Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Other Computer Sciences

Effective Security By Obscurity, John Christian Smith Dec 2011

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


Ipv6 Security Basics, John Christian Smith Jan 2011

Ipv6 Security Basics, John Christian Smith

John Christian Smith

Overview of security considerations in adopting IPv6


Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa Jan 2011

Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa

Martin L Griss

Many context-aware mobile applications require a reasonably accurate and stable estimate of a user’s location. While the Global Positioning System (GPS) works quite well world-wide outside of buildings and urban canyons, locating an indoor user in a real-world environment is much more problematic. Several different approaches and technologies have been explored, some involving specialized sensors and appliances, and others using increasingly ubiquitous Wi- Fi and Bluetooth radios. In this project, we want to leverage existing Wi-Fi access points (AP) and seek efficient approaches to gain usefully high room-level accuracy of the indoor location prediction of a mobile user. The Redpin …