摘要:
The present invention provides methods, systems and apparatus for detecting unknown scenarios in a data processing system. An example method includes the steps of: providing known scenario data describing one or more known scenarios in a database; generating element data depending on the known scenario data to form a set of elements, wherein each element is related to at least an actor and the behavior of the actor; computing subsets of elements by combining at least some of the elements of the set in dependence on their corresponding behavior; generating new scenario data related to new scenarios depending on the subsets of elements; and comparing the known scenario data with the new scenario data in order to identify the unknown scenarios.
摘要:
The present invention provides methods, systems and apparatus for detecting unknown scenarios in a data processing system. An example method includes the steps of: providing known scenario data describing one or more known scenarios in a database; creating element data depending on the known scenario data to form a set of elements, wherein each element is related to at least an actor and the behaviour of the actor; computing subsets of elements by combining at least some of the elements of the set in dependence on their corresponding behaviour; creating new scenario data related to new scenarios depending on the subsets of elements; and comparing the known scenario data with the new scenario data in order to identify the unknown scenarios.
摘要:
The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.
摘要:
A system and method for use in a networked communication system provides a type of liability or commitment security mechanism which enables, for example, a merchant to rely on digitally signed statements, and at the same time enables a buyer to selectively enter a commitment limit before a digital signature is made by his or her private signing key. A trusted certificate authority enforces that the chosen limit cannot be exceeded prior to the transaction being fulfilled by issuing a commitment certificate on a per transaction basis which gives the other party a guarantee, even in case the key was compromised. The disclosed system and method allows a user to limit total liability when using a digital signing key even if used to sign any number of commitments or statements with other parties. It allows the beneficiary to trust in the received commitment confirmed by the commitment certificate.
摘要:
A computer implemented method and system for analysing a first set of data records where each data record comprises attribute values for one or more attributes, by expanding the first set of data records into a second set of data records by creating for at least one of the attributes of the first set of data records at least two redundant attributes with corresponding redundant attribute values, assigning different generalization rules to the at least two redundant attributes, and performing a generalization of the second set of data records by means of an attribute-oriented induction (AOI)-algorithm.
摘要:
The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.
摘要:
The present invention provides methods, systems and apparatus for detecting unknown scenarios in a data processing system. An example method includes the steps of: providing known scenario data describing one or more known scenarios in a database; creating element data depending on the known scenario data to form a set of elements, wherein each element is related to at least an actor and the behaviour of the actor; computing subsets of elements by combining at least some of the elements of the set in dependence on their corresponding behaviour; creating new scenario data related to new scenarios depending on the subsets of elements; and comparing the known scenario data with the new scenario data in order to identify the unknown scenarios.
摘要:
The present invention provides methods, systems and apparatus for detecting unknown scenarios in a data processing system. An example method includes the steps of: providing known scenario data describing one or more known scenarios in a database; generating element data depending on the known scenario data to form a set of elements, wherein each element is related to at least an actor and the behavior of the actor; computing subsets of elements by combining at least some of the elements of the set in dependence on their corresponding behavior; generating new scenario data related to new scenarios depending on the subsets of elements; and comparing the known scenario data with the new scenario data in order to identify the unknown scenarios.
摘要:
The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.
摘要:
A computer implemented method and system for analysing a first set of data records where each data record comprises attribute values for one or more attributes, by expanding the first set of data records into a second set of data records by creating for at least one of the attributes of the first set of data records at least two redundant attributes with corresponding redundant attribute values, assigning different generalization rules to the at least two redundant attributes, and performing a generalization of the second set of data records by means of an attribute-oriented induction (AOI)-algorithm.