The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing technology is gaining rapid growth in popularity. Mostly it is web based service and some private modules are built on intranet or virtual private network. Network security is a major concern for both cloud users and hosts of data centers. In addition to this, clients are also concerned about the infrastructure and service quality offered by cloud service providers. Cloud service providers...
In conditions of information technology growth, systems which are being developed to be used on multiple platforms, gain in importance and popularity. As a rule, such systems have client-server architecture and have strong security requirements for user authentication. In this paper the information technology of user authentication for cross-platform systems has been developed, which is characterized...
Nowadays the most used applications are the web based applications, for instance long range informal communication, shopping, e-learning, banking and social networking are all an examples of web based applications. It is commonly known that these Web applications are publicly available for all users around the world. This leads us to new challenges in securing these applications and exposing them...
This paper presents an economic e-Learning prototype for boosting up agricultural knowledge in rural regions of Thailand. The proposed prototype is designed on low-resource and mobility concepts. An e-Learning service is utilized for local self-learning and local staff to instruct contents. Due to the limitations and problems of ICT infrastructure, we design our system to function in two modes which...
Cloud Computing is a type of internet based service provider, where resources can be shared among users. Transparency is a key issue in CC, where clients are unaware of the source of the service requested. CC services can be in a form of applications, storage, and others. Services provided by different clouds differ in many criteria such as cost and response time. This paper presents a mathematical...
Navigating unfamiliar places is a common problem pilgrim face during Hajj. There exists few research-based applications that provide support but are less suited for highly crowded situations such as Hajj religious event. Therefore there is need to investigate support systems for use in large crowded events. Towards Developing an Intelligent HAJJ Guide system is a PhD thesis that investigates the issues...
This paper sought to understand the effectiveness of the traditional and cloud-based e-learning model. The growth of internet has been a game changer in the education sector. The internet has made it easy to for learners and educators to share information interactively, which is vital in enhancing education. Nonetheless, the storage of the content of learning has led to the adoption of cloud computing...
Anomaly detection is the process of finding outlying records from a given data set. The aim of this paper is to study a well-known anomaly detection technique on the “Short Message Service Centre” server, used in the telecommunications field to handle and store messages. This server was studied in details, a script was written to gather all the required data that went through a cleaning phase and...
An individual who re-registers an expired domain implicitly inherits the residual trust associated with the domain's prior use. Adversaries can, and increasingly do, exploit these ownership changes to undermine the security of both users and systems. In fact, many seemingly disparate security problems share a root cause in residual trust abuse. As we enter the dawn of the dead domain, new techniques...
Revisiting Mahadev Satyanarayanan's original vision of cyber foraging and reflecting on the last 15 years of related research, the authors discuss the major accomplishments achieved as well as remaining challenges. They also look to current and future applications that could provide compelling application scenarios for making cyber foraging a widely deployed technology. This article is part of a special...
Virtualization is one of the important key technologies in cloud computing. Main advantages include maximum resource utilization and high flexibility. The virtualization technology offers different services to users and the vendors and has become an upcoming technology in the IT (Information Technology) industry. This article explores various network virtualization technologies using cloud computing...
Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the service providers are changing their server storage to cloud storage. It is a great challenge for the service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
reCAPTCHA is a security measure that guards web applications against automated abuse by presenting a random auto-generated challenge to users to solve. These challenges have to be devised to be hard to be solved by computers, yet easy for humans. In this paper, we present an architectural design for a cloud-based reCAPTCHA service and discuss key design issues. These issues include the extraction...
In today's computing world in the cloud user can easily modify and share data as group. The main issues in the cloud computing was data privacy, data integrity, data access by unauthorized users. TTP (Trusted Third Party) is used to store and share data in cloud computing. To verify integrity of data, users in the group need to compute signature on all the blocks in shared data. In shared data different...
Association rule mining of the web user transaction is one of important techniques for extracting information from web data, including its content, link, and user information using data mining tool. This technique finds a pattern and causal relation between items on given databases. The Maximal Association Rule is a data mining tools to determine the association rule the rough set theory based. Accordingly,...
This project arises from the need to redesign the main technological infrastructure of the mining company. Current centralized infrastructure is obsolete and is no longer reliable and productive for the company. Currently, it is not possible for the network to facilitate the design of new technological solutions (installation of new servers, virtualization, storage networks, the configuration of advanced...
Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). However, utilizing CSP by site administrators is a fallible process and may require significant changes in web application code. In this paper, we propose an approach to help site administers to overcome these limitations in order...
Wireless sensor networks (WSNs) have been widely used for monitoring, tracking or object navigating whether stationer or mobile object. The system could be implemented in indoor or outdoor area. Disaster activity in urban area such as earthquake, tornado even militant activity inside the building need an object tracking in order to carry out search and rescue procedure for the victims or rescuers...
The architecture of remote Education Resource Center for the students of engineering on the basis of data space is developed. The consolidated data catalog and the query processing schemes in data space are proposed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.