Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

External Link

Selected Works

Computer Science

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Network Engineering For C-Commerce Innovation: The Role Of Trust, Mark Brogan, Leisa Armstrong Feb 2012

Network Engineering For C-Commerce Innovation: The Role Of Trust, Mark Brogan, Leisa Armstrong

Leisa Armstrong

The idea that social networks play an important role in knowledge diffusion of innovation has a long pedigree in innovation theory. In his Diffusion of Innovation (DOI) theory, Rogers (1995) argued that in the information network of the organization, managerial champions and opinion leaders could affect both organizational acceptance and also the velocity of adoption of innovation. In Small to Medium Enterprise (SME) C-commerce innovation, the role of such social factors has been understood in terms of ‘embedded network structure’ (Braun, 2003) that impacts on clustering behavior. This article explores the use of quantitative Social Network Analysis (SNA) to model …


Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa Armstrong Feb 2012

Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa Armstrong

Leisa Armstrong

Public Key Infrastructure (PKI) has for the last two decades been a means of securing systems and communication. With the adoption of Open Document Format (ODF) as an ISO standard, the question remains if the unpopular, expensive, complex and unmaintainable PKI can prove to be a viable means of securing ODF documents. This paper analyses the drawbacks of PKI and evaluates the useji.tlness of PKl in provisioning robust, cheap and maintainable XML security to XML based ODF. This paper also evaluates the existing research on XML security, more specifically fine grained access control.


The Protection Of Rights Management Information: Modernization Or Cup Half Full?, Mark Perry Sep 2010

The Protection Of Rights Management Information: Modernization Or Cup Half Full?, Mark Perry

Mark Perry

Many papers in this collection discuss the history and development of Bill C-32, An Act to Amend the Copyright Act, introduced into the Canadian Parliament on 2 June 2010, so that analysis will not be duplicated here. Among the failures of copyright reform has been the lack of addressing the required “balancing” of proprietary rights on the one hand, with user rights and the public domain on the other. Rights Management Information (RMI) can aid in this balancing. The RMI of a work is simply data that provide iden- tification of rights related to that work, either directly or indirectly. …


Differentiating Web Service Offerings, Halina Kaminski, Khalid Sherdil, Hanan Lutfiyya, Nazim Madhavji, Mark Perry Jan 2009

Differentiating Web Service Offerings, Halina Kaminski, Khalid Sherdil, Hanan Lutfiyya, Nazim Madhavji, Mark Perry

Mark Perry

The advent of Service Oriented Architecture (SOA) paradigm and increasing use of Web Services (WS) implies that the future will see a large number of services transferred between providers and consumers, using many applications or agents working on behalf of humans. Discovering and using the services is the easy part. Negotiating and selecting the best services from amongst the plethora of similar ones, depending on their cost and quality, is the challenging issue. However, existing WS-I standards neither cater to provision of Service Level Agreements (SLAs), nor their exchange between parties. These standards are confined merely to WS description (WSDL). …


Who Counts Your Votes?, Halina Kaminski, Lila Kari, Mark Perry Jan 2009

Who Counts Your Votes?, Halina Kaminski, Lila Kari, Mark Perry

Mark Perry

Open and fair elections are paramount to modern democracy. Although some people claim that the penciland- paper systems used in countries such as Canada and UK are still the best method of avoiding vote rigging, recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. It is a goal of this paper to describe a voting system that is secret and secure as well as verifiable and useable over an existing computer network. We have designed and implemented an electronic voting system – Verifiable E-Voting (VEV) – with an underlying protocol …