replika saatler türü ciddi olacaktır - anlamlı olmak zorunda değil, gösterişli.
Rolex реплика падкрэсліваюць важныя прадметы першай неабходнасці.

replica horloges betekent dat de 21e eeuw Genève loft faconnier horloge-energie.

2024-03-28T09:36:08Z http://jmeds.eu/index.php/jmeds/oai
oai:ojs.pkp.sfu.ca:article/1 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "090630 2009 eng " 2067-4074 dc Issues in WiFi Networks Tomai, Nicolae Babes Bolyai Cluj-Napoca University, Romania Toma, Cristian Bucharest Academy of Economic Studies The paper has four sections. First section is intro in WiFi technology and terminology. The second section shows the security architectures and algorithms used in WiFi networks. Both important mechnisms: encryption/decryption as well as authentication is analyzed within simple IEEE 802.11 aproach in section three and four. The architectures such as WPA or WPA2 are not subject of this paper. Journal of Mobile, Embedded and Distributed Systems 2009-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Issues-in-WiFi-Networks Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 1 (2009): Mobile and Wireless Applications eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/2 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "090630 2009 eng " 2067-4074 dc Mobile Agents Systems in Wireless Applications Muntean, Mihaela Timisoara West University, Romania http://www.uvt.ro Toma, Cristian Bucharest Academy of Economic Studies The paper presents an introduction in the Mobile Agents Systems and describes how this technology can be used in wireless applications. Also it is shown the possibility of securing wireless applications that use mobile agents and distributed computing. Wireless networks are a relatively new technology in the LAN market. With the weak encryption and security defined in the IEEE standards, wireless LANs, when improperly deployed or administered, can provide a significant risk to those economic sectors. These sectors include health-care, government, and banking in particular. Increasingly diverse heterogeneous wireless infrastructures in combination with more narrowly defined roles of parties participating in the delivery of applications to mobile users pose new challenges for support for delivering these applications. Journal of Mobile, Embedded and Distributed Systems 2009-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Mobile-Agents-Systems-in-Wireless-Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 1 (2009): Mobile and Wireless Applications eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/3 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "090630 2009 eng " 2067-4074 dc Future Developments in Non-Repudiation in GSM WAP Applications Toma, Cristian Bucharest Academy of Economic Studies, Romania http://www.ase.ro The paper presents issues and architectures for mobile applications and GSM infrastructure. The paper shows the redesign of the solution for avoiding denial of service from WAP applications using WIM features. The first section contains the structure of GSM network from voice and data point of view. The security in GSM network is presented in second chapter. The third chapter presents a solution for realizing mobile subscriber non-repudiation. The solution is based on the HTTP protocol over WAP. Journal of Mobile, Embedded and Distributed Systems 2009-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Future-Developments-in-Non-Repudiation-in-GSM-WAP-Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 1 (2009): Mobile and Wireless Applications eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/4 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "090630 2009 eng " 2067-4074 dc Survey of Mobile Digital Rights Management Platforms Toma, Cristian Bucharest Academy of Economic Studies, Romania http://www.ase.ro Boja, Catalin Bucharest Academy of Economic Studies, Romania http://www.acs.ase.ro Based on the development of new communication and data transfer technologies, the mobile solutions for the e-activities have been able to provide new ways to provide multimedia content. This environment describes methods and tools available here, which will bring information, speed and efficiency to any stage and component of the mobile business process. The paper takes into discussion the Digital Rights Management technology in mobile world. The paper presents the main aspects regarding the business and technological models used in mobile digital rights management technology. Journal of Mobile, Embedded and Distributed Systems 2009-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Survey-of-Mobile-Digital-Rights-Management-Platforms Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 1 (2009): Mobile and Wireless Applications eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/5 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "090630 2009 eng " 2067-4074 dc Java and Symbian M-Application Distribution Frameworks Popa, Marius Bucharest Academy of Economic Studies, Romania Doinea, Mihai Bucharest Academy of Economic Studies Toma, Cristian Bucharest Academy of Economic Studies The paper has three sections. First section is intro in Symbian M-Applications distribution framework. The second section presents Java distribution framework and API for various IT&C solutions. The third section is reserved for conclusions and ideas for future developments. Journal of Mobile, Embedded and Distributed Systems 2009-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Java-and-Symbian-M-Application-Distribution-Frameworks Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 1 (2009): Mobile and Wireless Applications eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/6 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "090630 2009 eng " 2067-4074 dc Security Issues for JME M-Applications Boja, Catalin Bucharest Academy of Economic Studies, Romania The paper describes the concept of data security in a mobile environment. The objective is to develop Java software applications, MIDlets for mobile devices, which implement data protection at different levels. Existing and proposed solutions are described by defining security models and architectures. From the software development point of view, the paper describes two API’s, JSR 177 [1] and Bouncy Castle Crypto APIs [2] that provide methods to reach needed security levels. The paper is a survey of security practices for J2ME software platform describing the goals and the means to reach them. Journal of Mobile, Embedded and Distributed Systems 2009-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-JME-M-Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 1 (2009): Mobile and Wireless Applications eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/7 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "091230 2009 eng " 2067-4074 dc Sample Development on Java Smart-Card Electronic Wallet Application Cristian, Toma Bucharest Academy of Economic Studies, Romania http://www.ase.ro In this paper, are highlighted concepts as: complete Java card application, life cycle of an applet, and a practical electronic wallet sample implemented in Java card technology. As a practical approach it would be interesting building applets for ID, Driving License, Health-Insurance smart cards, for encrypt and digitally sign documents, for E-Commerce and for accessing critical resources in government and military field. The end of this article it is presented a java card electronic wallet application. Journal of Mobile, Embedded and Distributed Systems 2009-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/7 Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/8 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "091230 2009 eng " 2067-4074 dc Secure Mechanisms for E-Ticketing System Cristian, Toma Bucharest Academy of Economic Studies, Romania http://www.ase.ro The paper presents a secure authentication and encryption scheme for an automatic ticketing system based on symmetric and asymmetric cryptography. Some concepts and terms used in development of secure automatic ticketing system are presented. It is depicted an architecture of the secure automatic ticketing system with its components and their roles in this architecture. The section five presents the authentication and encryption scheme used for secure information from RFID cards. The authentication scheme is based on RSA and AES algorithms and it is inspired from SSL. Parts of this paper are in publishing process in [6], but the authentication and encryption scheme is described exclusivelly in this paper. The necessity of authentication and encryption scheme is given by the attack described in [7].   Journal of Mobile, Embedded and Distributed Systems 2009-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Secure-Mechanisms-for-E-Ticketing-System Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/9 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "091230 2009 eng " 2067-4074 dc On-line Payment System Survey – eCash Popa, Marius Bucharest Academy of Economic Studies, Romania Calugaru, Adrian Bucharest Academy of Economic Studies, Romania The paper presents the main aspects regarding an on-line payment system. Some characteristics of such system are presented and an existing system is analyzed. On its fundamental sense, the electronic commerce is a concept that represents the purchase and sale process or exchange of products, services, information, using o computer network, inclusively the Internet. In the most part of the cases, the electronic commerce imply on-line payments that lead to creation of some kinds of electronic money and some specific payment systems. There are described the some electronic payment mechanisms and the architecture and the functions of the on-line payment system E-Cash are depicted. Journal of Mobile, Embedded and Distributed Systems 2009-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/On-line-Payment-System-Survey Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/10 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "091230 2009 eng " 2067-4074 dc DECWEB - Internet Fiscal Statement Submission Ianciu, Mihai UTI Bucharest, Romania http://www.uti.ro Burdun, Costin UTI Bucharest, Romania Florea, Ionut UTI Bucharest, Romania The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C). In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet. DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve. Journal of Mobile, Embedded and Distributed Systems 2009-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/DECWEB-Internet-Fiscal-Statement-Submission Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/11 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "091230 2009 eng " 2067-4074 dc Pool-site E-voting Security Ezeanu, Ciprian Cybernetics and Economic Informatics Faculty, The Bucharest Academy of Economic Studies The aim of this paper is to present e-voting procedure describing its advantages and disadvantages. Conventional security measures such as firewalls or SSL communications are necessary but not sufficient to guarantee the specific security requirements of e-voting. Besides these conventional security measures, it is also necessary to implement an additional layer of specialized security technology to address the specific risks posed by electronic voting and guarantee critical security requirements such as voters’ privacy, vote integrity and voter-verifiability. Analyzing the security of Diebold AccuVote-TS voting machine it was observed the vulnerabilities of this machine to different classes of attacks like: vote-stealing attack, Denial-of-Service (DoS) attack and injecting attack code. Journal of Mobile, Embedded and Distributed Systems 2009-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Pool-site-E-voting-Security Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/12 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "091230 2009 eng " 2067-4074 dc An Adaptive Authorization Model Based on RBAC Constantinescu, Radu Bucharest Academy of Economic Studies Corlan, Lucian UTI Group In the article we present a data model and a possible implementation suited to allow proper access control in a system. In order to do that, we started from the extended RBAC model which is focused on roles which are associated to different functions existing in the system. The access control is implemented not just for some application’s functionalities but also for granulated data details, like data attributes. Journal of Mobile, Embedded and Distributed Systems 2009-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/An-Adaptive-Authorization-Model-Based-on-RBAC Journal of Mobile, Embedded and Distributed Systems; Vol. 1 No. 2 (2009): Smart Cards and e-Commerce Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/13 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "100630 2010 eng " 2067-4074 dc Some Results on Algebraic Cryptanalysis of A5/2 Algorithm Mihaita, Adela University of Bucharest, Romania Algebraic cryptanalysis of A5/2 cipher is the is the subject of this article. Recovering the secret key is reduced to solving a system with several hundreds of quadratic equations for which various methods have been proposed during years. This paper presents some experimental results (concerning the time and the number of frames needed) using different implementations of Groebner basis algorithm for solving the system. Journal of Mobile, Embedded and Distributed Systems 2010-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Some-Results-on-Algebraic-Cryptanalysis-of-A5-Algorithm Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/14 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "100630 2010 eng " 2067-4074 dc Image Processing Oriented to Security Optimization Ivan, Ion Bucharest Academy of Economic Studies http://www.ionivan.ro Visoiu, Adrian Bucharest University of Economic Studies Doinea, Mihai Bucharest Academy of Economic Studies This paper presents the main aspects of the digital content security. It describes the content of watermarking, presenting the steganography concept. SteganoGraphy application is presented and the algorithm used is analyzed. Optimization techniques are introduces to minimize the risk of discovering the information embedded into digital content by means of invisible watermarking. Techniques of analyzing the digital content results and identify the possible countermeasures for optimizing the steganography algorithm are presented. Journal of Mobile, Embedded and Distributed Systems 2010-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Image-Processing-Oriented-to-Security-Optimization Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/15 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "100630 2010 eng " 2067-4074 dc WiMAX Security Issues in E-learning Systems Alecu, Felician Bucharest Academy of Economic Studies Pocatilu, Paul Bucharest Academy of Economic Studies Capisizu, Sergiu Bucharest Bar Association WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations where e-learning distributed platforms need to be used. This paper focuses on security issues for e-learning solutions, especially when WiMAX technology is used. Journal of Mobile, Embedded and Distributed Systems 2010-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/WiMAX-Security-Issues-in-E-learning-Systems Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/16 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "100630 2010 eng " 2067-4074 dc Security Engineering and Reengineering on Windows 2008 Server Based Distributed Systems Tomozei, Cosmin University of Bacau, Romania The objective of this paper is to reflect on the processes of Security Engineering and Reengineering in Distributed Systems, focused being also about the Windows 2008 Servers. It is very important to provide security and integrity to software applications, hardware and data. We will have in consideration the ways of making reengineering process efficient, including optimization of the encryption and authentication stages. Journal of Mobile, Embedded and Distributed Systems 2010-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/16 Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/17 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "100630 2010 eng " 2067-4074 dc Chess Cryptosystem Gatej, Alexandru Miron Bucharest University In this paper we discuss about a cryptosystem based on chess automata. First we introduce the general notions about the chess games. After that we describe the chess automata that is the main tool for building the key. Finally we describe the operation for encryption process and decryption process, an with that we can present the algorithm. Journal of Mobile, Embedded and Distributed Systems 2010-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Chess-Cryptosystem Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/18 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "100630 2010 eng " 2067-4074 dc Security in SPGBP – Simulation of Protein Generation Bioinformatic Project Cristian, Toma Bucharest Academy of Economic Studies, Romania http://www.ase.ro Purcaru, Elena “Carol Davila” University of Medicine and Pharmacy Bioinformatics has known a rapid growth in the last decade, along with the development of the genomic projects worldwide. The Human Genome Project alone offers the sequences for 70 000 – 100 000 genes, as terra bytes of information. The major challenge nowadays is to process this huge amount of data. This paper comes to suggest a solution for the retrieval and processing of biological data. The main objective of this section is to point a direction in the development of tools that enable manipulation and efficient access to different types of biological data. Also, the major challenge is to use security in the proposed distributed architecture and to import concepts from bioinformatics into cryptography and IT&C security. Journal of Mobile, Embedded and Distributed Systems 2010-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/18 Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 1 (2010): Cryptographic Algorithms and Protocols eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/19 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc Integrating e-Payment Services with RIA Applications Pricope, Mihai Adobe Constantinescu, Radu Bucharest Academy of Economic Studies Given the expansion of RIA technologies, it is highly important to deliver a set of best practices for developers in order to integrate e-business applications with e-payment systems. In this article we present a solution for the integration of PayPal Express with a RIA application developed on Flex. We focus both on security and functionality issues. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Integrating-e-Payment-Services-with-RIA-Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/20 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc Implementing graphic passwords in Directory Services Systems Rednic, Emanuil Academy of Economic Studies Toma, Andrei Academy of Economic Studies This paper presents the necessary steps for the implementation of multimedia password support within Directory Services. The trend of using multimedia mechanisms is quite new and furthermore relatively unused in authentication as well authorization. Implementing this type of password is justified by the increased level of security within the identity management of directory services. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Implementing-graphic-passwords-in-Directory-Services-Systems Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/21 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc Requirements for Development of an Assessment System for IT&C Security Audit Popa, Marius Bucharest Academy of Economic Studies, Romania IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The evidences are gathered by audit team and some automation processes to increase the productivity and accuracy of the audit are needed. The paper presents some issues of the requirements for development of an assessment system with some considerations for IT&C security audit. The emphasized issues are grouped in the following sections: IT&C security audit processes, characteristics of the indicators development process and implementation issues of an assessment system. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/21 Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/22 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc Key Recovery for Certification Authorities Tric, Eduard Vexilla The root key is the most important asset of a certification authority. There are several ways to protect it and to make a secure backup copy. We are describing one of the most elegant protection techniques that will be used by a real Certification Authority. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Key-Recovery-for-Certification-Authorities Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/23 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc The Cost Influence on Reliability and Security of the Software Systems Cristescu, Marian Pompiliu "Lucian Blaga" University of Sibiu Cristescu, Corina Ioana CSIE Faculty Cacovean, Laura "Lucian Blaga" University of Sibiu Martin, Florin "Lucian Blaga" University of Sibiu Although, direct economic information’s are, in general, difficult to obtain through reason connected of confidentialities. Currently is observe the relation cost-benefit in the case of the using the software engineering reliability can be from one to six or upwards. More, the software engineering reliability it was credited with the incidents abatement considering to security software related, as well as the costs of servicing. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/23 Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/24 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc Design and Implementation of a Cyber-Defense Exercise Furtuna, Adrian Military Technical Academy Learning by practice is a very effective way of education in some activity domains, including information security. The article explores this idea by showing how a cyber-defense exercise can be designed and implemented in order to reach its educational goals. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Design-and-Implementation-of-a-Cyber-Defense-Exercise Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/25 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc Web Security in University Curricula Opincaru, Cristian Thales Rail Signalling Solutions While Web applications and Web services gain more and more ground, the academic curriculum is not always keeping the pace. This paper presents the content of a course focused on Web security; as such it starts by defining the goals of the course, then defines the topics for the course units and finally describes the topics and the setup for laboratory units. The paper brings its contribution through the design of a course covering security aspects for both Web applications and Web services and through the detailed description of practical units and laboratory setup. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Web-Security-in-University-Curricula Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/26 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "101230 2010 eng " 2067-4074 dc A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols Popescu, Gabriel Military Technical Academy In this paper, a comparative analysis of the major modern tunneling protocols used for  secure virtual private network implementations based on the Internet infrastructure will be elaborated.  The purpose of the paper is to help specialists to choose proper protocols for the specific practical implementations. The need for virtual private networks is explained as an introduction. The technical considerations are iterated, and a full classification of all types of virtual private networks is made, by providing the criteria used. The major tunneling protocols of interest and their advantages and disadvantages are described next. The comparative analysis is presented as a table showing the relevant characteristics of each tunneling protocol. Finally, real world best practices of the tunneling protocols iterated are shown as a conclusion. Journal of Mobile, Embedded and Distributed Systems 2010-12-30 02:55:14 application/pdf http://jmeds.eu/index.php/jmeds/article/view/26 Journal of Mobile, Embedded and Distributed Systems; Vol. 2 No. 2 (2010): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/27 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110330 2011 eng " 2067-4074 dc Vulnerability Analysis in Web Distributed Applications Ivan, Ion Bucharest Academy of Economic Studies http://www.ionivan.ro Palaghita, Dragos Bucharest Academy of Economic Studies Vinturis, Sorin Bucharest Academy of Economic Studies Doinea, Mihai Bucharest Academy of Economic Studies The paper analyze vulnerabilities found on web based distributed applications from different perspectives. Classes of vulnerabilities types are identified in order to cope with their different characteristics that each one develops. Methods for analyzing vulnerabilities of an authentication process are developed and solutions are proposed. A model for vulnerability minimization is discussed based on an indicator built on the amount of sensitive data revealed to the end users. Risks are analyzed together with the vulnerabilities that they exploit and measures are identified to combat these pairs. Journal of Mobile, Embedded and Distributed Systems 2011-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Vulnerability-Analysis-in-Web-Distributed-Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 1 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/28 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110330 2011 eng " 2067-4074 dc Cryptographic Applications using FPGA Technology Coman, Alexandru Military Technical Academy Fratila, Radu Military Technical Academy Cryptographic systems have become a part of our daily life through the need of security of many common activities such as communication, payments, data transfers etc. The best support in design and implementation of cryptographic applications is offered by embedded systems such as ASICs and FPGAs. In the past few years, the increase in performance of FPGAs has made them key components in implementing cryptographic systems. One of the most important parts of the cryptographic systems is the random number generator used. Combinations of PRNG and TRNG are commonly used. A good and efficient TRNG implementation is very important and can be achieved through FPGA technology. Journal of Mobile, Embedded and Distributed Systems 2011-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Cryptographic-Applications-using-FPGA-Technology Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 1 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/29 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110330 2011 eng " 2067-4074 dc PKI Interoperability Based on Online Certificate Validation Smadu, Dinu Military Technical Academy One of the most important problems related to Public Key Infrastructures is the validation of the digital certificates. Certificate validation services can be based on offline and/or online schemes. Offline schemes have the major disadvantage that they cannot always give an up-to-date response. On the other side, the most used protocol for online validation, the Online Certificate Status Protocol [1], also has its drawbacks. It can only state if a certificate has been revoked or not. RFC 5055 [2] defines a more complex protocol, the Server-based Certificate Validation Protocol (SCVP), capable of building and validating the certification path. To implement a basic functionality of this new protocol, we will start from an existing project, the CADDISK and we will try to implement an OpenSSL module. Journal of Mobile, Embedded and Distributed Systems 2011-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/PKI-Interoperability-Based-on-Online-Certificate-Validation Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 1 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/30 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110330 2011 eng " 2067-4074 dc Web Single Sign-On Implementation Using the SimpleSAMLphp Application Andronache, Ionut Military Technical Academy Nisipasiu, Claudiu Military Technical Academy Web Single Sign-On is a feature offered by web applications that have a trust relationship, not necessarily within the same company. The goal of Web SSO is to provide authentication information for all the web application in the trust relationship, without requiring the user to login in each web application.  SAML 2.0 is the standard that defines the framework in order to achieve Web SSO and identity federation in a web context. In order to make a Web SSO implementation, we used the open-source SimpleSAMLphp library, which implements the standards of SAML 2.0 and provides functionality for the two scenarios: SAML – Service Provider and SAML – Identity Provider. Journal of Mobile, Embedded and Distributed Systems 2011-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/30 Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 1 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/31 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110330 2011 eng " 2067-4074 dc Interoperability Issues for VPN IPsec Solutions Danalachi, Iulian Military Technical Academy Petrescu, Mihai Lucian Military Technical Academy An issue of testing that should be taken into consideration is the compatibility and interoperability of the IPsec components when implementing an IPsec solution. This article will guide us trough some key point introductive notions involved in the interoperability problem, we’ll see a short overview of some of these problems and afterwards we will discuss about some of the testing solutions of IPsec interoperability that we should take into consideration. Journal of Mobile, Embedded and Distributed Systems 2011-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Interoperability-Issues-for-VPN-IPsec-Solutions Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 1 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/32 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110330 2011 eng " 2067-4074 dc Security Issues for 2D Barcodes Ticketing Systems Toma, Cristian Bucharest Academy of Economic Studies, Romania http://www.ase.ro The paper presents a solution for endcoding/decoding access to the subway public transportation systems. First part of the paper is dedicated through section one and two to the most used 2D barcodes used in the market – QR and DataMatrix. The sample for DataMatrix is author propietary and the QR sample is from the QR standard [2]. The section three presents MMS and Digital Rights Management topics used for issuing the 2D barcodes tickets. The second part of the paper, starting with section four shows the architecture of Subway Ticketing Systems and the proposed procedure for the ticket issuing. The conclusions identify trends of the security topics in the public transportation systems. Journal of Mobile, Embedded and Distributed Systems 2011-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Security-Issues-for-2D-Barcodes-Ticketing-Systems Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 1 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/33 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110630 2011 eng " 2067-4074 dc AES Encryption and Decryption Using Direct3D 10 API Chiuta, Adrian Marius Academy of Economic Studies http://ism.ase.ro Current video cards (GPUs – Graphics Processing Units) are very programmable, have become much more powerful than the CPUs and they are very affordable. In this paper, we present an implementation for the AES algorithm using Direct3D 10 certified GPUs. The graphics API Direct3D 10 is the first version that allows the use of integer operations, making from the traditional GPUs (that works only with floating point numbers), General Purpose GPUs that can be used for a large number of algorithms, including encryption. We present the performance of the symmetric key encryption algorithm – AES, on a middle range GPU and on a middle range quad core CPU. On the testing system, the developed solution is almost 3 times faster on the GPU than on one single core CPU, showing that the GPU can perform as an efficient cryptographic accelerator. Journal of Mobile, Embedded and Distributed Systems 2011-06-30 04:01:55 application/pdf http://jmeds.eu/index.php/jmeds/article/view/AES-Encryption-and-Decryption-Using-Direct3D-API Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 2 (2011): Mobile and Embedded Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/34 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110630 2011 eng " 2067-4074 dc Smart Cards Applications in the Healthcare System Oltean, Claudiu Bucharest Academy of Economic Studies http://ism.ase.ro Current medical system based on medical records and health books is outdated and no longer meets the new requirements. Essential information security in terms of data privacy, integrity and authenticity, is not assured. Healthcare fraud with medical records is quite easy, because there is no security features to prevent this. Obtaining prescription drugs is slowly, the patient is forced in most cases, to go to the pharmacy staff to get their prescription. Another issue is data portability because each clinic can use a proprietary format of medical records, which is not always standardized. Modern and efficient healthcare system can be achieved by introducing smart cards and related software. Their introduction in addition to the portability and data security, reduce costs for both patient and medical institutions. The result will be increase confidence and patient satisfaction in medical institutions. Developed software package includes software applications which manage medical archive to smartcard, in a secure form and a software module which can be used for e-commerce transactions. All developed software application meets current standards for data security. Implementation of such solutions in practice would significantly reduce current costs in healthcare system. Journal of Mobile, Embedded and Distributed Systems 2011-06-30 04:01:55 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Smart-Cards-Applications-in-the-Healthcare-System Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 2 (2011): Mobile and Embedded Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/35 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110630 2011 eng " 2067-4074 dc Security Issues in Streaming Server for Mobile Devices Development Barbu, Dan Academy of Economic Studies The paper presents a solution for streaming audio and video content in IP networks using RTP and SIP protocols. Second Section presents multimedia format and compression for the audio content that is streamed by SS4MD. Streaming protocols are shown in third section. In the forth section there is an example of an application which does uses all above. Conclusions are contoured in the final chapter. Journal of Mobile, Embedded and Distributed Systems 2011-06-30 04:01:55 application/pdf http://jmeds.eu/index.php/jmeds/article/view/35 Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 2 (2011): Mobile and Embedded Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/36 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110630 2011 eng " 2067-4074 dc Legal and Practical Aspects in the Computer Science Investigation Trandafir, Florin Cosmin Bucharest Academy of Economic Studies The present article makes a short introduction in the legal and practical aspects of the computer science investigation. It is well known the fact that a computer can represent an invaluable source of pieces of evidence, both in the civil cases as well as in the criminal ones because it contains data regarding the activities carried out by the suspect with the help of the IT equipment. Journal of Mobile, Embedded and Distributed Systems 2011-06-30 04:01:55 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Legal-and-Practical-Aspects-in-Computer-Science-Investigation Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 2 (2011): Mobile and Embedded Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/37 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110630 2011 eng " 2067-4074 dc Rootkits and Malicious Code Injection Vlad, Marius Bucharest Academy of Economic Studies http://ism.ase.ro Rootkits are considered by many to be one of the most stealthy computer malware (malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel. As this can be achieved by loadable kernel code sections, this paper tries to explain common entry points into a Linux kernel and how to keep a persistent access to a compromised machine. Journal of Mobile, Embedded and Distributed Systems 2011-06-30 04:01:55 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Rootkits-and-Malicious-Code-Injection Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 2 (2011): Mobile and Embedded Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/38 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110930 2011 eng " 2067-4074 dc Methods and Techniques of Quality Management for ICT Audit Processes Popa, Marius Bucharest Academy of Economic Studies, Romania In modern organizations, Information and Communication Technologies are used to support the organizations’ activities. To manage the quality of the organization processes, audit processes are implemented. Also, the audit processes can aim the quality of ICT systems themselves because their involvement in organization processes. The paper investigates the ways in which a quality management can be applied for audit processes in order to obtain a high level of quality for the audit recommendations. Journal of Mobile, Embedded and Distributed Systems 2011-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/38 Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 3 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/39 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110930 2011 eng " 2067-4074 dc Security Survey of Internet Browsers Data Managers Boja, Catalin Bucharest Academy of Economic Studies, Romania The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it. Journal of Mobile, Embedded and Distributed Systems 2011-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Security-Survey-of-Internet-Browsers-Data-Managers Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 3 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/40 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110930 2011 eng " 2067-4074 dc Hiding Malicious Content in PDF Documents Popescu, Dan Sabin The Military Technical Academy This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF – two of the most widely used file formats). When the victim signs the dual content file, he/ she only sees a PDF document and is unaware of the hidden content inside the file. After obtaining the legally signed document from the victim, the attacker simply has to change the extension to the other file format. This will not invalidate the digital signature, as no bits were altered. The destructive potential of the attack is considerable, as the Portable Document Format (PDF) is widely used in e-government and in e-business contexts. Journal of Mobile, Embedded and Distributed Systems 2011-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Hiding-Malicious-Content-in-PDF-Documents Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 3 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/41 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110930 2011 eng " 2067-4074 dc Information Security Standards Tofan, Dan Constantin Academy of Economic Studies Bucharest The use of standards is unanimously accepted and gives the possibility of comparing a personal security system with a given frame of reference adopted at an international level. A good example is the ISO 9000 set of standards regarding the quality management system, which is a common reference regardless of the industry in which a certain company activates. Just like quality control standards for other industrial processes such as manufacturing and customer service, information security standards demonstrate in a methodical and certifiable manner that an organization conforms to industry best practices and procedures. This article offers a review of the world’s most used information security standards. Journal of Mobile, Embedded and Distributed Systems 2011-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Information-Security-Standards Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 3 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/42 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110930 2011 eng " 2067-4074 dc OpenID, a Single Sign-On Solution for E-learning Applications Alecu, Felician Bucharest Academy of Economic Studies Pocatilu, Paul Bucharest Academy of Economic Studies Stoica, George ProSoft Solutions Ciurea, Cristian Bucharest Academy of Economic Studies Capisizu, Sergiu Bucharest Bar Association The e-learning applications of today require a special focus on security. Distributed e- learning applications have several modules user can access using different clients (desktop or mobile). The same user has several accounts with different credentials. In this context, the SSO (Single Sign-On) solutions become very attractive since the user has to log in once and can access all the needed resources without being prompted again for the username and password. Using the OpenID standard for e-learning Web-based applications is a good and reliable solution because it supports both URL and XRI identifiers. This paper presents the main characteristics of OpenID standard and how this standard could be implemented for a distributed, Web-based, e-learning application. Journal of Mobile, Embedded and Distributed Systems 2011-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/OpenID-a-Single-Sign-On-Solution-for-E-learning-Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 3 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/43 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "110930 2011 eng " 2067-4074 dc 2D Barcode for DNA Encoding Purcaru, Elena “Carol Davila” University of Medicine and Pharmacy Toma, Cristian Academy of Economic Studies The paper presents a solution for endcoding/decoding DNA information in 2D barcodes. First part focuses on the existing techniques and symbologies in 2D barcodes field. The 2D barcode PDF417 is presented as starting point. The adaptations and optimizations on PDF417 and on DataMatrix lead to the solution – DNA2DBC – DeoxyriboNucleic Acid Two Dimensional Barcode. The second part shows the DNA2DBC encoding/decoding process step by step. In conclusions are enumerated the most important features of 2D barcode implementation for DNA. Journal of Mobile, Embedded and Distributed Systems 2011-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/2D-Barcode-for-DNA-Encoding Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 3 (2011): Security Technologies for ICT eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/45 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc BWS Open System Architecture Security Assessment Ionita, Cristian Bucharest University of Economic Studies Business process management systems play a central role in supporting the business operations of medium and large organizations. Because of this the security characteristics of these systems are becoming very important. The present paper describes the BWS architecture used to implement the open process aware information system DocuMentor. Using the proposed platform, the article identifies the security characteristics of such systems, shows the correlation between these characteristics and the security features implemented by the platform and presents examples of how the security of such systems can be enhanced using the extension mechanism. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/BWS-Open-System-Architecture-Security-Assessment Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/46 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc Web-Enabled Remote Laboratories Ganesan, K. VIT University, Vellore, India Saranraj, B. S. VIT University, Vellore This paper describes about accessing the real laboratories using web services.   Students doing the course on “Embedded systems” can perform the various experiments such as analyzing the frequency measurement, generation of pulse width modulation using Freescale-semiconductor’s kit and Digital Storage Oscilloscope (DSO) by giving different input parameters from anywhere at anytime through Internet or Intranet using a webpage provided in a client browser and submit it to a lab server (LS), which is interfaced with Freescale-semiconductor’s kit and digital storage oscilloscope (DSO). The experimental specification is forwarded to the lab server through a service broker. Based on the experimental specifications given by the user, experiments can be conducted on the lab server side using real equipment interfaced with the LS. The application can be executed and the output generated on the DSO can be captured by the lab server machine and one can even convert the results into XML file and send those results to service broker. If user needs, the results can even be displayed on the remote client machine by the service broker. The present work uses iLab architecture which provides three tier client / broker / server architecture for the development and deployment of remote labs. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Web-Enabled-Remote-Laboratories Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/47 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc Security Aspects of Collaborative Banking Systems Applied in Economy Ivan, Ion Bucharest Academy of Economic Studies http://www.ionivan.ro Ciurea, Cristian Bucharest Academy of Economic Studies In this paper are presented theoretical and practical elements regarding collaborative systems applied in economy. There are described their properties and are analyzed implementations of collaborative systems in the banking field. Security requests regarding collaborative banking systems are identified and solutions to increase collaborative systems security level are proposed. The security is analyzed starting from the authentication process and there are presented security elements for collaborative systems after and outside the authentication. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/47 Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/48 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc Refined Method for Choosing a Security Solution for Mobile Application – Web Service Interactions Trif, Silvia Bucharest University of Economic Studies Visoiu, Adrian Bucharest University of Economic Studies This paper aims to present a refined algorithm for choosing the appropriate security implementation for mobile applications connecting to web services. Common security scenarios are presented. Each scenario has several characteristics associated. The correlations between these security scenarios characteristics are computed and selected only the characteristics that are less correlated. The proposed algorithm inventories the available scenarios, inventories the requirements and selects the security scenario that match. A case study applies the proposed method to a situation where a WP7 application and a WCF service are interacting. Security scenarios for WCF services and their characteristics are described. Application security requirements are established. A security solution is proposed based on the results of the proposed method. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/48 Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/49 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc Project Management with IT Security Focus Alecu, Felician Bucharest Academy of Economic Studies Pocatilu, Paul Bucharest Academy of Economic Studies Capisizu, Sergiu Bucharest Bar Association The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress. Also, the project manger skills are highlighted in this specific context. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Project-Management-with-IT-Security-Focus Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/50 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc A Real-Time Face Recognition System Using Eigenfaces Georgescu, Daniel Academy of Economic Studies - Bucharest http://www.dariusgeo.blogspot.com/ A real-time system for recognizing faces in a video stream provided by a surveillance camera was implemented, having real-time face detection. Thus, both face detection and face recognition techniques are summary presented, without skipping the important technical aspects. The proposed approach essentially was to implement and verify the algorithm Eigenfaces for Recognition, which solves the recognition problem for two dimensional representations of faces, using the principal component analysis. The snapshots, representing input images for the proposed system, are projected in to a face space (feature space) which best defines the variation for the face images training set. The face space is defined by the ‘eigenfaces’ which are the eigenvectors of the set of faces. These eigenfaces contribute in face reconstruction of a new face image projected onto face space with a meaningful (named weight).The projection of the new image in this feature space is then compared to the available projections of training set to identify the person using the Euclidian distance.  The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/A-Real-Time-Face-Recognition-System-Using-Eigenfaces Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/51 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "111230 2011 eng " 2067-4074 dc Techniques of Program Code Obfuscation for Secure Software Popa, Marius Bucharest Academy of Economic Studies, Romania The paper investigates the most common obfuscation techniques for software program source code. Engineering elements of the compiling and interpreting processes are presented form the most widely used programming language based on Java Development Kit and .NET Framework. The reverse engineering of software is implemented on taking into account the architectures of the software development platforms used by the most part of software developers. The engineering elements of these architectures facilitate understanding and production of data exchange, disassembling and decompiling. The last ones are essential tools to implement the reverse engineering of software. In order to prevent unauthorized disclosure of software engineering techniques, techniques of the source code obfuscation are used. On the other hand, the reverse engineering of software is used in critical software fields like antivirus program development. Journal of Mobile, Embedded and Distributed Systems 2011-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Techniques-of-Program-Code-Obfuscation-for-Secure-Software Journal of Mobile, Embedded and Distributed Systems; Vol. 3 No. 4 (2011): Insights on Mobile and Distributed Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/52 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc On the Security of Black-Box Implementation of Visual Secret Sharing Schemes Atanasiu, Adrian University of Bucharest Olimid, Ruxandra University of Bucharest Simion, Emil University of Bucharest Cryptographic software and devices give users the ability to take advantage of the benefits of cryptography more easily. However, this implies that the users must totally trust the manufacturer and the authenticity of the device or software they use. Young and Yung were the first to question the correctness of the manufacturer and considered the advantage that a malicious implementation could offer to a specific attacker. In this paper, we consider a modified version of two visual secret sharing schemes and the advantage that they provide to the attacker in order to reconstruct the secret by himself, while the other participants must fulfill the honest scheme reconstruction conditions. We also analyze the security of the proposed mechanisms and the conditions in which they can be applicable. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/52 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/53 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc Internet Banking Two-Factor Authentication using Smartphones Soare, Costin Andrei IT&C Security Master Department of Economic Informatics and Cybernetics This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application. The tokens can also serve as a method of signing online money orders. We will prove in this article the cost efficiency of the proposed architecture for both consumers and companies. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Internet_Banking_Two_Factor_Authentication_using_Smartphones Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/54 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc The Management of Law Firms Using Business Process Management, Document Management and Web Services Integration Petculet, Roxana Maria IT&C Security Master Department of Economic Informatics and Cybernetics The aim of this paper is to present the technical solution implemented in the present context for the management of law firms. The informational system consists of the automation of business processes using a BPM engine and electronic archiving using a DMS. The communication between the two modules is made by invoking web services. The whole system integrates modules like: project management, contract management, invoice management, collection, CRM, reporting. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/54 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/55 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc Methods for Obfuscating Java Programs Buzatu, Florin IT&C Security Master Department of Economic Informatics and Cybernetics Java programs distributed through internet are suffering of problems like reverse engineering, algorithms theft and unauthorized functional changes. The reason for this issue is that the bytecode from Java class file holds enough information to be decompiled into source code that resembles the original. In this paper, I discuss some practical obfuscation methods that make difficult the understanding of the decompiled programs. The methods analyzed are: lexical obfuscation, data obfuscation, control flow obfuscation, obfuscation methods that make use of the discrepancy between bytecode and source code. In order to evaluate the usefulness of these methods, some metrics will be described. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Methods_for_Obfuscating_Java_Programs Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/56 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc System for Multicast File Transfer Custura, Dorin Department of Economic Informatics and Cybernetics The distribution of big files over the network from a single source to a large number of recipients is not efficient by using standard client-server or even peer-to peer file transfer protocols.  Thus, the transfer of a hierarchy of big files to multiple destinations can be optimized in terms of bandwidth usage and data storage reads by using multicast networking. In order to achieve that, a simple application layer protocol can be imagined. It uses multicast UDP as transport and it provides a mechanism for data ordering and retransmission. Some security problems are also considered in this protocol, because at this time the Internet standards supporting multicast security are still in the development stage. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/System_for_Multicast_File_Transfer Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/57 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc Facial Recognition using OpenCV Emami, Shervin NVIDIA http://shervinemami.info Suciu, Valentin Petrut IT&C Security Master Department of Economic Informatics and Cybernetics The growing interest in computer vision of the past decade. Fueled by the steady doubling rate of computing power every 13 months, face detection and recognition has transcended from an esoteric to a popular area of research in computer vision and one of the better and successful applications of image analysis and algorithm based understanding. Because of the intrinsic nature of the problem, computer vision is not only a computer science area of research, but also the object of neuro-scientific and psychological studies, mainly because of the general opinion that advances in computer image processing and understanding research will provide insights into how our brain work and vice versa. Because of general curiosity and interest in the matter, the author has proposed to create an application that would allow user access to a particular machine based on an in-depth analysis of a person’s facial features. This application will be developed using Intel’s open source computer vision project, OpenCV and Microsoft’s .NET framework. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Facial_Recognition_using_OpenCV Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/58 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc Mobile Remote Control Architecture Bogdan, George Stefan IT&C Security Master Department of Economic Informatics and Cybernetics When mobile device become more and more popular the need to have a software bridge between them and the old fashioned computers became evident. Many different solutions have appeared to fill the void but few offer more than file sinking or remote SSH (secure shell) connections. For computer professionals and other alike a tool that can do more regarding this connectivity and control gap became necessary. With this paper it is described an architecture and an implementation for creating such a system, underlining the difficulties, challenges and the many choices regarding overall system design, security and implementation that need to be made in order to provide the user with a secure, reliable and professional solution. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Mobile_Remote_Control_Architecture Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/59 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120330 2012 eng " 2067-4074 dc A Short Resume of Romanian Electronic Passports System - ePASS Judea, Claudiu Horatiu Information Technology Security Master In the context of EU accession, Romania has pledged to reduce cross-border crime and illegal immigration, safeguarding its citizens by issuing biometric passports. Thus, the Romanian Government approved on 24 June 2008 an Emergency Ordinance which provides that the Romanian National Printing Company will produce an exclusive basis, a series of documents, such as biometric passports. Conceptual architecture that describes the technical implementation of the ePass is related to two basic elements: the solution components and operational model for implementation. The components describe the entire hierarchy of components in accordance with the responsibilities they have static relationships between them and how they collaborate to deliver the functionality required of an IT system. Components are the primary concept used in a modular design. A component can be defined as an embedded part of a system that has a well-defined interface that is accessed through its services. Next we present the main components of this system architecture. Journal of Mobile, Embedded and Distributed Systems 2012-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/A_Short_Resume_of_Romanian_Electronic_Passports_System_ePASS Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 1 (2012): Insights on Current and Future ICT Solutions eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/62 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc Techniques for Securing Web Content Ursu, Cristian This paper analyzes the dangers to which web content is exposed, demonstrates how data from the Internet can be gathered and used to obtain profit, how an application can stealthily make use of complicated processing without implementing them and how a website can be cloned in real time. For the considered attacks and vulnerabilities I present, explain, group and evaluate the existing solutions to secure content and last but not least, I suggest a new solution: a library for link encryption. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf application/pdf http://jmeds.eu/index.php/jmeds/article/view/Techniques_for_Securing_Web_Content Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/64 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc An Alternative Solution to Https for Secure Access to Web Services Iancu, Cristina Livia Bucharest University of Economic Studies This paper presents a solution for accessing web services in a light-secure way. Because the payload of the messages is not so sensitive, it is taken care only about protecting the user name and the password used for authentication and authorization into the web services system. The advantage of this solution compared to the common used SSL is avoiding the overhead related to the handshake and encryption, providing a faster response to the clients. The solution is intended for Windows machines and is developed using the latest stable Microsoft technologies. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/64 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/65 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc Self-Healing for Mobile Applications Ivan, Ion Bucharest Academy of Economic Studies http://www.ionivan.ro Boja, Catalin Bucharest University of Economic Studies Zamfiroiu, Alin Bucharest University of Economic Studies The reliability and security of a software application are two of the most important software quality characteristics because they describe the ability of the software to run without failures and to protect user data. Mobile applications concur with desktop applications in terms of rich interfaces and functionalities and are becoming one the most used type of software applications. Based on the “anytime, anywhere” paradigm, mobile applications must provide special measures to avoid failures and to preserve a high level of reliability and security because mobile operating systems provide limited or none access to administrative or system tools that will allow a user with an IT background to access temporary or persistent data. A high level of software reliability is directly influenced by a low level of failures. We there-fore describe self-healing as a required quality characteristic for mobile applications and we propose a metric for measuring it. This approach is included in the general context of mobile applications quality and the papers describes types of mobile applications, their development cycle and features that are particular to mobile applications quality. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Self-Healing_for_Mobile_Applications Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/66 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc Agent-Based Framework for Implementing and Deploying of SOA Butoi, Alexandru Babes-Bolyai University, Cluj-Napoca Morar, Gabriela Andreea Babes-Bolyai University, Cluj-Napoca Ilea, Andreea Babes-Bolyai University, Cluj-Napoca In distributed organizational and business information systems’ contexts, Service-Oriented Architectures (SOA) provide standard-based and protocol independent solutions. Despite the advances in SOA models and design methodologies, the implementation and deployment of service choreographies are still made in an un-unified manner using the existing tools. We present a three-layered framework model based on deployment agents, which allows designing and implementing service choreographies in a unified and reusable manner using the Object-Oriented Paradigm concepts. Deployment agents contain automatic mechanisms for service deployment which will ease the management of service references involved in service compositions at development time. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Agent-Based_Framework_for_Implementing_and_Deploying_of_SOA Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/67 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc Study on Audit for Distributed Applications: a Proposal for Simplified Audit Module Architecture Apostu, Anca Bucharest University of Economic Studies The tracking and audit services of an informatic system provide the possibility to record the actions performed within the system and the states of the objects, modules and of the application itself. In order to assure a scalable and secure tracking for the auditing service it is important to define the basis of the record process itself, to determine efficient ways to store and process the audit data, to improve the performance and functions that enable a better understanding and use of the event data recorded. The paper presents the main requirements during auditing process in the context of informatic systems and proposes a simplified solution for implementing them in software distributed systems. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/67 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/68 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc An Advanced Platform for Collaborative and Mobile Enterprise 2.0 Consoli, Domenico University of Urbino https://profiles.google.com/consoli.domenico Recently, a new model of Enterprise 2.0, which interacts actively with customers using web 2.0 tools (chat, forum, blog, wiki, social network) to improve and develop new products/services and to satisfy market requirements, is affirming.  The company to communicate with all stakeholders of the supply chain and to exploit all business services  of the  Information System can use smart and mobile devices. The new model of business, provided of technological tools,  is a mobile and collaborative enterprise that interact, exchange and share information with the internal and external social environment. In this paper we describe, in detail, an advanced platform that integrates various tools and applications and  supports the new model of business. In this way the enterprise can implement a corporate strategy to reach competitive advantages. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/An_Advanced_Platform_for_Collaborative_and_Mobile_Enterprise Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/69 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120630 2012 eng " 2067-4074 dc Virtual Enterprises Reach for Cloud Computing Davidescu (Vasile), Andreea Bucharest University of Economic Studies UNCTAD reports that enterprises must be able to make the best use possible of ICTs, as they positively affect productivity in both large and small enterprises. New ITC technologies are a prerequisite for the concept of virtual enterprise. They are instruments companies can use in their search for efficiency. IT managers are under constant pressure to deliver optimal support to growing, fluctuating demands from ever-changing applications, to manage spikes and control costs. Many of them turn to virtualization for better distribution of workload on the hardware support. Server virtualization, or application virtualization are milestones on the way to cloud computing. This brings to the table an intelligent approach to virtualization and a business-mind. Journal of Mobile, Embedded and Distributed Systems 2012-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Virtual_Enterprises_Reach_for_Cloud_Computing Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/71 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc MPEG Video Security using Motion Vectors and Quadtrees Singhal, Anshul DA-IICT Das, Manik Lal DA-IICT Securing multimedia data communication over public channel is a challenging task for protecting digital content from content piracy. Anti-piracy, digital watermarking and ownership verication are some mechanisms for authenticating digital content. The size of multimedia data being generally huge makes it difficult to carry out data encryption and compression for real time data communication. In this paper, we discuss the partial encryption approach in which a part of the compressed data is encrypted and rest of data remain unencrypted. The approach results in signicant reduction of computation and communication time. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/MPEG_Video_Security_Using_Motion_Vectors_and_Quadtrees Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/72 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc About group digital signatures Enache, Adriana Cristina Military Technical Academy Group signatures try to combine security (no framing, no cheating) and privacy(anonymity, unlinkability).A group digital signature is a digital signature with enhanced privacy features that allows members of a given group to anonymously sign messages on behalf of the group, producing a group signature. However, in the case of dispute the identity of the signature's originator can be revealed by a designated entity (group manager). The present paper describes the main concepts about group signatures, along with a brief state of the art and shows a personal cryptographic library implemented in Java that includes two group signatures. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/About_Group_Digital_Signatures Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/74 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "121230 2012 eng " 2067-4074 dc Secure Disk Mixed System Ri, Myongchol PhD student, Graduate School of Kim Il Sung University, D.P.R.K An, Dokjun Faculty of mathematics, Kim Il sung University, D.P.R.K Choe, Changil Faculty of mathematics, Kim Il sung University, D.P.R.K Han, Sunam Faculty of mathematics, Kim Il sung University, D.P.R.K We propose a disk encryption method, called Secure Disk Mixed System (SDMS) in this paper, for data protection of disk storages such as USB flash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitations of existing disk encryption methods and to control security performance flexibly according to the security requirement of system. Journal of Mobile, Embedded and Distributed Systems 2013-01-01 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Secure_Disk_Mixed_System Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 4 (2012): Advances in Data Processing and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/75 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc About the Key Escrow Properties of Identity Based Encryption Schemes Olimid, Ruxandra University of Bucharest IBE (Identity Based Encryption) represents a type of public key encryption that allows a party to encrypt a message using the recipient’s identity as public key. The private keys needed for decryption are generated and distributed to each party by a KGC (Key Generation Center). The existence of such an entity in an IBE scheme allows access to the encrypted information for other parties other than the intended recipient by construction: the KGC or any other entity that receives the cryptographic keys from the KGC may perform decryption. A system that permits other parties to have access to the private keys of the users is said to have key escrow abilities. The paper performs a brief analysis of the key escrow properties of IBE schemes and gives a practical example of communication protocol that improves the key escrow capabilities. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/75 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/76 2024-03-28T09:36:07Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality Militaru, Traian Lucian Politehnica University of Bucharest Suciu, George Politehnica University of Bucharest Todoran, Gyorgy Politehnica University of Bucharest This paper proposes an expert system which can be used to evaluate the quality of an e-learning platform. The proposed expert system is using the modified version of the SEEQUEL Core Quality Framework and it was built using CLIPS expert system generator. The SEEQUEL Core Quality Framework originated from the collaboration between the e-learning Industry Group (eLIG) with a number of European expert organizations and associations, coordinated by the MENON Network, is a framework used to build the quality tree by selecting the quality characteristics from a list of common characteristics applicable to the whole e-learning experience. CLIPS is a productive development and delivery expert system tool which provides a complete environment for the construction of rule based expert systems. In the first part of this paper the SEEQUEL Core Quality Framework and CLIPS expert system generator are presented showing the advantage of using an expert system for this task. In the second part, a case study of evaluating an e-learning platform is presented. The final conclusion of the experiment was that an expert system can successfully replace a human expert for the proposed task. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/76 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/77 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc Secure Single Sign-On using CAS and OpenID Ionita, Mihai Gabriel Military Technical Academy As the number of connected applications increases, user convenience makes them use the same password, which can create vulnerabilities in an organization’s infrastructure. Therefore, those with security concerns regarding these activities, conducted in the electronic environment, came to support the idea of ​​Single Sign-On systems, having the user in mind. This concept facilitates the authentication process to various resources available on the Internet, or locally, using a single pair of credentials, only once, so it makes the „one for all” password, the method of writing passwords on post-it’s glued to the monitor , or keeping them stored in unsecured text files, sent into oblivion. This paper aims to make a comprehensive analysis of the infrastructure of security and authentication systems on the market. On the other hand, the project presents the implementation of several open source solutions such as OpenID, NTLM in PHP or the Central Authentication Service. For the application that uses OpenID an online store that has an administration page, to which access is restricted using OpenID credentials, was further secured by filtering these IDs in a MySQL database to prevent access to anyone having a valid OpenID credential. For the demonstration of NTLM enabled SSO, another website is used in which access has been blocked to a page. For accessing the page, a valid Windows authentication credential is required. Both the online-shop and demonstration site for NTLM are written in PHP. In addition, the systems using them are implemented also using PHP. For implementing the CAS demo, two Tomcat servlets have been used for demonstration purposes, additional filtering being done by an ApacheDS server. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Secure_Single_Sign-On_using_CAS_and_OpenID Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/78 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc A Study of Implementing an Information Security Management System for Open Source Cloud Computing Suciu, George Politehnica University of Bucharest Poenaru, Vlad POLITEHNICA University Bucharest Cernat, Cristian POLITEHNICA University Bucharest Militaru, Traian Lucian Politehnica University of Bucharest Todoran, Gyorgy Politehnica University of Bucharest An Information Security Management System (ISMS) contains a coordinated set of activities, processes, controls, and policies with the purpose of protecting and managing the information assets within an organization. In this paper we present the way in which an ISMS as specified in the ISO 27001 can be applied for the cloud and implemented on our test platform based on SlapOS, the first open source provisioning and billing system for distributed cloud computing. The goal of this paper is to demonstrate a new and easier way to manage security for the cloud, with a specific focus on distributed cloud computing. We will present the results measured by applying ISMS controls for ensuring levels of QoS and SLA according to contracts, moreover also optimizing the costs and resources used by the cloud platform. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/78 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/79 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc Securing SIP: An Easy and Effective Solution Cojanu, Cristian Bucharest University of Economic Studies Session Initiation Protocol (SIP) has become in recent years a common choice regarding  voice communication services because it is a cost effective solution and offers multiple features. Unfortunately, security is not one of them by default. In general, SIP-based solutions implemented in companies or as services on the internet do not offer any kind of privacy or confidentiality. Most companies that use SIP systems rely on the protection offered by a firewall between the LAN and the WAN. Some probably view this as a good compromise. However, when taking into account the fact that a good percentage of the attacks on IT systems come from inside the LAN, it becomes obvious that just the firewall is not enough and in this case not only the IT services are affected, but so do the voice communications system. Because SIP is a text-based protocol similar to HTTP, an attacker can find out not only information like the IP addresses of the phones and of the SIP system but also when, with whom, how long and what someone has talked on the phone. This paper will analyze the current security solutions and our approach to this matter. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Securing_SIP_An_Easy_and_Effective_Solution Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/80 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "120930 2012 eng " 2067-4074 dc Live Forensics – Extracting Credentials on Windows and Linux Systems Itoafa, Liviu Military Technical Academy ’Post-mortem’ analysis of a system can be greatly simplified if the correct information is gathered in the live analysis stage. In this paper I’ve described Windows’ data protection APIs available for developers, some simplified versions of the API (LSA Secrets, Protected Storage), different methods used by applications to store their passwords safely and comparisons between them.  As an example, I’ve built tools to dump passwords saved by browsers (Chrome, IE, Firefox) and an extractor of the login password (if available) from the registry. The basic concepts of how passwords may be stored apply to majority of applications that run on Windows and store passwords (protected or not) and understanding this makes possible recovery of other credentials also (messaging software, mail clients ...). On the Linux side, I’ve analyzed a general method of storing passwords – keyrings, and the methods adopted by Chrome browser, and built extraction command line tools for both of them, in the form of a python script and a C++ application. Journal of Mobile, Embedded and Distributed Systems 2012-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/80 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 3 (2012): Security of Digital Identities eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/81 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "121230 2012 eng " 2067-4074 dc Binary Code Disassembly for Reverse Engineering Popa, Marius The disassembly of binary file is used to restore the software application code in a readable and understandable format for humans. Further, the assembly code file can be used in reverse engineering processes to establish the logical flows of the computer program or its vulnerabilities in real-world running environment. The paper highlights the features of the binary executable files under the x86 architecture and portable format, presents issues of disassembly process of a machine code file and intermediate code, disassembly algorithms which can be applied to a correct and complete reconstruction of the source file written in assembly language, and techniques and tools used in binary code disassembly. Journal of Mobile, Embedded and Distributed Systems 2013-01-01 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Binary_Code_Disassembly_for_Reverse_Engineering Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 4 (2012): Advances in Data Processing and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/82 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "121230 2012 eng " 2067-4074 dc Automated Internet Data-mining - IQL Stanescu, Catalin Bucharest University of Economic Studies This article presents the Internet Query Language (IQL) tool – an open-source software for automated data mining, processing, presentation and formatting. It automates complex multi-threaded tasks through a specialized query language adapted to hierarchical data while employing data processing techniques common to the internet medium and familiar to current developers. The tool is modular and it's various components can be employed for other use cases. Journal of Mobile, Embedded and Distributed Systems 2013-01-01 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Automated_Internet_Datamining_IQL Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 4 (2012): Advances in Data Processing and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/83 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "121230 2012 eng " 2067-4074 dc Homomorphic Encryption Schemes and Applications for a Secure Digital World Maimut, Diana Stefania École Normale Supérieure Patrascu, Alecsandru Politehnica University of Bucharest Simion, Emil Advanced Technologies Institute As stated by NIST in "Guidelines on Security and Privacy in Public Cloud Computing", lowering costs for computing resources made Cloud Computing attractive for different organizations and users. Modern software applications that run on desktops, Cloud or mobile device ecosystems are exposed to many security threats. For instance, there are security issues that affect the processing of confidential data in the Cloud because the providers of Cloud services have full access to the hardware, storage, software and as a result, to confidential data. Furthermore malicious software can be ran in the Cloud or and attack other Cloud services to retrieve confidential information. Mainly the mobile device ecosystem is vulnerable because the digital assets and confidential data they contain represent an attractive target for the attackers. Assuming fully homomorphic encryption schemes, which allow computing any function over encrypted data, will become fast enough to be considered practical, privacy concerns with respect to desktop, Cloud or mobile services could be solved. Journal of Mobile, Embedded and Distributed Systems 2013-01-01 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/83 Journal of Mobile, Embedded and Distributed Systems; Vol. 4 No. 4 (2012): Advances in Data Processing and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/84 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Local Illumination Normalization and Facial Feature Point Selection for Robust Face Recognition HAN, Song KIM IL SUNG University, Pyongyang KIM, Jinsong KIM, Cholhun JO, Jongchol Face recognition systems must be robust to the variation of various factors such as facial expression, illumination, head pose and aging. Especially, the robustness against illumination variation is one of the most important problems to be solved for the practical use of face recognition systems. Gabor wavelet is widely used in face detection and recognition because it gives the possibility to simulate the function of human visual system. In this paper, we propose a method for extracting Gabor wavelet features which is stable under the variation of local illumination and show experiment results demonstrating its effectiveness. Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf application/pdf http://jmeds.eu/index.php/jmeds/article/view/Facial_Feature_Point_Selection_for_Robust_Face_Recognition Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/86 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Automatic Search of Web APIs exposed in the open source context Cioloca, Cecilia The Bucharest University of Economic Studies Zurini, Madalina The Bucharest University of Economic Studies Georgescu, Mihai The Bucharest University of Economic Studies The Service Oriented Architecture is presented in the context of organizations today. The Web APIs are being defined. Architecture for Web APIs aggregation is proposed. The components of the architecture are detailed.  A method for automatic feature extraction from Web APIs is proposed in order to generate the input data for k Nearest Neighbor search algorithm. The main directions of kNN algorithm are highlighted along with the advantages and disadvantages appeared. A structure for Web APIs is formed out of the features extracted for a homogeneity approach and the output data is used in a hierarchical searching result. An optimization method is proposed for lowering the time consumption given by the high complexity level, using a grid formed out of cell searching algorithm. Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Automatic_Search_of_Web_APIs_Exposed_in_the_Open_Source_Context Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/87 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130930 2013 eng " 2067-4074 dc Performance Analysis of Load Based Energy-Saving Strategies for Real Time Traffic in IEEE 802.16e Goswami, Veena KIIT University Misra, Chinmoy KIIT University In wireless and mobile telecommunication systems, the handheld mobile devices completely sustains on lightweight batteries for power supply. This mobile station dissipates lots of energy if it listens to base station continuously for intended messages. This paper presents a discrete time renewal input single and batch service queueing system with accessibility to the batches which is capable of calculating the power efficiency and packet access delay for the power saving type II. A cost model is developed to determine the optimum service rates which minimize the total expected cost. Various performance measures are provided based on this analysis. It is shown numerically that the proposed model can work efficiently to improve the system performance and establish the dependency relationships among the system performance measures and the system parameters. Journal of Mobile, Embedded and Distributed Systems 2013-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/87 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 3 (2013): Performance and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/88 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130630 2013 eng " 2067-4074 dc NCloud - Experimenting with Architecting and Facilitating Utility Services for establishing Educational Cloud Bhavsar, Madhuri Nirma Institute Of Technology , Nirma University , Ahmedabad Academic Institutions as well as Enterprises all over the globe have become heavily dependent on high performance computing systems for their day to day activities and hence it continues to seek opportunities to rationalize and optimize the utilization of resources. Continuous upgradation  of software and hardware have become important items of those organizations meetings creating budget pressure. In such scenario, Cloud computing services could provide many of those organizations to enhance the productivity keeping the budget expenditure low.The paper discusses the experiments carried out on our educational campus for architecting the cloud – hereafter referred as NCloud (Cloud built on Nirma Campus), configured using open source tools, furnishes the utility services which is leading towards an establishment of  a stepping stone for formation of knowledge cloud. Testbed formed for data center consists of 1 front-end and 16 worker node.  By using NCloud, user will be able to fulfill the demand  of infrastructure as a service in which user is provided an operating system with specific RAM and CPU cores. Utility oriented services in NCloud aims to charge user for what they use. For implementing utility oriented services, analysis of various major cloud providers is done including pricing models. Performance measures on heterogeneous platforms and the results obtained are included in the paper. Journal of Mobile, Embedded and Distributed Systems 2013-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/88 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/89 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Database Versioning, a Transparent SQL Approach Cioranu, Cosmin Executive Unit for Higher Education, Research, Development and Innovation Funding Cioca, Marius “Lucian Blaga” University of Sibiu In today’s times every piece of software no matter the complexity, produces data, redundant or otherwise, that needs or should be stored in a permanent storage. The simplest way is a file system, but where the need of complexity and flexibility is required, most system designers prefer to use some kind of Database Management System (DBMS). Even with such a management system, on large amounts of data, combined with information updates, it raises the need to retrieve and track the history of modifications of a  specific information alongside the dependencies that makes it coherent. Considering the above the natural solution is to have a database revision or versioning system in which the existing algorithms will still perform without or little modifications and the cost of implementation of such a solution is minimal. Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Database_Versioning_a_Transparent_SQL_Approach Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/90 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Electronic Wallet and Access Control Solution Based on RFID MiFare Cards Lefter, Stefan Victor The Bucharest University of Economic Studies With the advent of Radio Frequency Identification technologies or RFID for short, different types of products and security-relevant applications have been developed for use in fields and businesses like: inventory management, product tracking, access control, passports or transport fare collection. Even though RFID has been around for quite some time, there are some types of businesses like theme parks, water parks or music festivals that haven’t yet tested the benefits that this technology brings. This paper focuses on presenting advantages and disadvantages of using an unified access control and electronic wallet system based on RFID cards like MiFare tags as an alternative to existing ticket/currency access and payment systems employed by the majority of the businesses mentioned above. Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/90 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/91 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Security Principles in ERP Systems Pascu, Cosmin The Bucharest University of Economic Studies Enterprise Resource Planning systems are a critical component nowadays of any private company or public institution. Because of their complexity and their importance to all the core functions of an organization, security represents a major concern that’s often overlooked besides the standard set-up. In this paper I will explain the architecture of Oracle E-Business Suite, one of the most widely spread ERP solutions, its security problems and an approach to solving them, hardening and customizing an Oracle E-Business Suite Application Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Security_Principles_in_ERP_Systems Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/92 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Practical Issues using Distributed Computing Environments – Apache Hadoop Cristian, Toma Bucharest Academy of Economic Studies, Romania http://www.ase.ro The paper presents practical results obtained with sequential standard programming, RPC/RMI mechanism and Apache Hadoop distributed computing platform for a problem of computation time and power that might be used in e-mail text searching. First section is about Distributed Computing technologies and middleware introduction. In second and third section are shown few details about RPC/RMI and Apache Hadoop approaches. The fourth section presents the results of the computation for a classic problem such as word counting from large text files using standard versus remote procedure call versus map-reducing approach. In the end are shown the main advantages of the distributed systems and computing environments. Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/92 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/93 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130330 2013 eng " 2067-4074 dc Mobile Solution for Digital Signature Udrea, Cristian The Bucharest University of Economic Studies This article describes a mobile interpretation of the PKI architecture used in document digital signature. The architecture relies on a three-way client-server model which communicates via a combination of Bluetooth and Wireless LAN channels. The idea of implementing such a system using an Android device as the signee is an alternative to the more traditional approach which uses desktop applications and USB tokens for digital certificate storage and use. Journal of Mobile, Embedded and Distributed Systems 2013-03-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Mobile_Solution_for_Digital_Signature Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 1 (2013): Advances in Data Processing eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/94 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130630 2013 eng " 2067-4074 dc Forecasting Exchange Rates with Mixed Models Badea, Laura Maria The Bucharest University of Economic Studies Gaining accuracy in exchange rate forecasting applications provides true benefits for financial activities. Supported today by the advancements in computing power, machine learning techniques provide good alternatives to traditional time series estimation methods. Very approached in time series forecasting are Artificial Neural Networks (ANNs) which offer robust results and allow a flexible data manipulation. When integrating both, the “white-box” feature of conventional methods and the complexity of machine learning techniques, forecasting models perform even better in terms of generated errors. In this study, input variables (independent variables) are selected using an ARIMA technique and are further employed in differently configured multilayered feed-forward neural networks using Broyden-Fletcher-Goldfarb-Shanno (BFGS) optimization algorithm to perform predictions on EUR/RON and CHF/RON exchange rates. Results in terms of mean squared error highlight good results when using mixed models. Journal of Mobile, Embedded and Distributed Systems 2013-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Forecasting_Exchange_Rates_with_Mixed_Models Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/95 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130630 2013 eng " 2067-4074 dc Adaptive Learning Management System Moisa, Violeta Doctoral School of Economic Informatics Academy of Economic Studies Bucharest This article is an introduction to a new model for an adaptive Learning Management System. It presents the current e-learning standards and describes the elements that can be used to create the system: the sequencing control modes, sequencing rules, navigation controls, learning records and learning record stores. The model is based on artificial intelligent algorithms that analyze the data captured for each user and creates an adaptive navigation path through the learning content of the system, allowing each user to experience the content in different ways Journal of Mobile, Embedded and Distributed Systems 2013-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Adaptive_Learning_Management_System Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/96 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130630 2013 eng " 2067-4074 dc Management of Mobile Web Application Development with Quality Assurance Zamfiroiu, Alin Bucharest University of Economic Studies Vintila, Bogdan Bucharest University of Economic Studies Mobile applications are becoming increasingly used because of the multitude of existing mobile devices. Mobile application development becomes more complex. For mobile devices there are native applications that run directly on the device, web applications accessed via mobile browsers and hybrid applications. Mobile Application Development in any form should be made with quality assurance since when determining the target group and the application architecture. Management of mobile application development is the result obtained and the quality of applications developed in the decisions taken. In this paper decisions made in the development of mobile web applications are presented and how this mobile web application is used by the students. Journal of Mobile, Embedded and Distributed Systems 2013-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/96 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/97 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130630 2013 eng " 2067-4074 dc M-Health: Use of Mobile Devices in Telemedicine Gheorghe, Mihaela The Bucharest University of Economic Studies This paper presents an overview of the healthcare system which needs to be permanently adapted to the newest technologies in order to assure the quality and performance improvements of the medical services. The mobile environment adaption in telemedicine has developed a new domain named m-Health. In the end of the paper I’ll briefly introduce my proposed pilot development of a mobile health application. My ongoing research has been focused upon conceiving a way to increase the efficiency and quality of the medical care system from the physician’s point of view. Journal of Mobile, Embedded and Distributed Systems 2013-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/M-Health_Use_of_Mobile_Devices_in_Telemedicine Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/98 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130630 2013 eng " 2067-4074 dc The Internet as a Technology and Catalyst for Growth Davidescu (Vasile), Andreea Bucharest University of Economic Studies The Internet is often assimilated, or restricted to the dot-coms, considered creator of new business, of new rules and new worlds and fail to see how it has done so much more than that. How it has influenced dramatically the way we do business and the way we live our lives, keeping within the frames of our old business strategies or life paths. It has changed our rhythm. The Internet is to the business world what access to water or medical care is to population. It is the impact of the Internet that makes us take a close look at its development and raise the question whether the Internet represents a new business model, a new business era, significantly different from b.i.e. (before the Internet era), a completely new alphabet or it is a technology that makes new stories possible, written as they may be in the same old business alphabet. The worldwide penetration of the Internet gives it the global impact and we are going to address the importance of the Internet and the dimensions of the phenomenon, its impact on growth. We will afterwards talk about its history and the peek of the dot-com era. The mature stage of the Internet and its numerous uses draws us to our conclusion that although the Internet did create new viable business models, it does more than that. It is a technology that influences present time the same as electricity shaped the world starting with the XIX century. I will draw a parallel between the Industrial Revolution’s electricity and the Third Revolution’s Internet. Journal of Mobile, Embedded and Distributed Systems 2013-06-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/The_Internet_as_a_Technology_and_Catalyst_for_Growth Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 2 (2013): Mobile technologies in Education and Economics eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/99 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130930 2013 eng " 2067-4074 dc WSD Implementation for Processing Improvement of Structured Documents Zurini, Madalina The term of word sense disambiguation, WSD, is introduced in the context of text document processing. A knowledge based approach is conducted using WordNet lexical ontology, describing its structure and components used for the process of identification of context related senses of each polysemy words. The principal distance measures using the graph associated to WordNet are presented, analyzing their advantages and disadvantages. A general model for aggregation of distances and probabilities is proposed and implemented in an application in order to detect the context senses of each word. For the non-existing words from WordNet, a similarity measure is used based on probabilities of co-occurrences. Journal of Mobile, Embedded and Distributed Systems 2013-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/99 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 3 (2013): Performance and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/103 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130930 2013 eng " 2067-4074 dc Analysis of Zero-Day Vulnerabilities in Java Popa, Marius Bucharest University of Economic Studies The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software providers. The paper highlights the main features of such kind of vulnerabilities, some exploitation methods and examples of them for Java zero-day vulnerabilities and how protection strategies can be built on intelligence extracted from attack anatomy analysis. Journal of Mobile, Embedded and Distributed Systems 2013-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Analysis_of_Zero-Day_Vulnerabilities_in_Java Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 3 (2013): Performance and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/104 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130930 2013 eng " 2067-4074 dc Online Digital Trading Alecu, Felician Bucharest Academy of Economic Studies Pocatilu, Paul Bucharest University of Economic Studies Dina, Razvan Bucharest University of Economic Studies Vespan, Dragos Bucharest University of Economic Studies This paper summarizes the main options a digital content creator has in order to obtain money by online trading of digital works. There are multiple ways to get paid for the digital products, like licensing, for example, however this article tries to present the most successful business models targeting the online market. The exclusive rights stated by the copyright laws are helping the authors to maximize to potential advantages coming from their digital creations. Journal of Mobile, Embedded and Distributed Systems 2013-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Online_Digital_Trading Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 3 (2013): Performance and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/105 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "130930 2013 eng " 2067-4074 dc Approaches on Internet of Things Solutions Cristian, Toma Bucharest Academy of Economic Studies, Romania http://www.ase.ro Ciurea, Cristian Bucharest University of Economic Studies Ivan, Ion Bucharest University of Economic Studies The Internet of Things (IoT) ecosystem is presented with its features and particularities in the first section of the paper. In the second section are presented the technical terminology and how inter-domain technologies such as: Internet/Semantic and Middleware, RFID/NFC and Smart Objects-embedded devices are linked together. The paper shows an implementation of the authentication procedure with a proximity tag/card implemented in Java SE, in the third section. The conclusions are presented in the fourth section and they describe the opportunity to develop a proof of concept project, which may have multiple implementations. Journal of Mobile, Embedded and Distributed Systems 2013-09-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Approaches_on_Internet_of_Things_Solutions Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 3 (2013): Performance and Security eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/106 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "131230 2013 eng " 2067-4074 dc ADAPTABLE ALTERNATE REALITY GAMES PLATFORM Cotfas, Liviu-Adrian ELLIADD Laboratoire, Objets et Usages Numériques Team, Université de Franche-Comté http://semlearn.pu-pm.univ-fcomte.fr/elliadd Roxin, Ioan ELLIADD Laboratoire, Objets et Usages Numériques Team, Université de Franche-Comté http://semlearn.pu-pm.univ-fcomte.fr/elliadd In this paper, we present an alternate reality games platform that facilitates the creation of ARG projects with different themes and sizes. The platform is well integrated with the most important social media networks, thus facilitating both the involvement of the public and the creation of a more engaging interaction for the participants. A cloud-based architecture was used in order to allow the platform to easily accommodate projects of various sizes and to provide a good level of scalability. The platform is fully localizable in any language and multiple languages can be used at once to create projects that target users from different countries. An initial project that uses gamification to create an immersive learning environment has been created around the developed platform. The project combines professional and public feedback in order to provide an enhanced learning experience. Journal of Mobile, Embedded and Distributed Systems 2013-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Adaptable_Alternate_Reality_Games_Platform Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 4 (2013): Security for Mobile technologies eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/109 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "131230 2013 eng " 2067-4074 dc Encryption as a Service using Parallel Computing Frameworks Stanimir, Alexandru Costin The Bucharest University of Economic Studies In this article I present a study of an implementation named Encryption as a service which is a web service that can be deployed on a various number of devices and that can take advantage of parallelism in order to provide basic functionality of a cryptographic system: encrypt, decrypt and store data. This goal was achieved by implementing symmetric key cryptography algorithm Advanced Encryption Standard (AES) using Open Computing Language (OpenCL) and exposed this functionality through a REST web service .The performance results were obtained by deploying this solution on Windows Azure platform in order to take advantage of 20x CPU computing power m Amazon Web Service platform equipped with 2x Nvidia Tesla K20 GPU and regular home user hardware. This study represents a first step in a broader project which final goal is to provide full support for all encryption algorithms. Journal of Mobile, Embedded and Distributed Systems 2013-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Encryption_as_a_Service_using_Parallel_Computing_Frameworks Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 4 (2013): Security for Mobile technologies eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/110 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "131230 2013 eng " 2067-4074 dc Location/ID Separation Protocol as Solution for Enterprise Networks Teodorescu, Florin The Bucharest University of Economic Studies The increased rate of expansion and adoption of the internet has raised a lot of challenges for implementing and designing network infrastructures. Among the most important challenges we find the need to have an efficient routing and address system to cope with the increasing number of devices with internet access, and also to ensure the security of these devices against malicious attacks and prevent access to confidential data. Separating the devices identity from its location by implementing the Loc/ID Split scheme, and implementing Virtual Private Networks (VPN) offer the technical support needed to overcome these challenges and increase efficiency and lower implementation costs. The scope of this article is to analyze the benefits of using Location/ID Separation Protocol together with a VPN implementation for creating a scalable infrastructure for the internet of the feature and for secure enterprise networks. The advantages and limitation of such architecture are presented below. Journal of Mobile, Embedded and Distributed Systems 2013-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/110 Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 4 (2013): Security for Mobile technologies eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/111 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "131230 2013 eng " 2067-4074 dc Security of Mobile Tracking Systems Dinu, Dan Mihai The Bucharest University of Economic Studies http://www.aplicatiimobile.com This document will describe an implementation of a closed Mobile Tracking System which can be used with Android devices but can be extended to any platform. A user is able to setup the system and permanently receive location updates from his tracked devices. The system is completely secured and it sends transparent location updates. It can be used in many ways. As a Proof of Concept the system will be implemented over a Car Fleet Tracking example. Journal of Mobile, Embedded and Distributed Systems 2013-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Security_of_Mobile_Tracking_Systems Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 4 (2013): Security for Mobile technologies eng ##submission.copyrightStatement##
oai:ojs.pkp.sfu.ca:article/112 2024-03-28T09:36:08Z jmeds:ART
nmb a2200000Iu 4500 "131230 2013 eng " 2067-4074 dc Secure Inter-Process Communication Radulescu, Valentin The Bucharest University of Economic Studies This article reveals the necessity in modern distributed systems for authentication of a process running in a distributed system and to provide a secure channel for inter-process communication in which both the client authenticates to the server and the server authenticates to the client. The distributed system is a client-server system based on ENEA LINX inter-process communication framework. Enea LINX is a Linux open source project which allows processes to exchange information between several media channels: shared memory (local process communication), Ethernet (local network inter process communication), TCP/IP (inter process communication through Internet) in which nodes are communicating regardless of the underlying media. Because ENEA LINX offers no security mechanism it appears the need for securing the communicating over LINX protocol. Process authentication disables the need for personal authentication of the user and also prevents an attacker from starting a process which will harm the entire system. Besides authentication, using public key combined with symmetric key technologies the secure inter-process communication system must provide integrity and confidentiality. Journal of Mobile, Embedded and Distributed Systems 2013-12-30 00:00:00 application/pdf http://jmeds.eu/index.php/jmeds/article/view/Secure_Inter_Process_Communication Journal of Mobile, Embedded and Distributed Systems; Vol. 5 No. 4 (2013): Security for Mobile technologies eng ##submission.copyrightStatement##
a1b05a848f710ac004c418b3035793af