The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the importance of network connectivity for organizations’ operations in connecting their services and business units’ increases, the need for backup sites with robust network infrastructure is crucial to achieve their business goals. To reduce cost and ease manageability and control, most organizations build one backup site. However, some organizations tend to establish multiple backup sites that...
Distribution of smartphone apps represents a major risk for tomorrow. Alternative app stores filled by pirated content create a dangerous substrate for the diffusion of tricky apps. We present in this paper a dedicated Crawling Engine conceived to protect distribution of genuine apps.
Grid Computing is a domain in full development. The software known as middleware is upgraded and improved. Based upon this simple words, this paper will show how the software on the site RO-14-ITIM, from the National Institute for Research and development of Isotopic and Molecular Technology improved in the last four month from the European Middleware Initiative (EMI) 1 to version 3, the difficult...
With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security and privacy are the key issues for mobile cloud computing applications, and still face some...
This paper offers a fresh perspective on the aspect of application security, highlighting a sample attack that is not currently being protected against. Here is a case study which discussed identifying poor coding practices that render Web applications vulnerable to attacks such as remote command execution. Given the increased focus on the need for application security, it is now to be hoped that...
The study presents the major factors for Internet banking adoption and compares the levels of adoption across countries, in order to identify more easily what factors to consider most while providing banking services over the Internet. Based on prior studies, Web security, Internet usage, economy status, high branch intensity, competition, government prioritization regulations, and literacy level...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.