing in the field of information security technology as an application background, the concept of set ( k, n )-exact cover is presented in this paper. It is a modification of the original concept of set covering problem. It is also different from the concept of exact cover defined by J.E. Hopcmft. Some properties of (k, n ) -exact cover are investigated; a sufficient condition for a set to be ( k, n ) -exactly coverable is given. It follows that a feasible assignment scheme of a set for the ( k, n) -exact eover is obtained if this set satisfies the sufficient condition.
文摘This paper deals with the problem of how to take full use of prices information to model financial markets.A range decomposition technique is proposed to decompose the returns into two components.It is proved theoretically that these two components are bi-directional Granger causality,which makes it convenient to establish a vector autoregressive model(VAR).Both simulations and empirical studies are performed,and the results are consistent with the theoretical ones.The range decomposition approach presented in this paper is more efficient in information employment and suggests a new framework to model financial markets.