The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Worldwide it is more and more common that the systems of the national governance, army, education etc. are retooled to open source systems - mainly because of the economical operation. The purpose of the article is to analyze and compare - in the aspects of security and performance - the abilities of the Web server ensured by the newest version of the most commonly spread closed source operation system...
Web applications support more and more our daily activities, it's important to improve their reliability and security. The content which users input to Web applications' server-side is named un-trusted content. Un-trusted content has a significant impact on the reliability and security of Web applications, so detecting the un-trusted variables in server-side program is important for improving the...
Recommender systems are used to suggest customized products to users. Most recommender algorithms create collaborative models by taking advantage of Web user profiles. In the last years, in the area of recommender systems, the Netflix contest has been very attractive for the researchers. However, many recent papers on recommender systems present results evaluated with the methodology used in the Netflix...
In this paper we introduced an environment that provides remote access to a full equipped MHP laboratory. Its purpose is to allow any registered user to test remotely a MHP application from any device connected to the Internet. The laboratory is made by means of a head-end which inserts the received application into an object carousel which is broadcasted together with the television streaming. The...
In this paper, we explain the architecture and provide implementation details of a synchronous collaborative tool we created using a lightweight Web 2.0 mash-up development methodology. This approach allowed us to put together a client interface with reasonable capabilities, scalability, and robustness rapidly. The rapid development of this tool also allowed us to perform thorough testing and incorporation...
Security of Web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based intrusion detection systems (IDS). SS-IDS derives automatically the parameter profiles from the analyzed data thereby generating the statistical signatures. Statistical signatures are based on modeling of normal requests and...
Cross Site Scripting (XSS) is one of the worst vulnerabilities that allow malicious attacks such as cookie thefts and Web page defacements. Testing an implementation against XSS vulnerabilities (XSSVs) can avoid these consequences. Obtaining an adequate test data set is essential for testing of XSSVs. An adequate test data set contains effective test cases that can reveal XSSVs. Unfortunately, traditional...
Ajax is an emerging Web engineering technology that supports advanced interaction features that go beyond Webpage navigation. The Ajax technology is based on asynchronous communication with the Web server and direct manipulation of the GUI, taking advantage of reflection.Correspondingly, new classes of Web faults are associated with Ajax applications.In previous work, we investigated a state-based...
We developed a model to investigate the phenomenon of whitewashing in peer-to-peer (P2P) systems. A white washer is a node that leaves the network and re-joins using a different identity. Whitewashing is a common problem in P2P systems and is a difficult to manage properly for reputable systems. The paper discusses the definition and properties of trust, formally represents the node by the labeled...
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application. Identifying the input vectors of a Web application and checking the results of an attack are important parts of penetration testing, as they indicate where an attack could be introduced and whether an attempted attack was...
Web applications have become major driving forces for world business. Effective and efficient testing of evolving Web applications is essential for providing reliable services. In this paper, we present a user session based testing technique that clusters user sessions based on the service profile and selects a set of representative user sessions from each cluster. Then each selected user session...
In the last decade, file sharing systems have generally been dominated by P2P solutions. Whereas e-mail and HTTP have been the "killer apps" of the earlier Internet, a large percentage of the current Internet backbone traffic is BitTorrent traffic. BitTorrent has proven to be the perfect file sharing solution for a decentralized Internet, moving the burden from central servers to each individual...
In order to increase education scope and explore new teaching models, while network teaching is deeply investigated, the implementation model, method and technologies are researched. Therefore, the web-based network teaching platform is designed and developed. The platform creates a network teaching environment which is extended from traditional classroom teaching and tries to feed back to classroom...
Along with the popularization of computers, especially the wide use of Internet, malicious code in recent years has presented a serious threat to our world. In this paper, through the analysis against the suspicious behaviors of vicious program by function calls, we present an approach of malware detection which is based on analysis and distilling of representative characteristic and systemic description...
Fuzzy clustering is a popular method for modeling web usage data, and a number of techniques have been proposed. Performance of such techniques has been demonstrated through experiments using datasets which are often limited in the size and/or variety. This is mainly due to the difficulty in acquiring large real data, and also to the huge amount of time and effort required in performing experiments...
All kinds of studies over the network, from a rather macroscopic perspective, are considered network study. It means, in other words, that learners achieve the goals of learning activities through the medium of network. But the problem is that learners may do this intentionally or unintentionally. This kind of general concept of learning exists not only in the network era but also in any past times...
The current challenge for teachers and trainers is to change the way they teach by becoming competent to integrate ICTs into their traditional teaching methods. To our knowledge few studies, if any, have examined this integration into a continuous training process in the work place. This paper presents the problem, the objectives and the methodology of a study that aims to experiment with a mixed...
Many national mapping agencies offer geographic datasets on the Web. The potential users are interested in buying the dataset. An exchange of geographic data is a transaction and involves transaction costs. Transaction costs include the cost of measuring what has been exchanged and the cost of protecting rights, plus policing and enforcing agreements. Our research on transaction costs is based on...
GridFTP is a secure and efficient data transfer protocol in Grid. This paper proposes a test scenario for the GridFTP traffic features. Firstly it gives a general description of the testbed traffic from the aspects of packet characteristics and throughput distribution; then analyses the self-similarity features of the GridFTP traffic and their decomposed data flows both in WAN and in LAN. Analysis...
Web 2.0 has arrived as a ldquoconceptrdquo, a ldquotrendrdquo, a ldquomodelrdquo or simply a ldquophenomenonrdquo and is here to stay. It has caught the imagination of innovative thinkers so rapidly that it is hard to believe Internet has undergone a drastic change or simply to say ldquoundergone a paradigm shiftrdquo. The Web 2.0 trend seems to have all the ingredients of superior technology, collective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.