Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Effective Security By Obscurity, John Christian Smith Dec 2011

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …


Dirty Tricks Played By The Domain Registrars, Umakant Mishra Dec 2011

Dirty Tricks Played By The Domain Registrars, Umakant Mishra

Umakant Mishra

With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.


High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal Nov 2011

High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal

George K. Thiruvathukal

Threading and concurrency are crucial to building high-performance Java applications -- but they have a reputation for complexity. High Performance Java Computing thoroughly demystifies these advanced development techniques. It delivers practical programming solutions, proven design patterns, and a rigorously-tested code library -- everything developers need to build optimized Java software for technical, business, and E-commerce applications. Start by understanding how threading and concurrency can be used to solve a wide variety of performance problems, enabling the construction of more powerful networked applications. Master the Java 2 Threads classes, including daemon threads, thread control, scheduling, and more. Review the key problems …


Ipv6 Security Basics, John Christian Smith Jan 2011

Ipv6 Security Basics, John Christian Smith

John Christian Smith

Overview of security considerations in adopting IPv6


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Zest Based Visualization For Requirements Negotiation, Siti Salwah Salim Dec 2010

Zest Based Visualization For Requirements Negotiation, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

Win-Win is one of the most common models which help systems stakeholders resolve conflicts during system Requirements Negotiation (RN). Solving conflicts, however, is barely dependent on visualizing the negotiation itself The Zest algorithm was invented to visualize a standard e-mail discussion and demonstrate a concise overview of the discussion to facilitate a more productive one. This research sought to use this algorithm in visualizing the RN process in groupware. We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm. Our implementation of the algorithm has later been …


Computational Style Processing, Foaad Khosmood Dec 2010

Computational Style Processing, Foaad Khosmood

Foaad Khosmood

Our main thesis is that computational processing of natural language styles can be accomplished using corpus analysis methods and language transformation rules. We demonstrate this first by statistically modeling natural language styles, and second by developing tools that carry out style processing, and finally by running experiments using the tools and evaluating the results. Specifically, we present a model for style in natural languages, and demonstrate style processing in three ways: Our system analyzes styles in quantifiable terms according to our model (analysis), associates documents based on stylistic similarity to known corpora (classification) and manipulates texts to match a desired …


Review Of The Health Information Technology Initiatives In Maryland And Georgia, Maurice Dawson, James Truesdale, Joshua Robinson Dec 2010

Review Of The Health Information Technology Initiatives In Maryland And Georgia, Maurice Dawson, James Truesdale, Joshua Robinson

Maurice Dawson

Health Information Technology (IT) is an important topic within the health community currently. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. In this literature review the findings have been summarized in reference to what is proposed in three states. Key items reviewed are the following; governance, policy/legal, technical infrastructure, business and technical operations,communications/marketing, and relationships to Medicaid/Medicare. With regards to the States of Maryland and Georgia, the State Health Information Exchange (HIE) Cooperative Agreement Program will allow both states to enhance its existing strategic plan and to build an …


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.


Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens Dec 2010

Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens

Maurice Dawson

Aligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing …