Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Digital libraries (2)
- 1.2 COMPUTER AND INFORMATION SCIENCE (1)
- 2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING (1)
- ADCR (1)
- Algorithms (1)
-
- Ant colony optimization (1)
- Archiving repository crawler (1)
- Archivists (1)
- Blog (1)
- CRATE model (1)
- Communication engineering and systems (1)
- Computer Sciences (1)
- Computer hardware and architecture (1)
- Computer networks--Access control (1)
- Computer networks--Security measures (1)
- Computer security (1)
- Cross-layer routing algorithm (1)
- Data protection (1)
- Digital preservation (1)
- Electronic data interchange (1)
- Electronic transcript (1)
- Embargo periods (1)
- Encryption (1)
- Extensible Markup Language (1)
- Hwn (1)
- Hybrid wireless network (1)
- Information Technology (1)
- Localization (1)
- Metadata (1)
- Network protocols (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Digital Communications and Networking
Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq
Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq
Computer Science Theses & Dissertations
This research defines Time-Locked Embargo, a framework designed to mitigate the Preservation Risk Interval: the preservation risk associated with embargoed scholarly material. Due to temporary access restrictions, embargoed data cannot be distributed freely and thus preserved via data refreshing during the embargo time interval. A solution to mitigate the risk of data loss has been developed by suggesting a data dissemination framework that allows data refreshing of encrypted instances of embargoed content in an open, unrestricted scholarly community. This framework has been developed by exploiting implementations of existing technologies to"time-lock" data using Timed-Release Cryptology (TRC) so that it can be …
E-Transcript Web Services System Supporting Dynamic Conversion Between Xml And Edi, Myungjae Kwak '11, Woohyun Kang '14, Gondy Leroy, Samir Chatterjee
E-Transcript Web Services System Supporting Dynamic Conversion Between Xml And Edi, Myungjae Kwak '11, Woohyun Kang '14, Gondy Leroy, Samir Chatterjee
CGU Faculty Publications and Research
As XML becomes a standard for communications between distributed heterogeneous machines, many schools plan to implement Web Services systems using the XML e-transcript (electronic transcript) standard. We propose a framework that supports both XML e-transcript Web Services and existing EDI e-transcript systems. The framework uses the workflow engine to exploit the benefits of workflow management mechanisms. The workflow engine manages the e-transcript business process by enacting and completing the tasks and sub-processes within the main business process. We implemented the proposed framework by using various open source projects including Java, Eclipse, and Apache Software Foundation’s Web Services projects. Compared with …
Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim
Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Blog/news search engines are very important channels to reach information about the real-time happenings. In this paper, we study the popular queries collected over one year period and compare their search results returned by a blog search engine (i.e., Technorati) and a news search engine (i.e., Google News). We observed that the numbers of hits returned by the two search engines for the same set of queries were highly correlated, suggesting that blogs often provide commentary to current events reported in news. As many popular queries are related to some events, we further observed a high cohesiveness among the returned …
Integrating Preservation Functions Into The Web Server, Joan A. Smith
Integrating Preservation Functions Into The Web Server, Joan A. Smith
Computer Science Theses & Dissertations
Digital preservation of theWorldWideWeb poses unique challenges, different fromthe preservation issues facing professional Digital Libraries. The complete list of a website’s resources cannot be cited with confidence, and the descriptive metadata available for the resources is so minimal that it is sometimes insufficient for a browser to recognize. In short, the Web suffers from a counting problem and a representation problem. Refreshing the bits, migrating from an obsolete file format to a newer format, and other classic digital preservation problems also affect the Web. As digital collections devise solutions to these problems, the Web will also benefit. But the core …
An Analysis Of Botnet Vulnerabilities, Sean W. Hudson
An Analysis Of Botnet Vulnerabilities, Sean W. Hudson
Theses and Dissertations
Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.
Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch
Resource Sharing Via Planed Relay For Hwn, Chong Shen, Susan Rea, Dirk Pesch
NIMBUS Articles
We present an improved version of adaptive distributed cross-layer routing algorithm (ADCR) for hybrid wireless network with dedicated relay stations () in this paper. A mobile terminal (MT) may borrow radio resources that are available thousands mile away via secure multihop RNs, where RNs are placed at pre-engineered locations in the network. In rural places such as mountain areas, an MT may also communicate with the core network, when intermediate MTs act as relay node with mobility. To address cross-layer network layers routing issues, the cascaded ADCR establishes routing paths across MTs, RNs, and cellular base stations (BSs) and provides …
Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh
Composable Distributed Access Control And Integrity Policies For Query-Based Wireless Sensor Networks, David W. Marsh
Theses and Dissertations
An expected requirement of wireless sensor networks (WSN) is the support of a vast number of users while permitting limited access privileges. While WSN nodes have severe resource constraints, WSNs will need to restrict access to data, enforcing security policies to protect data within WSNs. To date, WSN security has largely been based on encryption and authentication schemes. WSN Authorization Specification Language (WASL) is specified and implemented using tools coded in JavaTM. WASL is a mechanism{independent policy language that can specify arbitrary, composable security policies. The construction, hybridization, and composition of well{known security models is demonstrated and shown to preserve …
Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti
Efficient Corona Training Protocols For Sensor Networks, Alan A. Bertossi, Stephan Olariu, Cristina M. Pinotti
Computer Science Faculty Publications
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireless communications capabilities. It is expected that these small devices, referred to as sensors, will be mass-produced and deployed, making their production cost negligible. Due to their small form factor and modest non-renewable energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location is not necessary, and all that the individual sensors need is a coarse-grain location awareness. The task of acquiring such a coarse-grain location awareness is referred to as training. …
Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson
Creating Preservation-Ready Web Resources, Joan A. Smith, Michael L. Nelson
Computer Science Faculty Publications
There are innumerable departmental, community, and personal web sites worthy of long-term preservation but proportionally fewer archivists available to properly prepare and process such sites. We propose a simple model for such everyday web sites which takes advantage of the web server itself to help prepare the site's resources for preservation. This is accomplished by having metadata utilities analyze the resource at the time of dissemination. The web server responds to the archiving repository crawler by sending both the resource and the just-in-time generated metadata as a straight-forward XML-formatted response. We call this complex object (resource + metadata) a CRATE. …
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Faculty Publications
A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …