2016 (467)
2015 (448)
2014 (181)
2013 (81)
2012 (22)
2011 (22)
2010 (20)
2009 (22)
2008 (10)
A Comparative Study on Responding Methods for TCP’s Fast Recovery in Wireless Networks
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
When TCP operates in wireless networks, it suffers severe perfor-mance degradation because TCP’s fast retransmit/fast recovery (FR/FR) is often triggered regardless of congestion when a packet is lost due to wireless transmis-sion errors. Although several loss differentiation schemes have been proposed to distinguish the cause of triggered FR/FRs, there has been a little try to find out an appropriate responding method to utilize the detection information of a LDA. In this paper, we observe the relationship between a responding method and TCP’s performance, and investigate the best way to respond to the FR/FRs non-related to congestion in order to improve TCP’s performance to the max. Our experiment results emphasize the importance of the responding method, which is overlooked in previous works, and suggest the best response for the FR/FRs non-related to congestion.
An Opencast Mobile learning Framework for Enhancing Learning in Higher Education
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.11-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Producing e-learning contents through recording of lectures can be relatively easy and flexible to produce than through the conventional Learning Management System (LMS) due to improved technology. Recording lectures can serve as supplementary, substitutional or creative materials to a conventional traditional lecture. With the popularity and evolution of powerful mobile devices like PDAs, mobile phones, iPods and iPads, which are light and portable it is easy to integrate these devices into the mobile learning system. This paper describes the evolution of pod casts to opencast and a mobile learning opencast framework that helps postgraduate students in higher education adapt educational resources from Opencast Matter horn to their mobile devices which can be used anytime and anywhere.
Internet Content Regulation Framework
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.19-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The internet has contributions in almost every area of our life but the non-existence of an effective regulation system is posing serious concerns to many nations. The unrestrained and premature exposure of hazardous internet contents to children, and their widespread and uncontrolled usage in organizational environment are some areas that must be dealt with on priority basis. This research focuses on proposing a framework that is able to regulate the internet usage at geographical level. The proposed framework is deemed to be dynamically capable of handling live internet web requests and deals with them by providing dependable results with enhanced performance. It is a tightly bonded system that covers all areas and involves stakeholders thus ensuring fool-proof internet regulation of secure and socially acceptable internet content access to the public.
Abstractization – A Fundamental Instrument for Describing and Modeling Software Systems
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.33-48
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper aims to highlight the importance of modeling amongst the processes that may assure the success of an IT project. Also, the paper introduces a set of rules to follow, in order for the software system abstractization activity to have a positive outcome.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.49-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recent developments in bio-, nano-, and digital technology have changed the way modern healthcare systems operate. The provision of healthcare servicing remotely and exploitation of monitoring and assistive technology within and outside medical institutions mean that medical staff and patients constantly interact with various electronic devices. It also means that sensitive patient data are stored on and being transmitted between these devices. To ensure safe and secure use of medical equipment, as well as authorised access to data, appropriate encryption and debugging infrastructure should be integrated into the modern healthcare system. This paper introduces a novel concept, ICmetrics, that can serve as a basis for developing such infrastructure. More specifically, the ICmetric technology is based on the idea of generating encryption keys directly from the characteristics of electronic systems’ behaviour on both hard- and software levels. This may include features extracted from electronic circuits, sensors, machine-machine and machine-human interfaces, as well communication peripherals. While the proposed technology has a number of advantages over the existing security systems, it also poses interesting research challenges. These challenges along with the proposed solutions are discussed in the paper.
Web Service Intrusion Detection Using XML Similarity Classification and WSDL Description
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.61-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study introduces a new method to detect the Intrusion attacks on web services using XML similarity classifiers. First, pre-process methods are employed to distinguish the requests both based on the structure and content. WSDL description of the web service is employed to determine the valid structure of a request. A sequential threshold method is employed to define a request as an intrusion. Moreover, an optimized semantic similarity algorithm is employed to define the discrepancy between the contest of the request and the database of normal requests. Evaluation results are conducted based on various methods and algorithm which were presented in academia. The final section presents the promising way with the highest accuracy.
보안공학연구지원센터(IJUNESST) International Journal of u- and e- Service, Science and Technology Vol.4 No.3 2011.09 pp.73-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient’s health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. We propose a new column-level access control mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to reduce the number of keys held by each user in the system. Therefore, the number keys maintained by the data owner is also reduced. The experimental results show that our proposals can ensure system’s availability. So they are applicable in the real world.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.