replika saatler türü ciddi olacaktır - anlamlı olmak zorunda değil, gösterişli.
Rolex реплика падкрэсліваюць важныя прадметы першай неабходнасці.

replica horloges betekent dat de 21e eeuw Genève loft faconnier horloge-energie.

2024-03-29T12:10:43Z http://jmeds.eu/index.php/jmeds/oai
oai:ojs.pkp.sfu.ca:article/1 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Issues-in-WiFi-Networks 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications; 3-12 Issues in WiFi Networks Tomai, Nicolae; Babes Bolyai Cluj-Napoca University, Romania Toma, Cristian; Bucharest Academy of Economic Studies 2009-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Issues-in-WiFi-Networks Array The paper has four sections. First section is intro in WiFi technology and terminology. The second section shows the security architectures and algorithms used in WiFi networks. Both important mechnisms: encryption/decryption as well as authentication is analyzed within simple IEEE 802.11 aproach in section three and four. The architectures such as WPA or WPA2 are not subject of this paper.
oai:ojs.pkp.sfu.ca:article/2 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Mobile-Agents-Systems-in-Wireless-Applications 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications; 13-19 Mobile Agents Systems in Wireless Applications Muntean, Mihaela; Timisoara West University, Romania Toma, Cristian; Bucharest Academy of Economic Studies 2009-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Mobile-Agents-Systems-in-Wireless-Applications Array The paper presents an introduction in the Mobile Agents Systems and describes how this technology can be used in wireless applications. Also it is shown the possibility of securing wireless applications that use mobile agents and distributed computing. Wireless networks are a relatively new technology in the LAN market. With the weak encryption and security defined in the IEEE standards, wireless LANs, when improperly deployed or administered, can provide a significant risk to those economic sectors. These sectors include health-care, government, and banking in particular. Increasingly diverse heterogeneous wireless infrastructures in combination with more narrowly defined roles of parties participating in the delivery of applications to mobile users pose new challenges for support for delivering these applications.
oai:ojs.pkp.sfu.ca:article/3 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Future-Developments-in-Non-Repudiation-in-GSM-WAP-Applications 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications; 20-31 Future Developments in Non-Repudiation in GSM WAP Applications Toma, Cristian; Bucharest Academy of Economic Studies, Romania 2009-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Future-Developments-in-Non-Repudiation-in-GSM-WAP-Applications Array The paper presents issues and architectures for mobile applications and GSM infrastructure. The paper shows the redesign of the solution for avoiding denial of service from WAP applications using WIM features. The first section contains the structure of GSM network from voice and data point of view. The security in GSM network is presented in second chapter. The third chapter presents a solution for realizing mobile subscriber non-repudiation. The solution is based on the HTTP protocol over WAP.
oai:ojs.pkp.sfu.ca:article/4 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Survey-of-Mobile-Digital-Rights-Management-Platforms 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications; 32-42 Survey of Mobile Digital Rights Management Platforms Toma, Cristian; Bucharest Academy of Economic Studies, Romania Boja, Catalin; Bucharest Academy of Economic Studies, Romania 2009-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Survey-of-Mobile-Digital-Rights-Management-Platforms Array Based on the development of new communication and data transfer technologies, the mobile solutions for the e-activities have been able to provide new ways to provide multimedia content. This environment describes methods and tools available here, which will bring information, speed and efficiency to any stage and component of the mobile business process. The paper takes into discussion the Digital Rights Management technology in mobile world. The paper presents the main aspects regarding the business and technological models used in mobile digital rights management technology.
oai:ojs.pkp.sfu.ca:article/5 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Java-and-Symbian-M-Application-Distribution-Frameworks 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications; 50-59 Java and Symbian M-Application Distribution Frameworks Popa, Marius; Bucharest Academy of Economic Studies, Romania Doinea, Mihai; Bucharest Academy of Economic Studies Toma, Cristian; Bucharest Academy of Economic Studies 2009-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Java-and-Symbian-M-Application-Distribution-Frameworks Array The paper has three sections. First section is intro in Symbian M-Applications distribution framework. The second section presents Java distribution framework and API for various IT&C solutions. The third section is reserved for conclusions and ideas for future developments.
oai:ojs.pkp.sfu.ca:article/6 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-JME-M-Applications 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 1 (2009): Mobile and Wireless Applications; 43-49 Security Issues for JME M-Applications Boja, Catalin; Bucharest Academy of Economic Studies, Romania 2009-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-JME-M-Applications Array The paper describes the concept of data security in a mobile environment. The objective is to develop Java software applications, MIDlets for mobile devices, which implement data protection at different levels. Existing and proposed solutions are described by defining security models and architectures. From the software development point of view, the paper describes two API’s, JSR 177 [1] and Bouncy Castle Crypto APIs [2] that provide methods to reach needed security levels. The paper is a survey of security practices for J2ME software platform describing the goals and the means to reach them.
oai:ojs.pkp.sfu.ca:article/7 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/7 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions; 60-80 Sample Development on Java Smart-Card Electronic Wallet Application Cristian, Toma; Bucharest Academy of Economic Studies, Romania 2009-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/7 Array In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet application.
oai:ojs.pkp.sfu.ca:article/8 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Secure-Mechanisms-for-E-Ticketing-System 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions; 81-94 Secure Mechanisms for E-Ticketing System Cristian, Toma; Bucharest Academy of Economic Studies, Romania 2009-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Secure-Mechanisms-for-E-Ticketing-System Array The paper presents a secure authentication and encryption scheme for an automatic ticketing system based on symmetric and asymmetric cryptography. Some concepts and terms used in development of secure automatic ticketing system are presented. It is depicted an architecture of the secure automatic ticketing system with its components and their roles in this architecture. The section five presents the authentication and encryption scheme used for secure information from RFID cards. The authentication scheme is based on RSA and AES algorithms and it is inspired from SSL. Parts of this paper are in publishing process in [6], but the authentication and encryption scheme is described exclusivelly in this paper. The necessity of authentication and encryption scheme is given by the attack described in [7].  
oai:ojs.pkp.sfu.ca:article/9 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/On-line-Payment-System-Survey 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions; 95-103 On-line Payment System Survey – eCash Popa, Marius; Bucharest Academy of Economic Studies, Romania Calugaru, Adrian; Bucharest Academy of Economic Studies, Romania 2009-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/On-line-Payment-System-Survey Array The paper presents the main aspects regarding an on-line payment system. Some characteristics of such system are presented and an existing system is analyzed. On its fundamental sense, the electronic commerce is a concept that represents the purchase and sale process or exchange of products, services, information, using o computer network, inclusively the Internet. In the most part of the cases, the electronic commerce imply on-line payments that lead to creation of some kinds of electronic money and some specific payment systems. There are described the some electronic payment mechanisms and the architecture and the functions of the on-line payment system E-Cash are depicted.
oai:ojs.pkp.sfu.ca:article/10 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/DECWEB-Internet-Fiscal-Statement-Submission 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions; 104-111 DECWEB - Internet Fiscal Statement Submission Ianciu, Mihai; UTI Bucharest, Romania Burdun, Costin; UTI Bucharest, Romania Florea, Ionut; UTI Bucharest, Romania 2009-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/DECWEB-Internet-Fiscal-Statement-Submission Array The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C). In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet. DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.
oai:ojs.pkp.sfu.ca:article/11 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Pool-site-E-voting-Security 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions; 112-118 Pool-site E-voting Security Ezeanu, Ciprian; Cybernetics and Economic Informatics Faculty, The Bucharest Academy of Economic Studies 2009-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Pool-site-E-voting-Security Array The aim of this paper is to present e-voting procedure describing its advantages and disadvantages. Conventional security measures such as firewalls or SSL communications are necessary but not sufficient to guarantee the specific security requirements of e-voting. Besides these conventional security measures, it is also necessary to implement an additional layer of specialized security technology to address the specific risks posed by electronic voting and guarantee critical security requirements such as voters’ privacy, vote integrity and voter-verifiability. Analyzing the security of Diebold AccuVote-TS voting machine it was observed the vulnerabilities of this machine to different classes of attacks like: vote-stealing attack, Denial-of-Service (DoS) attack and injecting attack code.
oai:ojs.pkp.sfu.ca:article/12 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/An-Adaptive-Authorization-Model-Based-on-RBAC 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions; 119-126 An Adaptive Authorization Model Based on RBAC Constantinescu, Radu; Bucharest Academy of Economic Studies Corlan, Lucian; UTI Group 2009-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/An-Adaptive-Authorization-Model-Based-on-RBAC Array In the article we present a data model and a possible implementation suited to allow proper access control in a system. In order to do that, we started from the extended RBAC model which is focused on roles which are associated to different functions existing in the system. The access control is implemented not just for some application’s functionalities but also for granulated data details, like data attributes.
oai:ojs.pkp.sfu.ca:article/13 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Some-Results-on-Algebraic-Cryptanalysis-of-A5-Algorithm 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols; 1-7 Some Results on Algebraic Cryptanalysis of A5/2 Algorithm Mihaita, Adela; University of Bucharest, Romania 2010-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Some-Results-on-Algebraic-Cryptanalysis-of-A5-Algorithm Array Algebraic cryptanalysis of A5/2 cipher is the is the subject of this article. Recovering the secret key is reduced to solving a system with several hundreds of quadratic equations for which various methods have been proposed during years. This paper presents some experimental results (concerning the time and the number of frames needed) using different implementations of Groebner basis algorithm for solving the system.
oai:ojs.pkp.sfu.ca:article/14 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Image-Processing-Oriented-to-Security-Optimization 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols; 8-14 Image Processing Oriented to Security Optimization Ivan, Ion; Bucharest Academy of Economic Studies Visoiu, Adrian; Bucharest University of Economic Studies Doinea, Mihai; Bucharest Academy of Economic Studies 2010-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Image-Processing-Oriented-to-Security-Optimization Array This paper presents the main aspects of the digital content security. It describes the content of watermarking, presenting the steganography concept. SteganoGraphy application is presented and the algorithm used is analyzed. Optimization techniques are introduces to minimize the risk of discovering the information embedded into digital content by means of invisible watermarking. Techniques of analyzing the digital content results and identify the possible countermeasures for optimizing the steganography algorithm are presented.
oai:ojs.pkp.sfu.ca:article/15 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/WiMAX-Security-Issues-in-E-learning-Systems 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols; 15-20 WiMAX Security Issues in E-learning Systems Alecu, Felician; Bucharest Academy of Economic Studies Pocatilu, Paul; Bucharest Academy of Economic Studies Capisizu, Sergiu; Bucharest Bar Association 2010-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/WiMAX-Security-Issues-in-E-learning-Systems Array WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations where e-learning distributed platforms need to be used. This paper focuses on security issues for e-learning solutions, especially when WiMAX technology is used.
oai:ojs.pkp.sfu.ca:article/16 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/16 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols; 21-28 Security Engineering and Reengineering on Windows 2008 Server Based Distributed Systems Tomozei, Cosmin; University of Bacau, Romania 2010-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/16 Array The objective of this paper is to reflect on the processes of Security Engineering and Reengineering in Distributed Systems, focused being also about the Windows 2008 Servers. It is very important to provide security and integrity to software applications, hardware and data. We will have in consideration the ways of making reengineering process efficient, including optimization of the encryption and authentication stages.
oai:ojs.pkp.sfu.ca:article/17 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Chess-Cryptosystem 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols; 29-34 Chess Cryptosystem Gatej, Alexandru Miron; Bucharest University 2010-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Chess-Cryptosystem Array In this paper we discuss about a cryptosystem based on chess automata. First we introduce the general notions about the chess games. After that we describe the chess automata that is the main tool for building the key. Finally we describe the operation for encryption process and decryption process, an with that we can present the algorithm.
oai:ojs.pkp.sfu.ca:article/18 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/18 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols; 35-45 Security in SPGBP – Simulation of Protein Generation Bioinformatic Project Cristian, Toma; Bucharest Academy of Economic Studies, Romania Purcaru, Elena; “Carol Davila” University of Medicine and Pharmacy 2010-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/18 Array Bioinformatics has known a rapid growth in the last decade, along with the development of the genomic projects worldwide. The Human Genome Project alone offers the sequences for 70 000 – 100 000 genes, as terra bytes of information. The major challenge nowadays is to process this huge amount of data. This paper comes to suggest a solution for the retrieval and processing of biological data. The main objective of this section is to point a direction in the development of tools that enable manipulation and efficient access to different types of biological data. Also, the major challenge is to use security in the proposed distributed architecture and to import concepts from bioinformatics into cryptography and IT&C security.
oai:ojs.pkp.sfu.ca:article/19 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Integrating-e-Payment-Services-with-RIA-Applications 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 46-50 Integrating e-Payment Services with RIA Applications Pricope, Mihai; Adobe Constantinescu, Radu; Bucharest Academy of Economic Studies 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Integrating-e-Payment-Services-with-RIA-Applications Array Given the expansion of RIA technologies, it is highly important to deliver a set of best practices for developers in order to integrate e-business applications with e-payment systems. In this article we present a solution for the integration of PayPal Express with a RIA application developed on Flex. We focus both on security and functionality issues.
oai:ojs.pkp.sfu.ca:article/20 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Implementing-graphic-passwords-in-Directory-Services-Systems 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 51-55 Implementing graphic passwords in Directory Services Systems Rednic, Emanuil; Academy of Economic Studies Toma, Andrei; Academy of Economic Studies 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Implementing-graphic-passwords-in-Directory-Services-Systems Array This paper presents the necessary steps for the implementation of multimedia password support within Directory Services. The trend of using multimedia mechanisms is quite new and furthermore relatively unused in authentication as well authorization. Implementing this type of password is justified by the increased level of security within the identity management of directory services.
oai:ojs.pkp.sfu.ca:article/21 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/21 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 56-64 Requirements for Development of an Assessment System for IT&C Security Audit Popa, Marius; Bucharest Academy of Economic Studies, Romania 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/21 Array IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The evidences are gathered by audit team and some automation processes to increase the productivity and accuracy of the audit are needed. The paper presents some issues of the requirements for development of an assessment system with some considerations for IT&C security audit. The emphasized issues are grouped in the following sections: IT&C security audit processes, characteristics of the indicators development process and implementation issues of an assessment system.
oai:ojs.pkp.sfu.ca:article/22 2024-03-29T12:10:41Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Key-Recovery-for-Certification-Authorities 2024-03-29T12:10:41Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 65-68 Key Recovery for Certification Authorities Tric, Eduard; Vexilla 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Key-Recovery-for-Certification-Authorities Array The root key is the most important asset of a certification authority. There are several ways to protect it and to make a secure backup copy. We are describing one of the most elegant protection techniques that will be used by a real Certification Authority.
oai:ojs.pkp.sfu.ca:article/23 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/23 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 69-73 The Cost Influence on Reliability and Security of the Software Systems Cristescu, Marian Pompiliu; "Lucian Blaga" University of Sibiu Cristescu, Corina Ioana; CSIE Faculty Cacovean, Laura; "Lucian Blaga" University of Sibiu Martin, Florin; "Lucian Blaga" University of Sibiu 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/23 Array Although, direct economic information’s are, in general, difficult to obtain through reason connected of confidentialities. Currently is observe the relation cost-benefit in the case of the using the software engineering reliability can be from one to six or upwards. More, the software engineering reliability it was credited with the incidents abatement considering to security software related, as well as the costs of servicing.
oai:ojs.pkp.sfu.ca:article/24 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Design-and-Implementation-of-a-Cyber-Defense-Exercise 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 74-83 Design and Implementation of a Cyber-Defense Exercise Furtuna, Adrian; Military Technical Academy 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Design-and-Implementation-of-a-Cyber-Defense-Exercise Array Learning by practice is a very effective way of education in some activity domains, including information security. The article explores this idea by showing how a cyber-defense exercise can be designed and implemented in order to reach its educational goals.
oai:ojs.pkp.sfu.ca:article/25 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Web-Security-in-University-Curricula 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 84-90 Web Security in University Curricula Opincaru, Cristian; Thales Rail Signalling Solutions 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Web-Security-in-University-Curricula Array While Web applications and Web services gain more and more ground, the academic curriculum is not always keeping the pace. This paper presents the content of a course focused on Web security; as such it starts by defining the goals of the course, then defines the topics for the course units and finally describes the topics and the setup for laboratory units. The paper brings its contribution through the design of a course covering security aspects for both Web applications and Web services and through the detailed description of practical units and laboratory setup.
oai:ojs.pkp.sfu.ca:article/26 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/26 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT; 91-100 A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols Popescu, Gabriel; Military Technical Academy 2010-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/26 Array In this paper, a comparative analysis of the major modern tunneling protocols used for  secure virtual private network implementations based on the Internet infrastructure will be elaborated.  The purpose of the paper is to help specialists to choose proper protocols for the specific practical implementations. The need for virtual private networks is explained as an introduction. The technical considerations are iterated, and a full classification of all types of virtual private networks is made, by providing the criteria used. The major tunneling protocols of interest and their advantages and disadvantages are described next. The comparative analysis is presented as a table showing the relevant characteristics of each tunneling protocol. Finally, real world best practices of the tunneling protocols iterated are shown as a conclusion.
oai:ojs.pkp.sfu.ca:article/27 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Vulnerability-Analysis-in-Web-Distributed-Applications 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT; 1-9 Vulnerability Analysis in Web Distributed Applications Ivan, Ion; Bucharest Academy of Economic Studies Palaghita, Dragos; Bucharest Academy of Economic Studies Vinturis, Sorin; Bucharest Academy of Economic Studies Doinea, Mihai; Bucharest Academy of Economic Studies 2011-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Vulnerability-Analysis-in-Web-Distributed-Applications Array The paper analyze vulnerabilities found on web based distributed applications from different perspectives. Classes of vulnerabilities types are identified in order to cope with their different characteristics that each one develops. Methods for analyzing vulnerabilities of an authentication process are developed and solutions are proposed. A model for vulnerability minimization is discussed based on an indicator built on the amount of sensitive data revealed to the end users. Risks are analyzed together with the vulnerabilities that they exploit and measures are identified to combat these pairs.
oai:ojs.pkp.sfu.ca:article/28 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Cryptographic-Applications-using-FPGA-Technology 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT; 10-16 Cryptographic Applications using FPGA Technology Coman, Alexandru; Military Technical Academy Fratila, Radu; Military Technical Academy 2011-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Cryptographic-Applications-using-FPGA-Technology Array Cryptographic systems have become a part of our daily life through the need of security of many common activities such as communication, payments, data transfers etc. The best support in design and implementation of cryptographic applications is offered by embedded systems such as ASICs and FPGAs. In the past few years, the increase in performance of FPGAs has made them key components in implementing cryptographic systems. One of the most important parts of the cryptographic systems is the random number generator used. Combinations of PRNG and TRNG are commonly used. A good and efficient TRNG implementation is very important and can be achieved through FPGA technology.
oai:ojs.pkp.sfu.ca:article/29 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/PKI-Interoperability-Based-on-Online-Certificate-Validation 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT; 17-20 PKI Interoperability Based on Online Certificate Validation Smadu, Dinu; Military Technical Academy 2011-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/PKI-Interoperability-Based-on-Online-Certificate-Validation Array One of the most important problems related to Public Key Infrastructures is the validation of the digital certificates. Certificate validation services can be based on offline and/or online schemes. Offline schemes have the major disadvantage that they cannot always give an up-to-date response. On the other side, the most used protocol for online validation, the Online Certificate Status Protocol [1], also has its drawbacks. It can only state if a certificate has been revoked or not. RFC 5055 [2] defines a more complex protocol, the Server-based Certificate Validation Protocol (SCVP), capable of building and validating the certification path. To implement a basic functionality of this new protocol, we will start from an existing project, the CADDISK and we will try to implement an OpenSSL module.
oai:ojs.pkp.sfu.ca:article/30 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/30 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT; 21-29 Web Single Sign-On Implementation Using the SimpleSAMLphp Application Andronache, Ionut; Military Technical Academy Nisipasiu, Claudiu; Military Technical Academy 2011-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/30 Array Web Single Sign-On is a feature offered by web applications that have a trust relationship, not necessarily within the same company. The goal of Web SSO is to provide authentication information for all the web application in the trust relationship, without requiring the user to login in each web application.  SAML 2.0 is the standard that defines the framework in order to achieve Web SSO and identity federation in a web context. In order to make a Web SSO implementation, we used the open-source SimpleSAMLphp library, which implements the standards of SAML 2.0 and provides functionality for the two scenarios: SAML – Service Provider and SAML – Identity Provider.
oai:ojs.pkp.sfu.ca:article/31 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Interoperability-Issues-for-VPN-IPsec-Solutions 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT; 30-33 Interoperability Issues for VPN IPsec Solutions Danalachi, Iulian; Military Technical Academy Petrescu, Mihai Lucian; Military Technical Academy 2011-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Interoperability-Issues-for-VPN-IPsec-Solutions Array An issue of testing that should be taken into consideration is the compatibility and interoperability of the IPsec components when implementing an IPsec solution. This article will guide us trough some key point introductive notions involved in the interoperability problem, we’ll see a short overview of some of these problems and afterwards we will discuss about some of the testing solutions of IPsec interoperability that we should take into consideration.
oai:ojs.pkp.sfu.ca:article/32 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-2D-Barcodes-Ticketing-Systems 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT; 34-53 Security Issues for 2D Barcodes Ticketing Systems Toma, Cristian; Bucharest Academy of Economic Studies, Romania 2011-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-2D-Barcodes-Ticketing-Systems Array The paper presents a solution for endcoding/decoding access to the subway public transportation systems. First part of the paper is dedicated through section one and two to the most used 2D barcodes used in the market – QR and DataMatrix. The sample for DataMatrix is author propietary and the QR sample is from the QR standard [2]. The section three presents MMS and Digital Rights Management topics used for issuing the 2D barcodes tickets. The second part of the paper, starting with section four shows the architecture of Subway Ticketing Systems and the proposed procedure for the ticket issuing. The conclusions identify trends of the security topics in the public transportation systems.
oai:ojs.pkp.sfu.ca:article/33 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/AES-Encryption-and-Decryption-Using-Direct3D-API 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security; 54-60 AES Encryption and Decryption Using Direct3D 10 API Chiuta, Adrian Marius; Academy of Economic Studies 2011-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/AES-Encryption-and-Decryption-Using-Direct3D-API Array Current video cards (GPUs – Graphics Processing Units) are very programmable, have become much more powerful than the CPUs and they are very affordable. In this paper, we present an implementation for the AES algorithm using Direct3D 10 certified GPUs. The graphics API Direct3D 10 is the first version that allows the use of integer operations, making from the traditional GPUs (that works only with floating point numbers), General Purpose GPUs that can be used for a large number of algorithms, including encryption. We present the performance of the symmetric key encryption algorithm – AES, on a middle range GPU and on a middle range quad core CPU. On the testing system, the developed solution is almost 3 times faster on the GPU than on one single core CPU, showing that the GPU can perform as an efficient cryptographic accelerator.
oai:ojs.pkp.sfu.ca:article/34 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Smart-Cards-Applications-in-the-Healthcare-System 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security; 61-68 Smart Cards Applications in the Healthcare System Oltean, Claudiu; Bucharest Academy of Economic Studies 2011-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Smart-Cards-Applications-in-the-Healthcare-System Array Current medical system based on medical records and health books is outdated and no longer meets the new requirements. Essential information security in terms of data privacy, integrity and authenticity, is not assured. Healthcare fraud with medical records is quite easy, because there is no security features to prevent this. Obtaining prescription drugs is slowly, the patient is forced in most cases, to go to the pharmacy staff to get their prescription. Another issue is data portability because each clinic can use a proprietary format of medical records, which is not always standardized. Modern and efficient healthcare system can be achieved by introducing smart cards and related software. Their introduction in addition to the portability and data security, reduce costs for both patient and medical institutions. The result will be increase confidence and patient satisfaction in medical institutions. Developed software package includes software applications which manage medical archive to smartcard, in a secure form and a software module which can be used for e-commerce transactions. All developed software application meets current standards for data security. Implementation of such solutions in practice would significantly reduce current costs in healthcare system.
oai:ojs.pkp.sfu.ca:article/35 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/35 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security; 69-81 Security Issues in Streaming Server for Mobile Devices Development Barbu, Dan; Academy of Economic Studies 2011-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/35 Array The paper presents a solution for streaming audio and video content in IP networks using RTP and SIP protocols. Second Section presents multimedia format and compression for the audio content that is streamed by SS4MD. Streaming protocols are shown in third section. In the forth section there is an example of an application which does uses all above. Conclusions are contoured in the final chapter.
oai:ojs.pkp.sfu.ca:article/36 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Legal-and-Practical-Aspects-in-Computer-Science-Investigation 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security; 82-90 Legal and Practical Aspects in the Computer Science Investigation Trandafir, Florin Cosmin; Bucharest Academy of Economic Studies 2011-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Legal-and-Practical-Aspects-in-Computer-Science-Investigation Array The present article makes a short introduction in the legal and practical aspects of the computer science investigation. It is well known the fact that a computer can represent an invaluable source of pieces of evidence, both in the civil cases as well as in the criminal ones because it contains data regarding the activities carried out by the suspect with the help of the IT equipment.
oai:ojs.pkp.sfu.ca:article/37 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Rootkits-and-Malicious-Code-Injection 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 2 (2011): Mobile and Embedded Security; 91-99 Rootkits and Malicious Code Injection Vlad, Marius; Bucharest Academy of Economic Studies 2011-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Rootkits-and-Malicious-Code-Injection Array Rootkits are considered by many to be one of the most stealthy computer malware (malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved by loadable kernel code sections, this paper tries to explain common entry points into a Linux kernel and how to keep a persistent access to a compromised machine.
oai:ojs.pkp.sfu.ca:article/38 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/38 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT; 100-108 Methods and Techniques of Quality Management for ICT Audit Processes Popa, Marius; Bucharest Academy of Economic Studies, Romania 2011-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/38 Array In modern organizations, Information and Communication Technologies are used to support the organizations’ activities. To manage the quality of the organization processes, audit processes are implemented. Also, the audit processes can aim the quality of ICT systems themselves because their involvement in organization processes. The paper investigates the ways in which a quality management can be applied for audit processes in order to obtain a high level of quality for the audit recommendations.
oai:ojs.pkp.sfu.ca:article/39 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Security-Survey-of-Internet-Browsers-Data-Managers 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT; 109-119 Security Survey of Internet Browsers Data Managers Boja, Catalin; Bucharest Academy of Economic Studies, Romania 2011-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Security-Survey-of-Internet-Browsers-Data-Managers Array The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.
oai:ojs.pkp.sfu.ca:article/40 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Hiding-Malicious-Content-in-PDF-Documents 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT; 120-127 Hiding Malicious Content in PDF Documents Popescu, Dan Sabin; The Military Technical Academy 2011-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Hiding-Malicious-Content-in-PDF-Documents Array This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF – two of the most widely used file formats). When the victim signs the dual content file, he/ she only sees a PDF document and is unaware of the hidden content inside the file. After obtaining the legally signed document from the victim, the attacker simply has to change the extension to the other file format. This will not invalidate the digital signature, as no bits were altered. The destructive potential of the attack is considerable, as the Portable Document Format (PDF) is widely used in e-government and in e-business contexts.
oai:ojs.pkp.sfu.ca:article/41 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Information-Security-Standards 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT; 128-135 Information Security Standards Tofan, Dan Constantin; Academy of Economic Studies Bucharest 2011-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Information-Security-Standards Array The use of standards is unanimously accepted and gives the possibility of comparing a personal security system with a given frame of reference adopted at an international level. A good example is the ISO 9000 set of standards regarding the quality management system, which is a common reference regardless of the industry in which a certain company activates. Just like quality control standards for other industrial processes such as manufacturing and customer service, information security standards demonstrate in a methodical and certifiable manner that an organization conforms to industry best practices and procedures. This article offers a review of the world’s most used information security standards.
oai:ojs.pkp.sfu.ca:article/42 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/OpenID-a-Single-Sign-On-Solution-for-E-learning-Applications 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT; 136-141 OpenID, a Single Sign-On Solution for E-learning Applications Alecu, Felician; Bucharest Academy of Economic Studies Pocatilu, Paul; Bucharest Academy of Economic Studies Stoica, George; ProSoft Solutions Ciurea, Cristian; Bucharest Academy of Economic Studies Capisizu, Sergiu; Bucharest Bar Association 2011-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/OpenID-a-Single-Sign-On-Solution-for-E-learning-Applications Array The e-learning applications of today require a special focus on security. Distributed e- learning applications have several modules user can access using different clients (desktop or mobile). The same user has several accounts with different credentials. In this context, the SSO (Single Sign-On) solutions become very attractive since the user has to log in once and can access all the needed resources without being prompted again for the username and password. Using the OpenID standard for e-learning Web-based applications is a good and reliable solution because it supports both URL and XRI identifiers. This paper presents the main characteristics of OpenID standard and how this standard could be implemented for a distributed, Web-based, e-learning application.
oai:ojs.pkp.sfu.ca:article/43 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/2D-Barcode-for-DNA-Encoding 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 3 (2011): Security Technologies for ICT; 142-153 2D Barcode for DNA Encoding Purcaru, Elena; “Carol Davila” University of Medicine and Pharmacy Toma, Cristian; Academy of Economic Studies 2011-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/2D-Barcode-for-DNA-Encoding Array The paper presents a solution for endcoding/decoding DNA information in 2D barcodes. First part focuses on the existing techniques and symbologies in 2D barcodes field. The 2D barcode PDF417 is presented as starting point. The adaptations and optimizations on PDF417 and on DataMatrix lead to the solution – DNA2DBC – DeoxyriboNucleic Acid Two Dimensional Barcode. The second part shows the DNA2DBC encoding/decoding process step by step. In conclusions are enumerated the most important features of 2D barcode implementation for DNA.
oai:ojs.pkp.sfu.ca:article/45 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/BWS-Open-System-Architecture-Security-Assessment 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 154-163 BWS Open System Architecture Security Assessment Ionita, Cristian; Bucharest University of Economic Studies 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/BWS-Open-System-Architecture-Security-Assessment K.6 Array Business process management systems play a central role in supporting the business operations of medium and large organizations. Because of this the security characteristics of these systems are becoming very important. The present paper describes the BWS architecture used to implement the open process aware information system DocuMentor. Using the proposed platform, the article identifies the security characteristics of such systems, shows the correlation between these characteristics and the security features implemented by the platform and presents examples of how the security of such systems can be enhanced using the extension mechanism.
oai:ojs.pkp.sfu.ca:article/46 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Web-Enabled-Remote-Laboratories 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 164-171 Web-Enabled Remote Laboratories Ganesan, K.; VIT University, Vellore, India Saranraj, B. S.; VIT University, Vellore 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Web-Enabled-Remote-Laboratories H.3.5 Array This paper describes about accessing the real laboratories using web services.   Students doing the course on “Embedded systems” can perform the various experiments such as analyzing the frequency measurement, generation of pulse width modulation using Freescale-semiconductor’s kit and Digital Storage Oscilloscope (DSO) by giving different input parameters from anywhere at anytime through Internet or Intranet using a webpage provided in a client browser and submit it to a lab server (LS), which is interfaced with Freescale-semiconductor’s kit and digital storage oscilloscope (DSO). The experimental specification is forwarded to the lab server through a service broker. Based on the experimental specifications given by the user, experiments can be conducted on the lab server side using real equipment interfaced with the LS. The application can be executed and the output generated on the DSO can be captured by the lab server machine and one can even convert the results into XML file and send those results to service broker. If user needs, the results can even be displayed on the remote client machine by the service broker. The present work uses iLab architecture which provides three tier client / broker / server architecture for the development and deployment of remote labs.
oai:ojs.pkp.sfu.ca:article/47 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/47 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 172-177 Security Aspects of Collaborative Banking Systems Applied in Economy Ivan, Ion; Bucharest Academy of Economic Studies Ciurea, Cristian; Bucharest Academy of Economic Studies 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/47 K.6.5 H.5.3 Array In this paper are presented theoretical and practical elements regarding collaborative systems applied in economy. There are described their properties and are analyzed implementations of collaborative systems in the banking field. Security requests regarding collaborative banking systems are identified and solutions to increase collaborative systems security level are proposed. The security is analyzed starting from the authentication process and there are presented security elements for collaborative systems after and outside the authentication.
oai:ojs.pkp.sfu.ca:article/48 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/48 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 178-185 Refined Method for Choosing a Security Solution for Mobile Application – Web Service Interactions Trif, Silvia; Bucharest University of Economic Studies Visoiu, Adrian; Bucharest University of Economic Studies 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/48 K.6.5 D.2 H.3.5 Array This paper aims to present a refined algorithm for choosing the appropriate security implementation for mobile applications connecting to web services. Common security scenarios are presented. Each scenario has several characteristics associated. The correlations between these security scenarios characteristics are computed and selected only the characteristics that are less correlated. The proposed algorithm inventories the available scenarios, inventories the requirements and selects the security scenario that match. A case study applies the proposed method to a situation where a WP7 application and a WCF service are interacting. Security scenarios for WCF services and their characteristics are described. Application security requirements are established. A security solution is proposed based on the results of the proposed method.
oai:ojs.pkp.sfu.ca:article/49 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Project-Management-with-IT-Security-Focus 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 186-192 Project Management with IT Security Focus Alecu, Felician; Bucharest Academy of Economic Studies Pocatilu, Paul; Bucharest Academy of Economic Studies Capisizu, Sergiu; Bucharest Bar Association 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Project-Management-with-IT-Security-Focus K.6.1 K.6.5 Array The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress. Also, the project manger skills are highlighted in this specific context.
oai:ojs.pkp.sfu.ca:article/50 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/A-Real-Time-Face-Recognition-System-Using-Eigenfaces 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 193-204 A Real-Time Face Recognition System Using Eigenfaces Georgescu, Daniel; Academy of Economic Studies - Bucharest 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/A-Real-Time-Face-Recognition-System-Using-Eigenfaces I.3.3 I.4 Array A real-time system for recognizing faces in a video stream provided by a surveillance camera was implemented, having real-time face detection. Thus, both face detection and face recognition techniques are summary presented, without skipping the important technical aspects. The proposed approach essentially was to implement and verify the algorithm Eigenfaces for Recognition, which solves the recognition problem for two dimensional representations of faces, using the principal component analysis. The snapshots, representing input images for the proposed system, are projected in to a face space (feature space) which best defines the variation for the face images training set. The face space is defined by the ‘eigenfaces’ which are the eigenvectors of the set of faces. These eigenfaces contribute in face reconstruction of a new face image projected onto face space with a meaningful (named weight).The projection of the new image in this feature space is then compared to the available projections of training set to identify the person using the Euclidian distance.  The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions.
oai:ojs.pkp.sfu.ca:article/51 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Techniques-of-Program-Code-Obfuscation-for-Secure-Software 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions; 205-219 Techniques of Program Code Obfuscation for Secure Software Popa, Marius; Bucharest Academy of Economic Studies, Romania 2011-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Techniques-of-Program-Code-Obfuscation-for-Secure-Software D.2.3 D.3.4 Array The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely used programming language based on Java Development Kit and .NET Framework. The reverse engineering of software is implemented on taking into account the architectures of the software development platforms used by the most part of software developers. The engineering elements of these architectures facilitate understanding and production of data exchange, disassembling and decompiling. The last ones are essential tools to implement the reverse engineering of software. In order to prevent unauthorized disclosure of software engineering techniques, techniques of the source code obfuscation are used. On the other hand, the reverse engineering of software is used in critical software fields like antivirus program development.
oai:ojs.pkp.sfu.ca:article/52 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/52 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 1-11 On the Security of Black-Box Implementation of Visual Secret Sharing Schemes Atanasiu, Adrian; University of Bucharest Olimid, Ruxandra; University of Bucharest Simion, Emil; University of Bucharest 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/52 E.3 D.4.6 Array Cryptographic software and devices give users the ability to take advantage of the benefits of cryptography more easily. However, this implies that the users must totally trust the manufacturer and the authenticity of the device or software they use. Young and Yung were the first to question the correctness of the manufacturer and considered the advantage that a malicious implementation could offer to a specific attacker. In this paper, we consider a modified version of two visual secret sharing schemes and the advantage that they provide to the attacker in order to reconstruct the secret by himself, while the other participants must fulfill the honest scheme reconstruction conditions. We also analyze the security of the proposed mechanisms and the conditions in which they can be applicable.
oai:ojs.pkp.sfu.ca:article/53 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Internet_Banking_Two_Factor_Authentication_using_Smartphones 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 12-18 Internet Banking Two-Factor Authentication using Smartphones Soare, Costin Andrei; IT&C Security Master Department of Economic Informatics and Cybernetics 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Internet_Banking_Two_Factor_Authentication_using_Smartphones D.4.6 Array This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application. The tokens can also serve as a method of signing online money orders. We will prove in this article the cost efficiency of the proposed architecture for both consumers and companies.
oai:ojs.pkp.sfu.ca:article/54 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/54 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 19-24 The Management of Law Firms Using Business Process Management, Document Management and Web Services Integration Petculet, Roxana Maria; IT&C Security Master Department of Economic Informatics and Cybernetics 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/54 J.1 Array The aim of this paper is to present the technical solution implemented in the present context for the management of law firms. The informational system consists of the automation of business processes using a BPM engine and electronic archiving using a DMS. The communication between the two modules is made by invoking web services. The whole system integrates modules like: project management, contract management, invoice management, collection, CRM, reporting.
oai:ojs.pkp.sfu.ca:article/55 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Methods_for_Obfuscating_Java_Programs 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 25-30 Methods for Obfuscating Java Programs Buzatu, Florin; IT&C Security Master Department of Economic Informatics and Cybernetics 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Methods_for_Obfuscating_Java_Programs D.2.3 Array Java programs distributed through internet are suffering of problems like reverse engineering, algorithms theft and unauthorized functional changes. The reason for this issue is that the bytecode from Java class file holds enough information to be decompiled into source code that resembles the original. In this paper, I discuss some practical obfuscation methods that make difficult the understanding of the decompiled programs. The methods analyzed are: lexical obfuscation, data obfuscation, control flow obfuscation, obfuscation methods that make use of the discrepancy between bytecode and source code. In order to evaluate the usefulness of these methods, some metrics will be described.
oai:ojs.pkp.sfu.ca:article/56 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/System_for_Multicast_File_Transfer 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 31-37 System for Multicast File Transfer Custura, Dorin; Department of Economic Informatics and Cybernetics 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/System_for_Multicast_File_Transfer C.2.1 C.2.0 Array The distribution of big files over the network from a single source to a large number of recipients is not efficient by using standard client-server or even peer-to peer file transfer protocols.  Thus, the transfer of a hierarchy of big files to multiple destinations can be optimized in terms of bandwidth usage and data storage reads by using multicast networking. In order to achieve that, a simple application layer protocol can be imagined. It uses multicast UDP as transport and it provides a mechanism for data ordering and retransmission. Some security problems are also considered in this protocol, because at this time the Internet standards supporting multicast security are still in the development stage.
oai:ojs.pkp.sfu.ca:article/57 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Facial_Recognition_using_OpenCV 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 38-43 Facial Recognition using OpenCV Emami, Shervin; NVIDIA Suciu, Valentin Petrut; IT&C Security Master Department of Economic Informatics and Cybernetics 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Facial_Recognition_using_OpenCV I.4.1 I.4.7 I.5.4 Array The growing interest in computer vision of the past decade. Fueled by the steady doubling rate of computing power every 13 months, face detection and recognition has transcended from an esoteric to a popular area of research in computer vision and one of the better and successful applications of image analysis and algorithm based understanding. Because of the intrinsic nature of the problem, computer vision is not only a computer science area of research, but also the object of neuro-scientific and psychological studies, mainly because of the general opinion that advances in computer image processing and understanding research will provide insights into how our brain work and vice versa. Because of general curiosity and interest in the matter, the author has proposed to create an application that would allow user access to a particular machine based on an in-depth analysis of a person’s facial features. This application will be developed using Intel’s open source computer vision project, OpenCV and Microsoft’s .NET framework.
oai:ojs.pkp.sfu.ca:article/58 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Mobile_Remote_Control_Architecture 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 44-51 Mobile Remote Control Architecture Bogdan, George Stefan; IT&C Security Master Department of Economic Informatics and Cybernetics 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Mobile_Remote_Control_Architecture I.3.2 Array When mobile device become more and more popular the need to have a software bridge between them and the old fashioned computers became evident. Many different solutions have appeared to fill the void but few offer more than file sinking or remote SSH (secure shell) connections. For computer professionals and other alike a tool that can do more regarding this connectivity and control gap became necessary. With this paper it is described an architecture and an implementation for creating such a system, underlining the difficulties, challenges and the many choices regarding overall system design, security and implementation that need to be made in order to provide the user with a secure, reliable and professional solution.
oai:ojs.pkp.sfu.ca:article/59 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/A_Short_Resume_of_Romanian_Electronic_Passports_System_ePASS 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions; 52-62 A Short Resume of Romanian Electronic Passports System - ePASS Judea, Claudiu Horatiu; Information Technology Security Master 2012-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/A_Short_Resume_of_Romanian_Electronic_Passports_System_ePASS D.4.6 Array In the context of EU accession, Romania has pledged to reduce cross-border crime and illegal immigration, safeguarding its citizens by issuing biometric passports. Thus, the Romanian Government approved on 24 June 2008 an Emergency Ordinance which provides that the Romanian National Printing Company will produce an exclusive basis, a series of documents, such as biometric passports. Conceptual architecture that describes the technical implementation of the ePass is related to two basic elements: the solution components and operational model for implementation. The components describe the entire hierarchy of components in accordance with the responsibilities they have static relationships between them and how they collaborate to deliver the functionality required of an IT system. Components are the primary concept used in a modular design. A component can be defined as an embedded part of a system that has a well-defined interface that is accessed through its services. Next we present the main components of this system architecture.
oai:ojs.pkp.sfu.ca:article/62 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Techniques_for_Securing_Web_Content 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 63-79 Techniques for Securing Web Content Ursu, Cristian 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Techniques_for_Securing_Web_Content C.2.1 D.1.1 D.1.2 D.2.11 E.1 E.3 H.3.5 I.7.5 K.5.1 K.6.5 Array This paper analyzes the dangers to which web content is exposed, demonstrates how data from the Internet can be gathered and used to obtain profit, how an application can stealthily make use of complicated processing without implementing them and how a website can be cloned in real time. For the considered attacks and vulnerabilities I present, explain, group and evaluate the existing solutions to secure content and last but not least, I suggest a new solution: a library for link encryption.
oai:ojs.pkp.sfu.ca:article/64 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/64 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 80-95 An Alternative Solution to Https for Secure Access to Web Services Iancu, Cristina Livia; Bucharest University of Economic Studies 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/64 K.6.5 Array This paper presents a solution for accessing web services in a light-secure way. Because the payload of the messages is not so sensitive, it is taken care only about protecting the user name and the password used for authentication and authorization into the web services system. The advantage of this solution compared to the common used SSL is avoiding the overhead related to the handshake and encryption, providing a faster response to the clients. The solution is intended for Windows machines and is developed using the latest stable Microsoft technologies.
oai:ojs.pkp.sfu.ca:article/65 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Self-Healing_for_Mobile_Applications 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 96-106 Self-Healing for Mobile Applications Ivan, Ion; Bucharest Academy of Economic Studies Boja, Catalin; Bucharest University of Economic Studies Zamfiroiu, Alin; Bucharest University of Economic Studies 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Self-Healing_for_Mobile_Applications K.6.4 D.2.9 Array The reliability and security of a software application are two of the most important software quality characteristics because they describe the ability of the software to run without failures and to protect user data. Mobile applications concur with desktop applications in terms of rich interfaces and functionalities and are becoming one the most used type of software applications. Based on the “anytime, anywhere” paradigm, mobile applications must provide special measures to avoid failures and to preserve a high level of reliability and security because mobile operating systems provide limited or none access to administrative or system tools that will allow a user with an IT background to access temporary or persistent data. A high level of software reliability is directly influenced by a low level of failures. We there-fore describe self-healing as a required quality characteristic for mobile applications and we propose a metric for measuring it. This approach is included in the general context of mobile applications quality and the papers describes types of mobile applications, their development cycle and features that are particular to mobile applications quality.
oai:ojs.pkp.sfu.ca:article/66 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Agent-Based_Framework_for_Implementing_and_Deploying_of_SOA 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 107-113 Agent-Based Framework for Implementing and Deploying of SOA Butoi, Alexandru; Babes-Bolyai University, Cluj-Napoca Morar, Gabriela Andreea; Babes-Bolyai University, Cluj-Napoca Ilea, Andreea; Babes-Bolyai University, Cluj-Napoca 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Agent-Based_Framework_for_Implementing_and_Deploying_of_SOA D.2.11 Array In distributed organizational and business information systems’ contexts, Service-Oriented Architectures (SOA) provide standard-based and protocol independent solutions. Despite the advances in SOA models and design methodologies, the implementation and deployment of service choreographies are still made in an un-unified manner using the existing tools. We present a three-layered framework model based on deployment agents, which allows designing and implementing service choreographies in a unified and reusable manner using the Object-Oriented Paradigm concepts. Deployment agents contain automatic mechanisms for service deployment which will ease the management of service references involved in service compositions at development time.
oai:ojs.pkp.sfu.ca:article/67 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/67 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 114-120 Study on Audit for Distributed Applications: a Proposal for Simplified Audit Module Architecture Apostu, Anca; Bucharest University of Economic Studies 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/67 D.2.11 Array The tracking and audit services of an informatic system provide the possibility to record the actions performed within the system and the states of the objects, modules and of the application itself. In order to assure a scalable and secure tracking for the auditing service it is important to define the basis of the record process itself, to determine efficient ways to store and process the audit data, to improve the performance and functions that enable a better understanding and use of the event data recorded. The paper presents the main requirements during auditing process in the context of informatic systems and proposes a simplified solution for implementing them in software distributed systems.
oai:ojs.pkp.sfu.ca:article/68 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/An_Advanced_Platform_for_Collaborative_and_Mobile_Enterprise 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 121-133 An Advanced Platform for Collaborative and Mobile Enterprise 2.0 Consoli, Domenico; University of Urbino 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/An_Advanced_Platform_for_Collaborative_and_Mobile_Enterprise D.2.11 C.2.4 Array Recently, a new model of Enterprise 2.0, which interacts actively with customers using web 2.0 tools (chat, forum, blog, wiki, social network) to improve and develop new products/services and to satisfy market requirements, is affirming.  The company to communicate with all stakeholders of the supply chain and to exploit all business services  of the  Information System can use smart and mobile devices. The new model of business, provided of technological tools,  is a mobile and collaborative enterprise that interact, exchange and share information with the internal and external social environment. In this paper we describe, in detail, an advanced platform that integrates various tools and applications and  supports the new model of business. In this way the enterprise can implement a corporate strategy to reach competitive advantages.
oai:ojs.pkp.sfu.ca:article/69 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Virtual_Enterprises_Reach_for_Cloud_Computing 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems; 134-139 Virtual Enterprises Reach for Cloud Computing Davidescu (Vasile), Andreea; Bucharest University of Economic Studies 2012-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Virtual_Enterprises_Reach_for_Cloud_Computing C.2.4 Array UNCTAD reports that enterprises must be able to make the best use possible of ICTs, as they positively affect productivity in both large and small enterprises. New ITC technologies are a prerequisite for the concept of virtual enterprise. They are instruments companies can use in their search for efficiency. IT managers are under constant pressure to deliver optimal support to growing, fluctuating demands from ever-changing applications, to manage spikes and control costs. Many of them turn to virtualization for better distribution of workload on the hardware support. Server virtualization, or application virtualization are milestones on the way to cloud computing. This brings to the table an intelligent approach to virtualization and a business-mind.
oai:ojs.pkp.sfu.ca:article/71 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/MPEG_Video_Security_Using_Motion_Vectors_and_Quadtrees 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 203-208 MPEG Video Security using Motion Vectors and Quadtrees Singhal, Anshul; DA-IICT Das, Manik Lal; DA-IICT 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/MPEG_Video_Security_Using_Motion_Vectors_and_Quadtrees Array Securing multimedia data communication over public channel is a challenging task for protecting digital content from content piracy. Anti-piracy, digital watermarking and ownership verication are some mechanisms for authenticating digital content. The size of multimedia data being generally huge makes it difficult to carry out data encryption and compression for real time data communication. In this paper, we discuss the partial encryption approach in which a part of the compressed data is encrypted and rest of data remain unencrypted. The approach results in signicant reduction of computation and communication time.
oai:ojs.pkp.sfu.ca:article/72 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/About_Group_Digital_Signatures 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 193-202 About group digital signatures Enache, Adriana Cristina; Military Technical Academy 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/About_Group_Digital_Signatures K.6.5 Array Group signatures try to combine security (no framing, no cheating) and privacy(anonymity, unlinkability).A group digital signature is a digital signature with enhanced privacy features that allows members of a given group to anonymously sign messages on behalf of the group, producing a group signature. However, in the case of dispute the identity of the signature's originator can be revealed by a designated entity (group manager). The present paper describes the main concepts about group signatures, along with a brief state of the art and shows a personal cryptographic library implemented in Java that includes two group signatures.
oai:ojs.pkp.sfu.ca:article/74 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Secure_Disk_Mixed_System 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security; 209-214 Secure Disk Mixed System Ri, Myongchol; PhD student, Graduate School of Kim Il Sung University, D.P.R.K An, Dokjun; Faculty of mathematics, Kim Il sung University, D.P.R.K Choe, Changil; Faculty of mathematics, Kim Il sung University, D.P.R.K Han, Sunam; Faculty of mathematics, Kim Il sung University, D.P.R.K 2012-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Secure_Disk_Mixed_System K.6.5 D.4.6 Array We propose a disk encryption method, called Secure Disk Mixed System (SDMS) in this paper, for data protection of disk storages such as USB flash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitations of existing disk encryption methods and to control security performance flexibly according to the security requirement of system.
oai:ojs.pkp.sfu.ca:article/75 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/75 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 140-149 About the Key Escrow Properties of Identity Based Encryption Schemes Olimid, Ruxandra; University of Bucharest 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/75 K.6.5 Array IBE (Identity Based Encryption) represents a type of public key encryption that allows a party to encrypt a message using the recipient’s identity as public key. The private keys needed for decryption are generated and distributed to each party by a KGC (Key Generation Center). The existence of such an entity in an IBE scheme allows access to the encrypted information for other parties other than the intended recipient by construction: the KGC or any other entity that receives the cryptographic keys from the KGC may perform decryption. A system that permits other parties to have access to the private keys of the users is said to have key escrow abilities. The paper performs a brief analysis of the key escrow properties of IBE schemes and gives a practical example of communication protocol that improves the key escrow capabilities.
oai:ojs.pkp.sfu.ca:article/76 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/76 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 150-158 The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality Militaru, Traian Lucian; Politehnica University of Bucharest Suciu, George; Politehnica University of Bucharest Todoran, Gyorgy; Politehnica University of Bucharest 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/76 D.2.9 Array This paper proposes an expert system which can be used to evaluate the quality of an e-learning platform. The proposed expert system is using the modified version of the SEEQUEL Core Quality Framework and it was built using CLIPS expert system generator. The SEEQUEL Core Quality Framework originated from the collaboration between the e-learning Industry Group (eLIG) with a number of European expert organizations and associations, coordinated by the MENON Network, is a framework used to build the quality tree by selecting the quality characteristics from a list of common characteristics applicable to the whole e-learning experience. CLIPS is a productive development and delivery expert system tool which provides a complete environment for the construction of rule based expert systems. In the first part of this paper the SEEQUEL Core Quality Framework and CLIPS expert system generator are presented showing the advantage of using an expert system for this task. In the second part, a case study of evaluating an e-learning platform is presented. The final conclusion of the experiment was that an expert system can successfully replace a human expert for the proposed task.
oai:ojs.pkp.sfu.ca:article/77 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Secure_Single_Sign-On_using_CAS_and_OpenID 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 159-167 Secure Single Sign-On using CAS and OpenID Ionita, Mihai Gabriel; Military Technical Academy 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Secure_Single_Sign-On_using_CAS_and_OpenID D.4.6 Array As the number of connected applications increases, user convenience makes them use the same password, which can create vulnerabilities in an organization’s infrastructure. Therefore, those with security concerns regarding these activities, conducted in the electronic environment, came to support the idea of ​​Single Sign-On systems, having the user in mind. This concept facilitates the authentication process to various resources available on the Internet, or locally, using a single pair of credentials, only once, so it makes the „one for all” password, the method of writing passwords on post-it’s glued to the monitor , or keeping them stored in unsecured text files, sent into oblivion. This paper aims to make a comprehensive analysis of the infrastructure of security and authentication systems on the market. On the other hand, the project presents the implementation of several open source solutions such as OpenID, NTLM in PHP or the Central Authentication Service. For the application that uses OpenID an online store that has an administration page, to which access is restricted using OpenID credentials, was further secured by filtering these IDs in a MySQL database to prevent access to anyone having a valid OpenID credential. For the demonstration of NTLM enabled SSO, another website is used in which access has been blocked to a page. For accessing the page, a valid Windows authentication credential is required. Both the online-shop and demonstration site for NTLM are written in PHP. In addition, the systems using them are implemented also using PHP. For implementing the CAS demo, two Tomcat servlets have been used for demonstration purposes, additional filtering being done by an ApacheDS server.
oai:ojs.pkp.sfu.ca:article/78 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/78 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 168-174 A Study of Implementing an Information Security Management System for Open Source Cloud Computing Suciu, George; Politehnica University of Bucharest Poenaru, Vlad; POLITEHNICA University Bucharest Cernat, Cristian; POLITEHNICA University Bucharest Militaru, Traian Lucian; Politehnica University of Bucharest Todoran, Gyorgy; Politehnica University of Bucharest 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/78 D.4.6 Array An Information Security Management System (ISMS) contains a coordinated set of activities, processes, controls, and policies with the purpose of protecting and managing the information assets within an organization. In this paper we present the way in which an ISMS as specified in the ISO 27001 can be applied for the cloud and implemented on our test platform based on SlapOS, the first open source provisioning and billing system for distributed cloud computing. The goal of this paper is to demonstrate a new and easier way to manage security for the cloud, with a specific focus on distributed cloud computing. We will present the results measured by applying ISMS controls for ensuring levels of QoS and SLA according to contracts, moreover also optimizing the costs and resources used by the cloud platform.
oai:ojs.pkp.sfu.ca:article/79 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Securing_SIP_An_Easy_and_Effective_Solution 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 183-192 Securing SIP: An Easy and Effective Solution Cojanu, Cristian; Bucharest University of Economic Studies 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Securing_SIP_An_Easy_and_Effective_Solution D.4.6 Array Session Initiation Protocol (SIP) has become in recent years a common choice regarding  voice communication services because it is a cost effective solution and offers multiple features. Unfortunately, security is not one of them by default. In general, SIP-based solutions implemented in companies or as services on the internet do not offer any kind of privacy or confidentiality. Most companies that use SIP systems rely on the protection offered by a firewall between the LAN and the WAN. Some probably view this as a good compromise. However, when taking into account the fact that a good percentage of the attacks on IT systems come from inside the LAN, it becomes obvious that just the firewall is not enough and in this case not only the IT services are affected, but so do the voice communications system. Because SIP is a text-based protocol similar to HTTP, an attacker can find out not only information like the IP addresses of the phones and of the SIP system but also when, with whom, how long and what someone has talked on the phone. This paper will analyze the current security solutions and our approach to this matter.
oai:ojs.pkp.sfu.ca:article/80 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/80 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities; 175-182 Live Forensics – Extracting Credentials on Windows and Linux Systems Itoafa, Liviu; Military Technical Academy 2012-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/80 D.4.6 Array ’Post-mortem’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them.  As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients ...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings, and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application.
oai:ojs.pkp.sfu.ca:article/81 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Binary_Code_Disassembly_for_Reverse_Engineering 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security; 233-248 Binary Code Disassembly for Reverse Engineering Popa, Marius 2012-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Binary_Code_Disassembly_for_Reverse_Engineering D.3.2 D.3.4 D.2.7 D.4.6 Array The disassembly of binary file is used to restore the software application code in a readable and understandable format for humans. Further, the assembly code file can be used in reverse engineering processes to establish the logical flows of the computer program or its vulnerabilities in real-world running environment. The paper highlights the features of the binary executable files under the x86 architecture and portable format, presents issues of disassembly process of a machine code file and intermediate code, disassembly algorithms which can be applied to a correct and complete reconstruction of the source file written in assembly language, and techniques and tools used in binary code disassembly.
oai:ojs.pkp.sfu.ca:article/82 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Automated_Internet_Datamining_IQL 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security; 215-223 Automated Internet Data-mining - IQL Stanescu, Catalin; Bucharest University of Economic Studies 2012-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Automated_Internet_Datamining_IQL C.2.6 H.2.8 Array This article presents the Internet Query Language (IQL) tool – an open-source software for automated data mining, processing, presentation and formatting. It automates complex multi-threaded tasks through a specialized query language adapted to hierarchical data while employing data processing techniques common to the internet medium and familiar to current developers. The tool is modular and it's various components can be employed for other use cases.
oai:ojs.pkp.sfu.ca:article/83 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/83 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 4 (2012): Advances in Data Processing and Security; 224-232 Homomorphic Encryption Schemes and Applications for a Secure Digital World Maimut, Diana Stefania; École Normale Supérieure Patrascu, Alecsandru; Politehnica University of Bucharest Simion, Emil; Advanced Technologies Institute 2012-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/83 D.4.6 Array As stated by NIST in "Guidelines on Security and Privacy in Public Cloud Computing", lowering costs for computing resources made Cloud Computing attractive for different organizations and users. Modern software applications that run on desktops, Cloud or mobile device ecosystems are exposed to many security threats. For instance, there are security issues that affect the processing of confidential data in the Cloud because the providers of Cloud services have full access to the hardware, storage, software and as a result, to confidential data. Furthermore malicious software can be ran in the Cloud or and attack other Cloud services to retrieve confidential information. Mainly the mobile device ecosystem is vulnerable because the digital assets and confidential data they contain represent an attractive target for the attackers. Assuming fully homomorphic encryption schemes, which allow computing any function over encrypted data, will become fast enough to be considered practical, privacy concerns with respect to desktop, Cloud or mobile services could be solved.
oai:ojs.pkp.sfu.ca:article/84 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Facial_Feature_Point_Selection_for_Robust_Face_Recognition 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 6-10 Local Illumination Normalization and Facial Feature Point Selection for Robust Face Recognition HAN, Song; KIM IL SUNG University, Pyongyang KIM, Jinsong KIM, Cholhun JO, Jongchol 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Facial_Feature_Point_Selection_for_Robust_Face_Recognition I.4.8 I.5.4 Array Face recognition systems must be robust to the variation of various factors such as facial expression, illumination, head pose and aging. Especially, the robustness against illumination variation is one of the most important problems to be solved for the practical use of face recognition systems. Gabor wavelet is widely used in face detection and recognition because it gives the possibility to simulate the function of human visual system. In this paper, we propose a method for extracting Gabor wavelet features which is stable under the variation of local illumination and show experiment results demonstrating its effectiveness.
oai:ojs.pkp.sfu.ca:article/86 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Automatic_Search_of_Web_APIs_Exposed_in_the_Open_Source_Context 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 11-17 Automatic Search of Web APIs exposed in the open source context Cioloca, Cecilia; The Bucharest University of Economic Studies Zurini, Madalina; The Bucharest University of Economic Studies Georgescu, Mihai; The Bucharest University of Economic Studies 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Automatic_Search_of_Web_APIs_Exposed_in_the_Open_Source_Context Array The Service Oriented Architecture is presented in the context of organizations today. The Web APIs are being defined. Architecture for Web APIs aggregation is proposed. The components of the architecture are detailed.  A method for automatic feature extraction from Web APIs is proposed in order to generate the input data for k Nearest Neighbor search algorithm. The main directions of kNN algorithm are highlighted along with the advantages and disadvantages appeared. A structure for Web APIs is formed out of the features extracted for a homogeneity approach and the output data is used in a hierarchical searching result. An optimization method is proposed for lowering the time consumption given by the high complexity level, using a grid formed out of cell searching algorithm.
oai:ojs.pkp.sfu.ca:article/87 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/87 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security; 90-100 Performance Analysis of Load Based Energy-Saving Strategies for Real Time Traffic in IEEE 802.16e Goswami, Veena; KIIT University Misra, Chinmoy; KIIT University 2013-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/87 C.2.1 Array In wireless and mobile telecommunication systems, the handheld mobile devices completely sustains on lightweight batteries for power supply. This mobile station dissipates lots of energy if it listens to base station continuously for intended messages. This paper presents a discrete time renewal input single and batch service queueing system with accessibility to the batches which is capable of calculating the power efficiency and packet access delay for the power saving type II. A cost model is developed to determine the optimum service rates which minimize the total expected cost. Various performance measures are provided based on this analysis. It is shown numerically that the proposed model can work efficiently to improve the system performance and establish the dependency relationships among the system performance measures and the system parameters.
oai:ojs.pkp.sfu.ca:article/88 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/88 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics; 58-62 NCloud - Experimenting with Architecting and Facilitating Utility Services for establishing Educational Cloud Bhavsar, Madhuri; Nirma Institute Of Technology , Nirma University , Ahmedabad 2013-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/88 Array Academic Institutions as well as Enterprises all over the globe have become heavily dependent on high performance computing systems for their day to day activities and hence it continues to seek opportunities to rationalize and optimize the utilization of resources. Continuous upgradation  of software and hardware have become important items of those organizations meetings creating budget pressure. In such scenario, Cloud computing services could provide many of those organizations to enhance the productivity keeping the budget expenditure low.The paper discusses the experiments carried out on our educational campus for architecting the cloud – hereafter referred as NCloud (Cloud built on Nirma Campus), configured using open source tools, furnishes the utility services which is leading towards an establishment of  a stepping stone for formation of knowledge cloud. Testbed formed for data center consists of 1 front-end and 16 worker node.  By using NCloud, user will be able to fulfill the demand  of infrastructure as a service in which user is provided an operating system with specific RAM and CPU cores. Utility oriented services in NCloud aims to charge user for what they use. For implementing utility oriented services, analysis of various major cloud providers is done including pricing models. Performance measures on heterogeneous platforms and the results obtained are included in the paper.
oai:ojs.pkp.sfu.ca:article/89 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Database_Versioning_a_Transparent_SQL_Approach 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 1-5 Database Versioning, a Transparent SQL Approach Cioranu, Cosmin; Executive Unit for Higher Education, Research, Development and Innovation Funding Cioca, Marius; “Lucian Blaga” University of Sibiu 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Database_Versioning_a_Transparent_SQL_Approach H.2 H.2.3 Array In today’s times every piece of software no matter the complexity, produces data, redundant or otherwise, that needs or should be stored in a permanent storage. The simplest way is a file system, but where the need of complexity and flexibility is required, most system designers prefer to use some kind of Database Management System (DBMS). Even with such a management system, on large amounts of data, combined with information updates, it raises the need to retrieve and track the history of modifications of a  specific information alongside the dependencies that makes it coherent. Considering the above the natural solution is to have a database revision or versioning system in which the existing algorithms will still perform without or little modifications and the cost of implementation of such a solution is minimal.
oai:ojs.pkp.sfu.ca:article/90 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/90 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 29-35 Electronic Wallet and Access Control Solution Based on RFID MiFare Cards Lefter, Stefan Victor; The Bucharest University of Economic Studies 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/90 C.3 Array With the advent of Radio Frequency Identification technologies or RFID for short, different types of products and security-relevant applications have been developed for use in fields and businesses like: inventory management, product tracking, access control, passports or transport fare collection. Even though RFID has been around for quite some time, there are some types of businesses like theme parks, water parks or music festivals that haven’t yet tested the benefits that this technology brings. This paper focuses on presenting advantages and disadvantages of using an unified access control and electronic wallet system based on RFID cards like MiFare tags as an alternative to existing ticket/currency access and payment systems employed by the majority of the businesses mentioned above.
oai:ojs.pkp.sfu.ca:article/91 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Security_Principles_in_ERP_Systems 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 36-44 Security Principles in ERP Systems Pascu, Cosmin; The Bucharest University of Economic Studies 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Security_Principles_in_ERP_Systems H.2 H.2.7 Array Enterprise Resource Planning systems are a critical component nowadays of any private company or public institution. Because of their complexity and their importance to all the core functions of an organization, security represents a major concern that’s often overlooked besides the standard set-up. In this paper I will explain the architecture of Oracle E-Business Suite, one of the most widely spread ERP solutions, its security problems and an approach to solving them, hardening and customizing an Oracle E-Business Suite Application
oai:ojs.pkp.sfu.ca:article/92 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/92 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 18-28 Practical Issues using Distributed Computing Environments – Apache Hadoop Cristian, Toma; Bucharest Academy of Economic Studies, Romania 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/92 C.2.4 Array The paper presents practical results obtained with sequential standard programming, RPC/RMI mechanism and Apache Hadoop distributed computing platform for a problem of computation time and power that might be used in e-mail text searching. First section is about Distributed Computing technologies and middleware introduction. In second and third section are shown few details about RPC/RMI and Apache Hadoop approaches. The fourth section presents the results of the computation for a classic problem such as word counting from large text files using standard versus remote procedure call versus map-reducing approach. In the end are shown the main advantages of the distributed systems and computing environments.
oai:ojs.pkp.sfu.ca:article/93 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Mobile_Solution_for_Digital_Signature 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 1 (2013): Advances in Data Processing; 45-50 Mobile Solution for Digital Signature Udrea, Cristian; The Bucharest University of Economic Studies 2013-03-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Mobile_Solution_for_Digital_Signature E.3 Array This article describes a mobile interpretation of the PKI architecture used in document digital signature. The architecture relies on a three-way client-server model which communicates via a combination of Bluetooth and Wireless LAN channels. The idea of implementing such a system using an Android device as the signee is an alternative to the more traditional approach which uses desktop applications and USB tokens for digital certificate storage and use.
oai:ojs.pkp.sfu.ca:article/94 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Forecasting_Exchange_Rates_with_Mixed_Models 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics; 84-89 Forecasting Exchange Rates with Mixed Models Badea, Laura Maria; The Bucharest University of Economic Studies 2013-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Forecasting_Exchange_Rates_with_Mixed_Models Array Gaining accuracy in exchange rate forecasting applications provides true benefits for financial activities. Supported today by the advancements in computing power, machine learning techniques provide good alternatives to traditional time series estimation methods. Very approached in time series forecasting are Artificial Neural Networks (ANNs) which offer robust results and allow a flexible data manipulation. When integrating both, the “white-box” feature of conventional methods and the complexity of machine learning techniques, forecasting models perform even better in terms of generated errors. In this study, input variables (independent variables) are selected using an ARIMA technique and are further employed in differently configured multilayered feed-forward neural networks using Broyden-Fletcher-Goldfarb-Shanno (BFGS) optimization algorithm to perform predictions on EUR/RON and CHF/RON exchange rates. Results in terms of mean squared error highlight good results when using mixed models.
oai:ojs.pkp.sfu.ca:article/95 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Adaptive_Learning_Management_System 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics; 70-77 Adaptive Learning Management System Moisa, Violeta; Doctoral School of Economic Informatics Academy of Economic Studies Bucharest 2013-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Adaptive_Learning_Management_System Array This article is an introduction to a new model for an adaptive Learning Management System. It presents the current e-learning standards and describes the elements that can be used to create the system: the sequencing control modes, sequencing rules, navigation controls, learning records and learning record stores. The model is based on artificial intelligent algorithms that analyze the data captured for each user and creates an adaptive navigation path through the learning content of the system, allowing each user to experience the content in different ways
oai:ojs.pkp.sfu.ca:article/96 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/96 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics; 51-57 Management of Mobile Web Application Development with Quality Assurance Zamfiroiu, Alin; Bucharest University of Economic Studies Vintila, Bogdan; Bucharest University of Economic Studies 2013-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/96 K.6.4 C.1.3 Array Mobile applications are becoming increasingly used because of the multitude of existing mobile devices. Mobile application development becomes more complex. For mobile devices there are native applications that run directly on the device, web applications accessed via mobile browsers and hybrid applications. Mobile Application Development in any form should be made with quality assurance since when determining the target group and the application architecture. Management of mobile application development is the result obtained and the quality of applications developed in the decisions taken. In this paper decisions made in the development of mobile web applications are presented and how this mobile web application is used by the students.
oai:ojs.pkp.sfu.ca:article/97 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/M-Health_Use_of_Mobile_Devices_in_Telemedicine 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics; 63-69 M-Health: Use of Mobile Devices in Telemedicine Gheorghe, Mihaela; The Bucharest University of Economic Studies 2013-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/M-Health_Use_of_Mobile_Devices_in_Telemedicine J.3 C.1.3 Array This paper presents an overview of the healthcare system which needs to be permanently adapted to the newest technologies in order to assure the quality and performance improvements of the medical services. The mobile environment adaption in telemedicine has developed a new domain named m-Health. In the end of the paper I’ll briefly introduce my proposed pilot development of a mobile health application. My ongoing research has been focused upon conceiving a way to increase the efficiency and quality of the medical care system from the physician’s point of view.
oai:ojs.pkp.sfu.ca:article/98 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/The_Internet_as_a_Technology_and_Catalyst_for_Growth 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics; 78-83 The Internet as a Technology and Catalyst for Growth Davidescu (Vasile), Andreea; Bucharest University of Economic Studies 2013-06-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/The_Internet_as_a_Technology_and_Catalyst_for_Growth K.4 Array The Internet is often assimilated, or restricted to the dot-coms, considered creator of new business, of new rules and new worlds and fail to see how it has done so much more than that. How it has influenced dramatically the way we do business and the way we live our lives, keeping within the frames of our old business strategies or life paths. It has changed our rhythm. The Internet is to the business world what access to water or medical care is to population. It is the impact of the Internet that makes us take a close look at its development and raise the question whether the Internet represents a new business model, a new business era, significantly different from b.i.e. (before the Internet era), a completely new alphabet or it is a technology that makes new stories possible, written as they may be in the same old business alphabet. The worldwide penetration of the Internet gives it the global impact and we are going to address the importance of the Internet and the dimensions of the phenomenon, its impact on growth. We will afterwards talk about its history and the peek of the dot-com era. The mature stage of the Internet and its numerous uses draws us to our conclusion that although the Internet did create new viable business models, it does more than that. It is a technology that influences present time the same as electricity shaped the world starting with the XIX century. I will draw a parallel between the Industrial Revolution’s electricity and the Third Revolution’s Internet.
oai:ojs.pkp.sfu.ca:article/99 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/99 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security; 101-107 WSD Implementation for Processing Improvement of Structured Documents Zurini, Madalina 2013-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/99 Array The term of word sense disambiguation, WSD, is introduced in the context of text document processing. A knowledge based approach is conducted using WordNet lexical ontology, describing its structure and components used for the process of identification of context related senses of each polysemy words. The principal distance measures using the graph associated to WordNet are presented, analyzing their advantages and disadvantages. A general model for aggregation of distances and probabilities is proposed and implemented in an application in order to detect the context senses of each word. For the non-existing words from WordNet, a similarity measure is used based on probabilities of co-occurrences.
oai:ojs.pkp.sfu.ca:article/103 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Analysis_of_Zero-Day_Vulnerabilities_in_Java 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security; 108-117 Analysis of Zero-Day Vulnerabilities in Java Popa, Marius; Bucharest University of Economic Studies 2013-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Analysis_of_Zero-Day_Vulnerabilities_in_Java C.2.0 D.4.6 F.3.2 K.6.5 Array The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software providers. The paper highlights the main features of such kind of vulnerabilities, some exploitation methods and examples of them for Java zero-day vulnerabilities and how protection strategies can be built on intelligence extracted from attack anatomy analysis.
oai:ojs.pkp.sfu.ca:article/104 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Online_Digital_Trading 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security; 118-123 Online Digital Trading Alecu, Felician; Bucharest Academy of Economic Studies Pocatilu, Paul; Bucharest University of Economic Studies Dina, Razvan; Bucharest University of Economic Studies Vespan, Dragos; Bucharest University of Economic Studies 2013-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Online_Digital_Trading K.4.1 Array This paper summarizes the main options a digital content creator has in order to obtain money by online trading of digital works. There are multiple ways to get paid for the digital products, like licensing, for example, however this article tries to present the most successful business models targeting the online market. The exclusive rights stated by the copyright laws are helping the authors to maximize to potential advantages coming from their digital creations.
oai:ojs.pkp.sfu.ca:article/105 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Approaches_on_Internet_of_Things_Solutions 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 3 (2013): Performance and Security; 124-129 Approaches on Internet of Things Solutions Cristian, Toma; Bucharest Academy of Economic Studies, Romania Ciurea, Cristian; Bucharest University of Economic Studies Ivan, Ion; Bucharest University of Economic Studies 2013-09-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Approaches_on_Internet_of_Things_Solutions C.2.5 Array The Internet of Things (IoT) ecosystem is presented with its features and particularities in the first section of the paper. In the second section are presented the technical terminology and how inter-domain technologies such as: Internet/Semantic and Middleware, RFID/NFC and Smart Objects-embedded devices are linked together. The paper shows an implementation of the authentication procedure with a proximity tag/card implemented in Java SE, in the third section. The conclusions are presented in the fourth section and they describe the opportunity to develop a proof of concept project, which may have multiple implementations.
oai:ojs.pkp.sfu.ca:article/106 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Adaptable_Alternate_Reality_Games_Platform 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies; 130-135 ADAPTABLE ALTERNATE REALITY GAMES PLATFORM Cotfas, Liviu-Adrian; ELLIADD Laboratoire, Objets et Usages Numériques Team, Université de Franche-Comté Roxin, Ioan; ELLIADD Laboratoire, Objets et Usages Numériques Team, Université de Franche-Comté 2013-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Adaptable_Alternate_Reality_Games_Platform Array In this paper, we present an alternate reality games platform that facilitates the creation of ARG projects with different themes and sizes. The platform is well integrated with the most important social media networks, thus facilitating both the involvement of the public and the creation of a more engaging interaction for the participants. A cloud-based architecture was used in order to allow the platform to easily accommodate projects of various sizes and to provide a good level of scalability. The platform is fully localizable in any language and multiple languages can be used at once to create projects that target users from different countries. An initial project that uses gamification to create an immersive learning environment has been created around the developed platform. The project combines professional and public feedback in order to provide an enhanced learning experience.
oai:ojs.pkp.sfu.ca:article/109 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Encryption_as_a_Service_using_Parallel_Computing_Frameworks 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies; 136-141 Encryption as a Service using Parallel Computing Frameworks Stanimir, Alexandru Costin; The Bucharest University of Economic Studies 2013-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Encryption_as_a_Service_using_Parallel_Computing_Frameworks D.4.6 F.1.2 Array In this article I present a study of an implementation named Encryption as a service which is a web service that can be deployed on a various number of devices and that can take advantage of parallelism in order to provide basic functionality of a cryptographic system: encrypt, decrypt and store data. This goal was achieved by implementing symmetric key cryptography algorithm Advanced Encryption Standard (AES) using Open Computing Language (OpenCL) and exposed this functionality through a REST web service .The performance results were obtained by deploying this solution on Windows Azure platform in order to take advantage of 20x CPU computing power m Amazon Web Service platform equipped with 2x Nvidia Tesla K20 GPU and regular home user hardware. This study represents a first step in a broader project which final goal is to provide full support for all encryption algorithms.
oai:ojs.pkp.sfu.ca:article/110 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/110 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies; 142-147 Location/ID Separation Protocol as Solution for Enterprise Networks Teodorescu, Florin; The Bucharest University of Economic Studies 2013-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/110 C.2.2 Array The increased rate of expansion and adoption of the internet has raised a lot of challenges for implementing and designing network infrastructures. Among the most important challenges we find the need to have an efficient routing and address system to cope with the increasing number of devices with internet access, and also to ensure the security of these devices against malicious attacks and prevent access to confidential data. Separating the devices identity from its location by implementing the Loc/ID Split scheme, and implementing Virtual Private Networks (VPN) offer the technical support needed to overcome these challenges and increase efficiency and lower implementation costs. The scope of this article is to analyze the benefits of using Location/ID Separation Protocol together with a VPN implementation for creating a scalable infrastructure for the internet of the feature and for secure enterprise networks. The advantages and limitation of such architecture are presented below.
oai:ojs.pkp.sfu.ca:article/111 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Security_of_Mobile_Tracking_Systems 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies; 148-153 Security of Mobile Tracking Systems Dinu, Dan Mihai; The Bucharest University of Economic Studies 2013-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Security_of_Mobile_Tracking_Systems D.4.6 C.1.3 Array This document will describe an implementation of a closed Mobile Tracking System which can be used with Android devices but can be extended to any platform. A user is able to setup the system and permanently receive location updates from his tracked devices. The system is completely secured and it sends transparent location updates. It can be used in many ways. As a Proof of Concept the system will be implemented over a Car Fleet Tracking example.
oai:ojs.pkp.sfu.ca:article/112 2024-03-29T12:10:42Z jmeds:ART
v2 http://jmeds.eu/index.php/jmeds/article/view/Secure_Inter_Process_Communication 2024-03-29T12:10:42Z Journal of Mobile, Embedded and Distributed Systems Vol. 5 No. 4 (2013): Security for Mobile technologies; 154-161 Secure Inter-Process Communication Radulescu, Valentin; The Bucharest University of Economic Studies 2013-12-30 Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).The author(s) is responsible for the correctness and legality of the paper content.Papers that are copyrighted or published will not be taken into consideration for publication in JMEDS It is the author(s) responsibility to ensure that the paper does not cause any copyright infringements and other problems.It is the responsibility of the author(s) to obtain all necessary copyright release permissions for the use of any copyrighted materials in the paper prior to the submission.The Author(s) retains the right to reuse any portion of the paper, in future works, including books, lectures and presentations in all media, with the condition that the publication by JMEDS is properly credited and referenced.JMEDS articles by Journal of Mobile, Embedded and Distributed Systems (JMEDS) is licensed under a Creative Commons Attribution 4.0 International License.Based on a work at http://jmeds.eu.Permissions beyond the scope of this license may be available at http://jmeds.eu/index.php/jmeds/about/submissions#copyrightNotice. url:http://jmeds.eu/index.php/jmeds/article/view/Secure_Inter_Process_Communication D.4.1 Array This article reveals the necessity in modern distributed systems for authentication of a process running in a distributed system and to provide a secure channel for inter-process communication in which both the client authenticates to the server and the server authenticates to the client. The distributed system is a client-server system based on ENEA LINX inter-process communication framework. Enea LINX is a Linux open source project which allows processes to exchange information between several media channels: shared memory (local process communication), Ethernet (local network inter process communication), TCP/IP (inter process communication through Internet) in which nodes are communicating regardless of the underlying media. Because ENEA LINX offers no security mechanism it appears the need for securing the communicating over LINX protocol. Process authentication disables the need for personal authentication of the user and also prevents an attacker from starting a process which will harm the entire system. Besides authentication, using public key combined with symmetric key technologies the secure inter-process communication system must provide integrity and confidentiality.
c6ad40c3fb94a983994ffad2e9bcf0cc