Earticle

현재 위치 Home

International Journal of u- and e- Service, Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJUNESST) [Science & Engineering Research Support Center, Republic of Korea(IJUNESST)]
  • pISSN
    2005-4246
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.4 No.3 (7건)
No
1

A Comparative Study on Responding Methods for TCP’s Fast Recovery in Wireless Networks

Mi-Young Park, Sang-Hwa Chung, Kyeong-Ae Shin, Guangjie Han

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

When TCP operates in wireless networks, it suffers severe perfor-mance degradation because TCP’s fast retransmit/fast recovery (FR/FR) is often triggered regardless of congestion when a packet is lost due to wireless transmis-sion errors. Although several loss differentiation schemes have been proposed to distinguish the cause of triggered FR/FRs, there has been a little try to find out an appropriate responding method to utilize the detection information of a LDA. In this paper, we observe the relationship between a responding method and TCP’s performance, and investigate the best way to respond to the FR/FRs non-related to congestion in order to improve TCP’s performance to the max. Our experiment results emphasize the importance of the responding method, which is overlooked in previous works, and suggest the best response for the FR/FRs non-related to congestion.

2

An Opencast Mobile learning Framework for Enhancing Learning in Higher Education

Olutayo Boyinbode, Antoine Bagula, Dick Ngambi

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.11-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Producing e-learning contents through recording of lectures can be relatively easy and flexible to produce than through the conventional Learning Management System (LMS) due to improved technology. Recording lectures can serve as supplementary, substitutional or creative materials to a conventional traditional lecture. With the popularity and evolution of powerful mobile devices like PDAs, mobile phones, iPods and iPads, which are light and portable it is easy to integrate these devices into the mobile learning system. This paper describes the evolution of pod casts to opencast and a mobile learning opencast framework that helps postgraduate students in higher education adapt educational resources from Opencast Matter horn to their mobile devices which can be used anytime and anywhere.

3

Internet Content Regulation Framework

Amer Ali Khan, M. Naeem Ahmed Khan

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.19-32

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The internet has contributions in almost every area of our life but the non-existence of an effective regulation system is posing serious concerns to many nations. The unrestrained and premature exposure of hazardous internet contents to children, and their widespread and uncontrolled usage in organizational environment are some areas that must be dealt with on priority basis. This research focuses on proposing a framework that is able to regulate the internet usage at geographical level. The proposed framework is deemed to be dynamically capable of handling live internet web requests and deals with them by providing dependable results with enhanced performance. It is a tightly bonded system that covers all areas and involves stakeholders thus ensuring fool-proof internet regulation of secure and socially acceptable internet content access to the public.

4

Abstractization – A Fundamental Instrument for Describing and Modeling Software Systems

Dorin Bocu, Răzvan Bocu

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.33-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper aims to highlight the importance of modeling amongst the processes that may assure the success of an IT project. Also, the paper introduces a set of rules to follow, in order for the software system abstractization activity to have a positive outcome.

5

Overview of ICmetrics Technology – Security Infrastructure for Autonomous and Intelligent Healthcare System

Yevgeniya Kovalchuk, Klaus McDonald-Maier, Gareth Howells

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.49-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recent developments in bio-, nano-, and digital technology have changed the way modern healthcare systems operate. The provision of healthcare servicing remotely and exploitation of monitoring and assistive technology within and outside medical institutions mean that medical staff and patients constantly interact with various electronic devices. It also means that sensitive patient data are stored on and being transmitted between these devices. To ensure safe and secure use of medical equipment, as well as authorised access to data, appropriate encryption and debugging infrastructure should be integrated into the modern healthcare system. This paper introduces a novel concept, ICmetrics, that can serve as a basis for developing such infrastructure. More specifically, the ICmetric technology is based on the idea of generating encryption keys directly from the characteristics of electronic systems’ behaviour on both hard- and software levels. This may include features extracted from electronic circuits, sensors, machine-machine and machine-human interfaces, as well communication peripherals. While the proposed technology has a number of advantages over the existing security systems, it also poses interesting research challenges. These challenges along with the proposed solutions are discussed in the paper.

6

Web Service Intrusion Detection Using XML Similarity Classification and WSDL Description

Mahdi Bazarganigilani, Belinda Fridey, Ali Syed

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.61-72

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study introduces a new method to detect the Intrusion attacks on web services using XML similarity classifiers. First, pre-process methods are employed to distinguish the requests both based on the structure and content. WSDL description of the web service is employed to determine the valid structure of a request. A sequential threshold method is employed to define a request as an intrusion. Moreover, an optimized semantic similarity algorithm is employed to define the discrepancy between the contest of the request and the database of normal requests. Evaluation results are conducted based on various methods and algorithm which were presented in academia. The final section presents the promising way with the highest accuracy.

7

An Experimental Evaluation for a New Column – Level Access Control Mechanism for Electronic Health Record Systems

Pham Thi Bach Hue, Sven Wohlgemuth, Isao Echizen, Nguyen Dinh Thuc, Dong Thi Bich Thuy

보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.73-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient’s health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. We propose a new column-level access control mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to reduce the number of keys held by each user in the system. Therefore, the number keys maintained by the data owner is also reduced. The experimental results show that our proposals can ensure system’s availability. So they are applicable in the real world.

 
페이지 저장