Note: This page contains sample records for the topic secure web applications from Science.gov.
While these samples are representative of the content of Science.gov,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of Science.gov
to obtain the most current and comprehensive results.
Last update: November 12, 2013.
1

Secure web applications via automatic partitioning  

Microsoft Academic Search

Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities, but currently there are no good methods for deciding when it is secure to do so. Swift automatically

Stephen Chong; Jed Liu; Andrew C. Myers; Xin Qi; K. Vikram; Lantian Zheng; Xin Zheng

2007-01-01

2

Evaluation of web application security risks and secure design patterns  

Microsoft Academic Search

The application of security in web application is of profound importance due to the extended use of web for business. Most of the attacks, are either because the developers are not considering security as a concern or due to the security flaws in designing and developing the applications. The enforcement of security in the software development life cycle of the

Asish Kumar Dalai; Sanjay Kumar Jena

2011-01-01

3

Secure web application via automatic partitioning  

Microsoft Academic Search

Abstract Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented,as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities, but currently there are no good methods for deciding when,it is secure to do so. Swift automatically partitions

Stephen Chong; Jed Liu; Andrew C. Myers; Xin Qi; K. Vikram; Lantian Zheng; Xin Zheng

2007-01-01

4

Web application security assessment by fault injection and behavior monitoring  

Microsoft Academic Search

As a large and complex application platform, the World Wide Web is capable of delivering a broad range of sophisticated applications. However, many Web applications go through rapid development phases with extremely short turnaround time, making it difficult to eliminate vulnerabilities. Here we analyze the design of Web application security assessment mechanisms in order to identify poor coding practices that

Yao-Wen Huang; Shih-Kun Huang; Tsung-Po Lin; Chung-Hung Tsai

2003-01-01

5

Securing web application code by static analysis and runtime protection  

Microsoft Academic Search

Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabilities have been attributed to Web application bugs. Many verification tools are discovering previously unknown vulnerabilities in legacy C programs, raising hopes that the same success can be achieved with Web applications. In this paper,

Yao-Wen Huang; Fang Yu; Christian Hang; Chung-Hung Tsai; Der-Tsai Lee; Sy-Yen Kuo

2004-01-01

6

Impact of plugins on the security of web applications  

Microsoft Academic Search

Many web applications have evolved into complex software ecosystems, consisting of a core maintained by a set of long term developers and a range of plugins developed by third parties. The security of such applications depends as much on vulnerabilities found in plugins as it does in vulnerabilities in the application core. In this paper, we present a study of

James Walden; Maureen Doyle; Rob Lenhof; John Murray; Andrew Plunkett

2010-01-01

7

Secure Web Application Development and Global Regulation  

Microsoft Academic Search

The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today's global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled

William Bradley Glisson; L. Milton Glisson; Ray Welland

2007-01-01

8

Secure Storage for Physically Exposed Web and Application Servers  

Microsoft Academic Search

Web and application servers nowadays often provide authorized users access to large amounts of sensitive data and services. These data and services need to be protected against unauthorized access. Thus, a lot of effort has been put into securing remote data access and network communication. However, attackers may get direct access to the data stored on the physical media, e.g.,

Tim Schattkowsky; Alexander Förster; Christoph Loeser

2006-01-01

9

Secure Code Generation for Web Applications  

Microsoft Academic Search

\\u000a A large percentage of recent security problems, such as Cross-site Scripting or SQL injection, is caused by string-based code\\u000a injection vulnerabilities. These vulnerabilities exist because of implicit code creation through string serialization. Based\\u000a on an analysis of the vulnerability class’ underlying mechanisms, we propose a general approach to outfit modern programming\\u000a languages with mandatory means for explicit and secure code

Martin Johns; Christian Beyerlein; Rosemaria Giesecke; Joachim Posegga

2010-01-01

10

Open, flexible and portable secure web-based health applications.  

PubMed

This paper presents a totally generic client-server model for accessing legacy and new databases according to the three tier architecture principles. It is based on an integrated environment that eases the dynamic creation and instantiation of secure web applications that access multiple database management systems. Emphasis is placed on the ability to query almost any type of relational database and queries can simultaneously address a multitude of data sources. The information is collected, assembled and presented to users depending on a possible set of user profiles. These profiles originate from work on securing the conduct of clinical studies. This has been achieved in the context of the EU funded project HARP (Harmonisation for the Security of Web Technologies and Applications). The generic character of the model is exploited through an accompanying set of development tools. This permits efficient and effective creation and maintenance of applications in several domains of health telematics and beyond. Main merit is the lightweight character of the resulting platform, whereby all necessary instantiations are accomplished through a set of related XML documents. PMID:15061523

Vlachos, Michael; Stassinopoulos, George

2003-01-01

11

Preventing Secure Web Applications Overload through Dynamic Resource Provisioning and Admission Control  

Microsoft Academic Search

Overload control mechanisms such as admission control and connections differentiation have been proven effective for preventing overload of application servers running secure web applications. However, achieving optimal results in overload prevention is only possible when considering some kind of resource management in addition to these mechanisms. In this paper we propose an overload control strategy for secure web applications that

Jordi Guitart; David Carrera

12

JWIG: Yet Another Framework for Maintainable and Secure Web Applications  

Microsoft Academic Search

Although numerous frameworks for web application programming have been developed in recent years, writing web applications remains a challeng- ing task. Guided by a collection of classical design principles, we propose yet another framework. It is based on a simple but flexible server-oriented architecture that coherently supports general aspects of modern web applica- tions, including dynamic XML construction, session management,

Anders Møller; Mathias Schwarz

2009-01-01

13

Security in dynamic web content management systems applications  

Microsoft Academic Search

Introduction The processes behind corporate efforts to create, manage, publish, and archive Web information has also evolved using Web Content Management Systems (WCMS). WCMS allow teams to maintain Web content in a dynamic fashion through a user friendly interface and a modular application approach. This dynamic \\

Ganesh Vaidyanathan; Steven Mautone

2009-01-01

14

A Secure User Interface for Web Applications Running Under an Untrusted Operating System  

Microsoft Academic Search

Many security-critical web applications, such as online banking and e-commerce, require a secure communication path between the user and a remote server. Securing this endto- end path is challenging and can be broken down into several segments. The network part between the user's machine and the server is usually well protected, using secure communication protocols, such as the Transport Layer

Chunxiao Li; Anand Raghunathan; Niraj K. Jha

2010-01-01

15

CAPTCHAs: An Artificial Intelligence Application to Web Security  

Microsoft Academic Search

Nowadays, it is hard to find a popular Web site with a registration form that is not protected by an automated human proof test which displays a sequence of characters in an image, and requests the user to enter the sequence into an input field. This security mechanism is based on the Turing Test—one of the oldest concepts in Artificial

José María Gómez Hidalgo; Gonzalo Alvarez

2011-01-01

16

Enforcing code security in database web applications using libraries and object models  

Microsoft Academic Search

Libraries are commonly though as toolboxes offering reusable components and algorithms. In this paper, we show that a properly designed library can also be used to enforce security, and hence to help in the creation of robust and secure applications. As an illustration, we choose database web applications, because they are the kind of applications that suffers from the highest

Nicolas Juillerat

2007-01-01

17

Paper Evaluation: Securing Web Application Code by Static Anaylysis and Runtime Protection  

Microsoft Academic Search

Evaluation paper of Securing Web Application Code by Static Analysis and Runtime Protection by Huang et al. from 2004 (HYH+04b) attempting to go further in solving web application vulnerabilities in the source code at compile time. This paper explains the concepts and solutions proposed by Huang et al. and also attempts to fully evaluate and discuss its merits and failures,

Michael England

2008-01-01

18

A Gateway to Web Services Security - Securing SOAP with Proxies  

Microsoft Academic Search

Integrating applications and resources using Web Services increases the exposure of critical resources. Consequently, the introduction of Web Services requires that additional effort be spent on assessing the corresponding risks and establishing appropriate security mechanisms. This paper explains the main challenges for securing Web Services and summarizes emerging standards. The most important of these, WS-Security, defines a message-based security model

Gerald Brose

2003-01-01

19

Teaching Web Security Using Portable Virtual Labs  

ERIC Educational Resources Information Center

|We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

Chen, Li-Chiou; Tao, Lixin

2012-01-01

20

Case for avoiding security-enhanced HTTP tools to improve security for Web-based applications.  

National Technical Information Service (NTIS)

This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show ...

B. Wood

1996-01-01

21

Flexible Cryptographic Component Design for Secure Web Applications  

Microsoft Academic Search

Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations have been presented: Hardware and Software implementations of cryptographic algorithms. Hardware implementations of cryptographic algorithms provide much faster than software implementations. However, Software implementations are much flexible and low-cost. Many software-approaches have been presented.

Tae Ho Kim; Jong Jin Kim; Chang Hoon Kim; Chun Pyo Hong

2006-01-01

22

Securing XML Web Services with Elliptic Curve Cryptography  

Microsoft Academic Search

A method to provide secure XML Web services based on elliptic curve cryptography (ECC) is proposed. It adds an XML Web services security component to an existing virtual private network (VPN) gateway to provide integrated security solution for securing both XML Web services and traditional network-based applications. Both the XML Web services security component and the VPN server on the

Ying Liu; Tet H. Yeap; W. O'Brien

2007-01-01

23

Securely Replicated Web Documents  

Microsoft Academic Search

In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delivery Networks. However, in such scenarios data is often placed on un- trusted hosts. As a result, existing replication mechanisms open a wide class vulner- abilities, ranging from denial of service to content masquerading.

Bogdan C. Popescu; Maarten Van Steen; Bruno Crispo; Andrew S. Tanenbaum; Jan Sacha; Ihor Kuz

2005-01-01

24

A Classification of Security Feedback Design Patterns for Interactive Web Applications  

Microsoft Academic Search

In order to design a user interface of a secure interactive application, a method is provided to designers with guidance in designing an adequate security information feedback using a library of user interface design patterns integrating security and usability. The resulting feedback is then evaluated against a set of design\\/evaluation criteria called Human-Computer Interaction for Security (HCI-S). In this way,

Jaime Muñoz-Arteaga; Ricardo Mendoza González; Jean Vanderdonckt

2008-01-01

25

DIRAC: Secure web user interface  

NASA Astrophysics Data System (ADS)

Traditionally the interaction between users and the Grid is done with command line tools. However, these tools are difficult to use by non-expert users providing minimal help and generating outputs not always easy to understand especially in case of errors. Graphical User Interfaces are typically limited to providing access to the monitoring or accounting information and concentrate on some particular aspects failing to cover the full spectrum of grid control tasks. To make the Grid more user friendly more complete graphical interfaces are needed. Within the DIRAC project we have attempted to construct a Web based User Interface that provides means not only for monitoring the system behavior but also allows to steer the main user activities on the grid. Using DIRAC's web interface a user can easily track jobs and data. It provides access to job information and allows performing actions on jobs such as killing or deleting. Data managers can define and monitor file transfer activity as well as check requests set by jobs. Production managers can define and follow large data productions and react if necessary by stopping or starting them. The Web Portal is build following all the grid security standards and using modern Web 2.0 technologies which allow to achieve the user experience similar to the desktop applications. Details of the DIRAC Web Portal architecture and User Interface will be presented and discussed.

Casajus Ramo, A.; Sapunov, M.

2010-04-01

26

Securing Telehealth Applications in a Web-Based e-Health Portal  

Microsoft Academic Search

Telehealth applications can deliver medical services to patients at remote locations using telecommunications technologies, such as the Internet. At the same time, such applications also pose unique security challenges. First, the trust issue becomes more severe due to the lack of visual proofs in telehealth applications. The public key infrastructure (PKI) is insufficient for providing the same kind of trust

Qian Liu; Shuo Lu; Yuan Hong; Lingyu Wang; Rachida Dssouli

2008-01-01

27

The design and implementation of web mining in web sites security  

NASA Astrophysics Data System (ADS)

The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.

Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li

2003-06-01

28

Ripley: automatically securing web 2.0 applications through replicated execution  

Microsoft Academic Search

Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many others. A typ- ical multi-tier AJAX application consists, at the least, of a server- side component implemented in Java J2EE, PHP or ASP.NET and a client-side component running JavaScript. The resulting applica- tion is

K. Vikram; Abhishek Prateek; V. Benjamin Livshits

2009-01-01

29

A Secure Web Services Model Based on the Combination of SOAP Registration Info and Token Proxy  

Microsoft Academic Search

Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to

Youxiang Duan; Yongtang Bao; Lijiang Pan; Beibei Yan; Jiuyun Xun; Nianyun Shi

2008-01-01

30

IT Security: Target: The Web  

ERIC Educational Resources Information Center

|In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…

Waters, John K.

2009-01-01

31

Using Aspects for Security Engineering of Web Service Compositions  

Microsoft Academic Search

Web Service composition languages promise a cheap and effective means for application integration over the Internet as in typical B2B interaction scenarios. BPEL is the upcoming standard for Web Service composition and several implementations of it are already available. However, for Web Service composition languages to keep their promises it is essential to provide more support for security. Companies will

Anis Charfi; Mira Mezini

2005-01-01

32

Security for a Public Web Site.  

National Technical Information Service (NTIS)

The module provides concrete, practice guidance to help organizations improve the security of their networked computer systems. It describes a set of practices that can increase the security of public web servers and the host organization's networks on wh...

R. Firth G. Ford B. Fraser J. Kochmar S. Konda

1997-01-01

33

Migrating Web Applications  

Microsoft Academic Search

Web application development frameworks like the Java Server Pages framework (JSP), provide web applications with essential functions such as maintaining state informa- tion across the application and access control. In the fast paced world of web applications, new frameworks are intro- duced and old ones are updated frequently. A framework is chosen during the initial phases of the project and

Ahmed E. Hassan; Richard C. Holt

34

Web Server Security on Open Source Environments  

NASA Astrophysics Data System (ADS)

Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.

Gkoutzelis, Dimitrios X.; Sardis, Manolis S.

35

Security for Web-Based Tests.  

ERIC Educational Resources Information Center

|The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…

Shermis, Mark D.; Averitt, Jason

36

Designing, Implementing, and Evaluating Secure Web Browsers  

ERIC Educational Resources Information Center

|Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

Grier, Christopher L.

2009-01-01

37

Multi-module vulnerability analysis of web-based applications  

Microsoft Academic Search

In recent years, web applications have become tremendously pop- ular, and nowadays they are routinely used in security-critical envi- ronments, such as medical, financial, and military systems. As the use of web applications for critical services has increased, the num- ber and sophistication of attacks against these applications have grown as well. Current approaches to securing web applications focus either

Davide Balzarotti; Marco Cova; Viktoria V. Felmetsger; Giovanni Vigna

2007-01-01

38

JaCoWeb Security - A CORBA Security Discretionary Prototype  

Microsoft Academic Search

This paper presents a CORBA Security discretionary prototype developed in the c ontext of JaCoWeb S ecurity Project. JaCoWeb S ecurity Project i s developing an authorization scheme for large-scale networks that i s based on structures and concepts introduced in Web, Java an d CORBA for security. This scheme is being developed in order to deal with management of

Carla Merkle Westphall; Joni Da Silva Fraga; Michelle S. Wangham; Lau Cheuk Lung

2002-01-01

39

Web Services Security (WS-Security)  

Microsoft Academic Search

WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message confidentiality, and single message authentication. These mechanisms can be used to accommodate a wide variety of security models and encryption technologies.

Bob Atkinson; Phillip Hallam-Baker; Chris Kaler; John Manferdelli; Hemma Prafullchandra; John Shewchuk

2002-01-01

40

Web Browser Security Update Effectiveness  

NASA Astrophysics Data System (ADS)

We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome's silent update mechanism to Opera's update requiring a full re-installation. We use anonymized logs from Google's world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.

Duebendorfer, Thomas; Frei, Stefan

41

Web Security for Access of Private Information via the Internet  

PubMed Central

Authentication, authorization, accounting, and encryption are goals of security strategies for web information being accessed that is private. The definition of these terms is as follows: • Authentication - validation that the individual (or system) is who they say they are • Authorization - validation that the individual (or system) accessing information is authorized to do so • Accounting - records are kept of what is accessed • Encryption - use of a ‘scrambling’ algorithm such that the information can pass securely across the public Internet without being intelligible; information is specifically ‘unscrambled’ or deencrypted at the receiving end Many tools can be used to meet these goals. The degree to which the goals are met is determined by how we use these tools. Methodologies similar to TSEC[1] and ITSEC[2] can be used to determine the appropriate level of protection for a particular web application. This poster describes a set of effective strategies for web application security and the level of protection each strategy provides.

Anderson, Lynn; Rauscher, Richard; Lee, H.

2001-01-01

42

The Security Aspects in Web-Based Architectural Design Using Service Oriented Architecture  

Microsoft Academic Search

Distributed Web-based applications have been progressively increasing in number and scale over the past decades. There is an intensification of the need for security frameworks in the era of Web-based applications when we refer to distributed telemedicine interoperability architectures. In contrast, service oriented architecture (SOA) is gaining popularity day by day when we specially consider the Web applications. SOA is

Asadullah Shaikh; Aijaz Soomro; Sheeraz Ali; Nasrullah Memon

2009-01-01

43

Factsheets Web Application.  

National Technical Information Service (NTIS)

The Factsheets web application was conceived out of the requirement to create, update, publish, and maintain a web site with dynamic research and development (R and D) content. Before creating the site, a requirements discovery process was done in order t...

F. G. Vigil R. G. Reeder

2000-01-01

44

Enhancing web browser security against malware extensions  

Microsoft Academic Search

In this paper we examine security issues of functionality extension mechanisms supported by web browsers. Extensions (or “plug-ins”)\\u000a in modern web browsers enjoy unrestrained access at all times and thus are attractive vectors for malware. To solidify the\\u000a claim, we take on the role of malware writers looking to assume control of a user’s browser space. We have taken advantage

Mike Ter Louw; Jin Soon Lim; V. N. Venkatakrishnan

2008-01-01

45

Web Mining: Machine Learning for Web Applications.  

ERIC Educational Resources Information Center

Presents an overview of machine learning research and reviews methods used for evaluating machine learning systems. Ways that machine-learning algorithms were used in traditional information retrieval systems in the "pre-Web" era are described, and the field of Web mining and how machine learning has been used in different Web mining applications

Chen, Hsinchun; Chau, Michael

2004-01-01

46

Web Mining: Machine Learning for Web Applications.  

ERIC Educational Resources Information Center

|Presents an overview of machine learning research and reviews methods used for evaluating machine learning systems. Ways that machine-learning algorithms were used in traditional information retrieval systems in the "pre-Web" era are described, and the field of Web mining and how machine learning has been used in different Web mining applications

Chen, Hsinchun; Chau, Michael

2004-01-01

47

Web Hosting — The Security Risks  

Microsoft Academic Search

A company’s website is critical to it’s business. It relies on the site to provide information to its customers — as an interface to communicate with them or sell goods online. As such, it needs to be available 24 hours a day, seven days a week, providing a lightening fast response with first grade security. These things cannot always be

Deri Jones

2001-01-01

48

Phonetic Experiment Web Application  

Microsoft Academic Search

This paper describes the development of a methodology and software for phonetics designed with the support of the Internet\\u000a and web technologies. A web application was created as a data gathering instrument for a phonetic study which aimed to detect\\u000a the most frequent segmental markers of Macedonian-English accented speech as perceived by native speakers of English and to\\u000a find out

Anastazija Kirkova-Naskova; Goran Bakraceski; Vladimir Apostolski; Dimitar Trajanov

49

UDDI and WSDL extensions for Web service: a security framework  

Microsoft Academic Search

This paper outlines a framework for implementing security for Web Services by extending UDDI and WSDL. The framework includes security of UDDI itself, security of Web services transactions, and linkages with existing infrastructures outside UDDI. Extensions to the schema for both UDDI and WSDL are identified, as well as extensions to the security of thepublication and discovery mechanism itself.

Carlisle Adams; Sharon Boeyen

2002-01-01

50

An overview of cryptographic solutions to web security  

Microsoft Academic Search

The Internet is huge and largely unregulated place. There are a lot of dangers in putting up a web page on Internet. These vary from invasions of privacy to hackers cracking our system. One of the most important issues in traditional and modern network architecture is security. Web security is a vast area encompassing computer system security, network security, authentication

V. K. Nisha; Liyamol Aliyar; Asha Ali

2010-01-01

51

Scalable security description framework for mobile Web services  

Microsoft Academic Search

We propose a scalable security description framework for mobile Web services that takes account of service context such as time constraints, purchase prices, and network connection status. We also present a secure open interface for multi-level authorization procedures. To describe AAA service flows, the framework adopts the Web service flow language (WSFL) and the Web service description language (WSDL); it

Masashi Morioka; Yoshifumi Yonemoto; Takashi Suzuki; Minoru Etoh

2003-01-01

52

Reliable and Adaptable Security Engineering for Database-Web Services  

Microsoft Academic Search

Abstract. The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security management for Web services, while on the other hand there exist well established mechanisms for access control in the area of commercial database systems. In handling security for services that rely on database

Martin Wimmer; Daniela Eberhardt; Pia Ehrnlechner; Alfons Kemper

2004-01-01

53

Building Web Applications  

Microsoft Academic Search

\\u000a Delivering content and applications via web browsers is one of the most important aspects of modern software development. In\\u000a this chapter, we examine how you can build web applications using F#. The topics we cover are as follows:\\u000a \\u000a \\u000a \\u000a \\u000a • \\u000a \\u000a \\u000a Serving static files and dynamic content by directly responding to HTTP requests\\u000a \\u000a \\u000a \\u000a • \\u000a \\u000a \\u000a Using the ASP.NET framework to develop page-based, server-side

Don Syme; Adam Granicz; Antonio Cisternino

54

A Security Architecture for Grid-enabling OGC Web Services  

NASA Astrophysics Data System (ADS)

In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.

Angelini, Valerio; Petronzio, Luca

2010-05-01

55

A Kerberos security architecture for web services based instrumentation grids  

Microsoft Academic Search

Instrumentation Grids aim at controlling and managing heterogeneous resources & instruments securely, reliably and in near real-time. Within this context, we present a Web Services based Security Architecture that aims at improving security performance maintaining at the same time interoperability with legacy Grid Security Infrastructure (GSI). Our architecture utilizes GSI X.509 Certificates or Proxy Certificates (RFC3820) for the initial authentication

Athanasios Moralis; Vassiliki Pouli; Symeon Papavassiliou; Vasilis Maglaris

2009-01-01

56

Application Security Automation  

ERIC Educational Resources Information Center

|With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

Malaika, Majid A.

2011-01-01

57

Teaching a web security course to practice information assurance  

Microsoft Academic Search

This paper presents a hybrid teaching approach, a new Web Security course as well as how to use the hybrid approach to teach the Web Security course to practice information assurance. The hybrid teaching approach contains three key issues that are keeping the lecture materials up-to-date, assigning former research projects as comprehensive team projects, and connecting classroom knowledge with real

H. Yu; W. Liao; X. Yuan; J. Xu

2006-01-01

58

Improving the Security and Robustness of Modern Web Browsers  

Microsoft Academic Search

Despite their popularity, modern web browsers do not oer a secure or robust environment for interacting with untrusted content. Today's web users face a variety of threats, including exploits of browser vul- nerabilities, interference between web sites, script in- jection attacks, and abuse of authentication creden- tials. To address these threats, I leverage an anal- ogy between operating systems and

Charles Reis

59

Building Fast and Secure Web Services with OKWS  

Microsoft Academic Search

Abstract OKWS is a Web server specialized for secure and fast delivery of dynamic,content. It provides Web developers with a small set of tools powerful enough to build complex Web- based systems. Despite its emphasis on security, OKWS shows performance improvements compared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWS’s throughput and responsiveness exceed that of Apache

Maxwell Krohn

2005-01-01

60

Web Applications With Django  

Microsoft Academic Search

\\u000a Django is a modern Python web framework that redefined web development in the Python world. A fullstack approach, pragmatic\\u000a design, and superb documentation are some of the reasons for its success.

Josh Juneau; Jim Baker; Victor Ng; Leo Soto; Frank Wierzbicki

61

Web based remote security system (WRSS) model development  

Microsoft Academic Search

Security of homes, businesses, commercial, and industrial organizations has been of utmost importance. At Florida International University, Electrical and Computer Engineering Department, a Web based remote security system (WRSS) model is being developed by the authors. Proper electronic sensors are installed to detect fire, smoke, physical break-in, and other similar security risks. In addition, proper audio and video monitoring of

S. V. Wunnava; M. De La Cruz

2000-01-01

62

OWL-S Semantics of Security Web Services: a Case Study  

Microsoft Academic Search

\\u000a The power of Web services (WS) technology lies in the fact that it takes integration to a new level. With the increasing amount\\u000a of services available on the Web, solutions are needed that address security concerns of distributed Web service applications\\u000a such as end-to-end service requirements for authentication, authorization, data integrity and confidentiality, and non-repudiation\\u000a in the context of dynamic

Grit Denker; Son Nguyen; Andrew Ton

2004-01-01

63

Structure and technology on Application-WebGIS  

Microsoft Academic Search

Application-WebGIS is a kind of application system that provides GIS application services on the Internet for professional users. Its architectural structure should satisfy the professional needs, especially in the data security, mode and speed of map transmission, application convenience, isomerous platform and adaptability of all kinds of browser. The popular commercial WebGIS cannot meet the professional needs. This article puts

Tang Dali; Huang Jixian

2001-01-01

64

Web 2.0 Creates Security Challenges  

Microsoft Academic Search

By its very nature, Web 2.0 is interactive, allowing users to add input such as participatory book reviews, blogs, wikis, social net works, and video- and photo sharing services to Web sites. Web 2.0 has consequently become very popular with users and Web site operators. However, the approach's interactivity has also made it popular with hackers. This paper discusses some

George Lawton

2007-01-01

65

A Policy Based Approach to Security for the Semantic Web  

Microsoft Academic Search

\\u000a Along with developing specifications for the description of meta-data and the extraction of information for the Semantic Web,\\u000a it is important to maximize security in this environment, which is fundamentally dynamic, open and devoid of many of the clues\\u000a human societies have relied on for security assessment. Our research investigates the marking up of web entities with a semantic\\u000a policy

Lalana Kagal; Timothy W. Finin; Anupam Joshi

2003-01-01

66

Framework testing of web applications using TTCN-3  

Microsoft Academic Search

Functional testing of web applications has become increasingly complex. Browser-based interfaces incorporate rich, client-side\\u000a scripting that is increasingly independent of server-side application logic. At the same time, the server side application\\u000a logic interacts with reusable components for key elements (security, shopping cart, product catalog, order processing) within\\u000a the framework of a component-based architecture, using beans and web services. In this

Bernard Stepien; Liam Peyton; Pulei Xiong

2008-01-01

67

Kerberos Plus RSA for World Wide Web Security  

Microsoft Academic Search

We show how to use Kerberos to enable its clientsto interact securely with non-Kerberized World WideWeb servers. That is, our protocol does not requirethat the Web server be a member of a Kerberos realm,and also does not rely on time-synchronization betweenthe participants. In our protocol, the Kerberosclient uses the Web server's public-key certificateto gain cryptographic credentials that conformto public-key authentication

Don Davis

1995-01-01

68

Securing the Web Using Human Perception and Visual Object Interpretation  

Microsoft Academic Search

Being motivated by the need for usable Web security systems, we present in this paper new image-based CAPTCHA systems that overcome the weaknesses of commercial CAPTCHAs. We describe Tree and Shape CAPTCHAs in addition to handwritten CAPTCHAs that feature visual objects transformed according to specific principles of cognitive psychology. These transformations, in addition to other security measures we describe, ensure

Amalia I. Rusu; Rebecca Docimo

2009-01-01

69

Security Encryption Scheme for Communication of Web Based Control Systems  

NASA Astrophysics Data System (ADS)

A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

Robles, Rosslin John; Kim, Tai-Hoon

70

SMIL makes Web applications multimodal  

Microsoft Academic Search

Over the past few years, programmers have used proprietary authoring tools and file formats (such as Macromedia's Director) to develop multimedia applications for desktop computers. They have used CD-ROM disks and, more recently, DVD disks to distribute these applications that mix text, graphics, audio, and video content. Today, the World Wide Web competes with CD-ROMs and DVDs to distribute multimedia

G. Flammia

1998-01-01

71

Cost estimation for web applications  

Microsoft Academic Search

In this paper, we investigate the application of the COBRA#8482; method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. COBRA combines expert knowledge with data on a small number of projects to develop cost estimation models, which can also be used for risk analysis and benchmarking purposes. We modified and applied the

Melanie Ruhe; Ross Jeffery; Isabella Wieczorek

2003-01-01

72

How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores  

Microsoft Academic Search

Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the Internet. In this paper, we study the security implications of this problem to merchant websites that accept payments through third-party cashiers (e.g., PayPal, Amazon

Rui Wang; Shuo Chen; XiaoFeng Wang; Shaz Qadeer

2011-01-01

73

Design metrics for web application maintainability measurement  

Microsoft Academic Search

Many web applications have evolved from simple HTML pages to complex applications that have a high maintenance cost. This high maintenance cost is due to the heterogeneity of web applications, to fast Internet evolution and the fast- moving market which imposes short development cycles and frequent modifications. In order to control the maintenance cost, quantitative metrics for predicting web applications

Emad Ghosheh; Sue Black; Jihad Qaddour

2008-01-01

74

Securing mobile commerce interactions through secure mobile web services  

Microsoft Academic Search

The provision of data communications via Public Land Mobile Networks employing the General Packet Radio Service (GPRS) technology has opened up m-commerce opportunities for businesses. However, security concerns with wireless technologies are inhibiting the adoption of m-commerce by business. We show how a sole reliance on the security provided inherently within GPRS networks is inadequate for m-commerce activity. GPRS networks

T. Moyo; B. Irwin; M. Wright

75

Web Services-Based Security Requirement Elicitation  

Microsoft Academic Search

†† Summary Web services (WS, hereafter) paradigm has attained such a relevance in both the academic and the industry wor ld that the vision of the Internet has evolved from being considered as a mere repository of data to become t he underlying infrastructure on which organizations' s trategic business operations are being deployed (1). Securit y is a key

Carlos Gutiérrez; Eduardo Fernández-medina; Mario Piattini

2007-01-01

76

Evaluation for Web-Based Applications  

Microsoft Academic Search

\\u000a Web applications are of the following categories: document-centric, interactive, transactional, workflow-based, portal-oriented,\\u000a collaborative, social web, ubiquitous and semantic web. The web application modelling methods (content, hypertext, presentation,\\u000a customization) and architectures (layered or data-aspect) influence the quality of a web application. Technology-aware web\\u000a application design involves presentation, interaction and functional design. Testing involves planning, preparing, performing,\\u000a reporting and agile approaches. In

Anastasia N. Kastania; Stelios Zimeras

77

Improving Performance of Cluster-based Secure Application Servers with User-level Communication  

Microsoft Academic Search

State-of-art cluster-based data centers consisting of three tiers (web server, application server and database server) are being used to host complex Web services such as e-commerce applications. The application server handles dynamic and sen- sitive Web contents that need protection from eavesdropping, tampering and forgery. Although the Secure Socket Layer (SSL) is the most popular protocol to provide a secure

Jin-ha Kim; Gyu Sang Choi; Chita R. Das

2005-01-01

78

Software Fault Prediction Models for Web Applications  

Microsoft Academic Search

Our daily life increasingly relies on Web applications. Web applications provide us with abundant services to support our everyday activities. As a result, quality assurance for Web applications is becoming important and has gained much attention from software engineering community. In recent years, in order to enhance software quality, many software fault prediction models have been constructed to predict which

Le Truong Giang; Dongwon Kang; Doo-Hwan Bae

2010-01-01

79

MedlinePlus Connect: Web Application  

MedlinePLUS

MedlinePlus Connect: Web Application To use the sharing features on this page, please enable JavaScript. MedlinePlus Connect is available as a ... please see our guidelines and instructions on linking. Web Application Overview The API for the Web application ...

80

A Post-Office-Inspired Closed-Security-Ring Model for Web Service Flow  

Microsoft Academic Search

Inspired by post-office-federation, a security integrated model is designed. The model can provide convenient flexible security for Web service, and the closed-security-ring mechanism can integrate some security technologies in a completed procedure of business. The model includes four security control layers, and each layer provides different security function. The first layer can permit people to select proper security-grade for Web

Qing-Hua Meng; Yong-Sheng Ding

2006-01-01

81

Capturing Trust in Social Web Applications  

Microsoft Academic Search

The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site

John O'Donovan

2009-01-01

82

Web services and grid security vulnerabilities and threats analysis and model  

Microsoft Academic Search

The paper provides an overview of available Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services attacks and vulnerabilities. This is further used to introduce a security model for interacting Grid and Web Services that illustrates how basic security services should interact to provide an attack-resilient multilayer protection in a typical service-oriented architecture.

Yuri Demchenko; Leon Gommans; Cees T. A. M. De Laat; Bas Van Oudenaarde

2005-01-01

83

Hera: Engineering Web Applications Using Semantic Web-based Models  

NASA Astrophysics Data System (ADS)

In this chapter, we consider the contribution of models and model-driven approaches based on Semantic Web for the development of Web applications. The model-driven web engineering approach, that separates concerns on different abstraction level in the application design process, allows for more robust and structural design of web applications. This is illustrated by the use of Hera, an approach from the class of Web engineering methods that relies on models expressed using RDF(S) and an RDF(S) query language. It illustrates how models and in particular models that fit with the ideas and concepts from the Semantic Web allow to approach the design and engineering of modern, open and heterogeneous Web based systems. In the presented approach, adaptation and personalization are a main aspect and it is illustrated how they are expressed using semantic data models and languages. Also specific features of Hera are discussed, like interoperability between applications in user modeling, aspect orientation in Web design and graphical tool support for Web application design.

van der Sluijs, Kees; Houben, Geert-Jan; Leonardi, Erwin; Hidders, Jan

84

Combining World Wide Web and Wireless Security  

Microsoft Academic Search

In current electronic commerce systems, customers have an on-line inter- action with merchants via a browser on their personal computer. Also payment is done electronically via the Internet, mostly with a credit card. In parallel to this, e-services via wireless-only systems are emerg- ing. This paper identifles security and functionality weaknesses in both of these current approaches. The paper discusses

Joris Claessens; Bart Preneel; Joos Vandewalle

2001-01-01

85

Exploiting Linked Data to Build Web Applications  

Microsoft Academic Search

Semantic Web technologies have been around for a while. However, such technologies have had little impact on the development of real-world Web applications to date. With linked data, this situation has changed dramatically in the past few months. This article shows how linked data sets can be exploited to build rich Web applications with little effort.

Michael Hausenblas

2009-01-01

86

XMM-Newton Mobile Web Application  

NASA Astrophysics Data System (ADS)

We present the first XMM-Newton web mobile application, coded using new web technologies such as HTML5, the Query mobile framework, and D3 JavaScript data-driven library. This new web mobile application focuses on re-formatted contents extracted directly from the XMM-Newton web, optimizing the contents for mobile devices. The main goals of this development were to reach all kind of handheld devices and operating systems, while minimizing software maintenance. The application therefore has been developed as a web mobile implementation rather than a more costly native application. New functionality will be added regularly.

Ibarra, A.; Kennedy, M.; Rodríguez, P.; Hernández, C.; Saxton, R.; Gabriel, C.

2013-10-01

87

Aspect Based Conceptual Modelling of Web Applications  

Microsoft Academic Search

Though there are many Web application modelling approches these are aimed at assiting the implmentaion process. There are\\u000a many benefits in creating a conceptual model of the Web application to verify whether the application domian requrements have\\u000a been propery understood. We have developed a way of modelling a web application at a conceptual level based on set of aspects;\\u000a Overall

Athula Ginige

2008-01-01

88

Federated security: lightweight security infrastructure for object repositories and Web services  

Microsoft Academic Search

To realize the idea of Web services as a scalable technology, enabling access to a provider's resources for a wide range of clients, requires a similar scalable security solution. Management of user accounts for all possible clients in each provider is simply unfeasible. The alternative approach to having federated identity management is currently being developed by main software vendors. In

Marek Hatala; Ty Mey Eap; Ashok Shah

2005-01-01

89

Capturing Trust in Social Web Applications  

Microsoft Academic Search

The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners\\u000a of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which\\u000a are frameworks for the publication of user-provided content. Traditionally, Web content could be ‘trusted’ to some extent\\u000a based on the site

John O’Donovan

90

Develop Web GIS Based Intelligent Transportation Application Systems with Web Service Technology  

Microsoft Academic Search

The GIS Web service technology provides a new mechanism and an effective method to develop next generation GIS system. This paper investigates the method to develop Web GIS based ITS application systems with GIS Web service technology. Based on the OGC GIS Web service framework and SOA architecture, a distributed and Web service enabled Web-GIS based ITS application system is

Xiaolin Lu

2006-01-01

91

An Aspect of Application Security Management  

Microsoft Academic Search

This paper first presents work in the area of application security management and then investigates relations to the application of Aspect Oriented Software Development (AOSD) to security, as they are both grounded on the systems engineering principle of \\

Philip Robinson; Maarten Rits; Roger Kilian-Kehr

92

SIF: Enforcing Confidentiality and Integrity in Web Applications  

Microsoft Academic Search

SIF (Servlet Information Flow) is a novel software framework for building high-assurance web applications, using language-based information-flow control to en- force security. Explicit, end-to-end confidentiality and integrity policies can be given either as compile-time program annotations, or as run-time user requirements. Compile-time and run-time checking efficiently enforce these policies. Information flow analysis is known to be useful against SQL injection

Stephen Chong; K. Vikram; Andrew C. Myers

93

Semantic-Web Technology: Applications at NASA.  

National Technical Information Service (NTIS)

We provide a description of work at the National Aeronautics and Space Administration (NASA) on building system based on semantic-web concepts and technologies. NASA has been one of the early adopters of semantic-web technologies for practical application...

N. Ashish

2004-01-01

94

Modeling Customizable Web Applications - A Requirement's Perspective  

Microsoft Academic Search

The web is more and more used a s a p latform for full- fledged, increasingly c omplex applications, where a hug e amount of change-intensive data is managed b y underlying database systems. From a software e ngineering po int of view, the development of web app lications r equires proper modeling methods in order to ensure architectural soundness

Gerti Kappel; Werner Retschitzegger; Wieland Schwinger

95

Realistic Load Testing ofWeb Applications  

Microsoft Academic Search

We present a new approach for performing load testing of web applications by simulating realistic user behaviour with stochastic form-oriented analysis models. Realism in the simulation of user behaviour is necessary in order to achieve valid testing results. In contrast to many other user models, web site navigation and time delay are modelled stochastically. The models can be constructed from

Dirk Draheim; John C. Grundy; John G. Hosking; Christof Lutteroth; Gerald Weber

2006-01-01

96

Web service applicability in telecommunication service platforms  

Microsoft Academic Search

The paper describes how a telecom operator can leverage on Web services to provide integrated services which span over several technologies. In addition, it addresses how SIP protocol (session initiation protocol) can be used along with Web service technologies to enable a new set of integrated IT and Telco services. The paper highlights the benefits and drawbacks of application of

Alberto Baravaglio; Carlo Alberto Licciardi; Claudio Venezia

2005-01-01

97

Client\\/Server Web Application Development  

Microsoft Academic Search

Client Side Web Application Development refers to coding in HTML and\\/or scripting languages. When a user opens a web page, which is stored in a server, the file is transferred from the server computer to the client computer and viewed in the client computer. If it consists of scripts, execution of these programs is done in the client computer. In

Mehdi Raoufi; Kimberly Spoa; Zachary Wiggins

98

Opal web services for biomedical applications  

PubMed Central

Biomedical applications have become increasingly complex, and they often require large-scale high-performance computing resources with a large number of processors and memory. The complexity of application deployment and the advances in cluster, grid and cloud computing require new modes of support for biomedical research. Scientific Software as a Service (sSaaS) enables scalable and transparent access to biomedical applications through simple standards-based Web interfaces. Towards this end, we built a production web server (http://ws.nbcr.net) in August 2007 to support the bioinformatics application called MEME. The server has grown since to include docking analysis with AutoDock and AutoDock Vina, electrostatic calculations using PDB2PQR and APBS, and off-target analysis using SMAP. All the applications on the servers are powered by Opal, a toolkit that allows users to wrap scientific applications easily as web services without any modification to the scientific codes, by writing simple XML configuration files. Opal allows both web forms-based access and programmatic access of all our applications. The Opal toolkit currently supports SOAP-based Web service access to a number of popular applications from the National Biomedical Computation Resource (NBCR) and affiliated collaborative and service projects. In addition, Opal’s programmatic access capability allows our applications to be accessed through many workflow tools, including Vision, Kepler, Nimrod/K and VisTrails. From mid-August 2007 to the end of 2009, we have successfully executed 239 814 jobs. The number of successfully executed jobs more than doubled from 205 to 411 per day between 2008 and 2009. The Opal-enabled service model is useful for a wide range of applications. It provides for interoperation with other applications with Web Service interfaces, and allows application developers to focus on the scientific tool and workflow development. Web server availability: http://ws.nbcr.net.

Ren, Jingyuan; Williams, Nadya; Clementi, Luca; Krishnan, Sriram; Li, Wilfred W.

2010-01-01

99

Multimedia Security System for Security and Medical Applications  

ERIC Educational Resources Information Center

|This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

Zhou, Yicong

2010-01-01

100

Conceptual Graphs for Semantic Web Applications  

Microsoft Academic Search

In this paper, we aim at showing the advantages of Conceptual Graph formalism for the Semantic Web through several real-world applications in the framework of Corporate Semantic Webs. We describe the RDF(S)-dedicated semantic search engine, CORESE, based on a correspondence between RDF(S) and Conceptual Graphs, and we illustrate the interest of Conceptual Graphs through the analysis of several real-world applications

Rose Dieng-Kuntz; Olivier Corby

2005-01-01

101

Detective Browsers: A Software Technique to Improve Web Access Performance and Security  

Microsoft Academic Search

The amount of dynamic Web contents and secured e- commerce transactions has been dramatically increasing in In- ternet where proxy servers between clients and Web servers are commonly used for the purpose of sharing commonly accessed data and reducing Internet traffic. A significant and unneces- sary Web access delay is caused by the overhead in proxy servers to process two

Songqing Chen; Xiaodong Zhang

102

Research on E-Commerce Application Based on Web Mining  

Microsoft Academic Search

This paper introduces the concept and the classification of Web mining, analyzes the Web mining process and the analysis techniques often used. We propose the system architecture based on Web mining of E-commerce application, and discuss the analysis model of Web Mining and the applications in E-commerce. Web mining can find potential customers and achieve website structure optimization. It can

Shen Zihao; Wang Hui

2010-01-01

103

Highly scalable web applications with zero-copy data transfer  

Microsoft Academic Search

The performance of server-side applications is becoming increasingly important as more applications exploit the Web application model. Extensive work has been done to improve the performance of individual software components such as Web servers and programming language runtimes. This paper describes a novel approach to boost Web application performance by improving inter-process communication between a programming language runtime and Web

Toyotaro Suzumura; Michiaki Tatsubori; Scott Trent; Akihiko Tozawa; Tamiya Onodera

2009-01-01

104

Database driven user friendly web application using Ajax  

Microsoft Academic Search

Abstract Given a set of dierent existing systems, a single web application has been constructed. Acting as a replacement for the systems the web application has been built up as a multiple page Ajax enabled web application. Using Ajax as technique to enhance the usability along with performance criterion such as response time for end users. The web application follows

David Jonsson

105

A Dynamic Context-Aware Security Infrastructure for Distributed Healthcare Applications  

Microsoft Academic Search

Abstract The rapid worldwide,deployment,of the Internet and Web isthe,enabler ,of a ,new ,generation ,of e-healthcare applications, but the provision of a security architecture that can ensure ,the privacy and ,security of sensitive healthcare data is still an open,question. Current solutions tothis problem (mostly built on static RBAC models) are application-dependent ,and do not ,address the intricate security requirements ,of healthcare

Junzhe Hu; Alfred C. Weaver

106

Mandatory Access Control applications to web hosting  

Microsoft Academic Search

\\u000a “Hosting” represents a commonplace solution for the low-cost implementation of web sites through the efficient sharing of\\u000a the resources of a single server. The arising security problems, however, are not always easily dealt with under the Discretionary\\u000a Access Control model implemented by traditional operating systems. More robust separation between the hosted sites, as well\\u000a as more robust protection of the

Marco Prandini; Eugenio Faldella; Roberto Laschi

2007-01-01

107

Using Web Objects for Estimating Software Development Effort for Web Applications  

Microsoft Academic Search

Web development projects are certainly different from traditional software development projects and hence require differently tailored measures for accurate effort estimation. We investigate the suitability of a newly proposed size measure for Web development projects: Web objects. Web objects have been specifically developed for sizing Web applications and used for estimating effort in a COCOMO Il-like estimation model called WEBMO.

Melanie Ruhe; D. Ross Jeffery; Isabella Wieczorek

2003-01-01

108

Intelligent Video for Homeland Security Applications  

Microsoft Academic Search

This paper considers the problem of protecting critical infrastructure and other homeland security initiatives with the application of an intelligent video (IV) system. A systems engineering approach is followed to decompose top level requirements into system functions based on the Department of Homeland Security (DHS) Strategic Plan, The National Strategy for Homeland Security, and the National Infrastructure Protection Plan (NIPP).

A. Nusimow

2007-01-01

109

Performance Comparison of Web Services Security: Kerberos Token Profile Against X.509 Token Profile  

Microsoft Academic Search

Web Services (WS) Security is the set of standards that provides means for applying security to WS. In this paper we present the performance of the WS Security Kerberos Token profile in contrast to the X.509 Token Profile. The measurements are based on the Apache wss4j library for the X.509 Token Profile and the extensions we have made on the

A. Moralis; Vassiliki Pouli; Mary Grammatikou; Symeon Papavassiliou; Vasilis Maglaris

2007-01-01

110

Capturing Trust in Social Web Applications  

NASA Astrophysics Data System (ADS)

The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site it originated from. Algorithms such as Google's PageRank were (and still are) used to compute the importance of a website, based on analysis of underlying link topology. In the Social Web, analysis of link topology merely tells us about the importance of the information framework which hosts the content. Consumers of information still need to know about the importance/reliability of the content they are reading, and therefore about the reliability of the producers of that content. Research into trust and reputation of the producers of information in the Social Web is still very much in its infancy. Every day, people are forced to make trusting decisions about strangers on the Web based on a very limited amount of information. For example, purchasing a product from an eBay seller with a `reputation' of 99%, downloading a file from a peer-to-peer application such as Bit-Torrent, or allowing Amazon.com tell you what products you will like. Even something as simple as reading comments on a Web-blog requires the consumer to make a trusting decision about the quality of that information. In all of these example cases, and indeed throughout the Social Web, there is a pressing demand for increased information upon which we can make trusting decisions. This chapter examines the diversity of sources from which trust information can be harnessed within Social Web applications and discusses a high level classification of those sources. Three different techniques for harnessing and using trust from a range of sources are presented. These techniques are deployed in two sample Social Web applications—a recommender system and an online auction. In all cases, it is shown that harnessing an increased amount of information upon which to make trust decisions greatly enhances the user experience with the Social Web application.

O'Donovan, John

111

An Industrial Study Using UML Design Metrics for Web Applications  

Microsoft Academic Search

Many web applications have evolved from simple HTML pages to complex applications that are difficult to maintain. In order\\u000a to control the maintenance of web applications quantitative metrics and models for predicting web applications maintainability\\u000a must be used. This paper introduces new design metrics for measuring the maintainability of web applications from class diagrams.\\u000a The metrics are based on Web

Emad Ghosheh; Sue Black; Jihad Qaddour

2008-01-01

112

Security applications of terahertz technology  

NASA Astrophysics Data System (ADS)

Recent events have accelerated the quest for ever more effective security screening to detect an increasing variety of threats. Many techniques employing different parts of the electromagnetic spectrum from radio up to X- and gammaray are in use. Terahertz radiation, which lies between microwave and infrared, is the last part to be exploited for want, until recently, of suitable sources and detectors. This paper describes practical techniques for Terahertz imaging and spectroscopy which are now being applied to a variety of applications. We describe a number of proof-of-principle experiments which show that Terahertz imaging has the ability to use very low levels of this non-ionising radiation to detect hidden objects in clothing and common packing materials and envelopes. Moreover, certain hidden substances such as plastic explosives and other chemical and biological agents may be detected from their characteristic Terahertz spectra. The results of these experiments, coupled with availability of practical Terahertz systems which operate outside the laboratory environment, demonstrate the potential for Terahertz technology in security screening and counterterrorism.

Kemp, Michael C.; Taday, P. F.; Cole, Bryan E.; Cluff, J. A.; Fitzgerald, Anthony J.; Tribe, William R.

2003-08-01

113

Modeling Request Routing in Web Applications  

Microsoft Academic Search

For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mechanisms used in a platform such as J2EE. We define request routing to be the possible sequences of server-side components that handle requests. Many maintenance tasks require the developer to understand the

Minmin Han; Christine Hofmeister

2006-01-01

114

Medical mobile to web services application  

Microsoft Academic Search

Mobile communication systems of today provide increased availability, minituarization and enhanced data rates. This emergence is expected to enhance the deployment of mobile systems in the health services. This paper intends to explain the medical mobile to Web service application developed using the Java Micro Edition (J2ME) application platform. It involves the development of a MySQL medical database for Alzheimer

S. F. S. Adnan; H. Hashim

2009-01-01

115

An Integrated Software Development Environment for Web Applications  

Microsoft Academic Search

\\u000a In recent years, the World Wide Web has become an ideal platform for developing Internet applications. World Wide Web service\\u000a and application engineering is a complex task. Many web applications at present are large-scale and involve hundreds or thousands\\u000a of web pages and sophisticated interactions with users and databases. Thus, improving the quality of web applications and\\u000a reducing development costs

Byeongdo Kang

2004-01-01

116

Secure search in enterprise webs: tradeoffs in efficient implementation for document level security  

Microsoft Academic Search

Document level security (DLS) - enforcing permissions prevailing at the time of search - is specified as a mandatory requirement in many enterprise search applications. Unfortunately, depending upon implementation details and values of key parameters, DLS may come at a high price in increased query processing time, leading to an unacceptably slow search experience. In this paper we present a

Peter Bailey; David Hawking; Brett Matson

2006-01-01

117

Robust image obfuscation for privacy protection in Web 2.0 applications  

NASA Astrophysics Data System (ADS)

We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in Web 2.0 applications. It helps to protect the privacy of the users against threats caused by internet bots and web applications that extract biometric and other features from images for data-linkage purposes. The approaches described in this paper consider that images uploaded to Web 2.0 applications pass several transformations, such as scaling and JPEG compression, until the receiver downloads them. In contrast to existing approaches, our focus is on usability, therefore the primary goal is not a maximum of security but an acceptable trade-off between security and resulting image quality.

Poller, Andreas; Steinebach, Martin; Liu, Huajian

2012-02-01

118

Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)  

Microsoft Academic Search

The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code re- views are time-consuming, error-prone and costly, the need for automated solutions has become evident. In this paper, we address the problem of vulnerable

Nenad Jovanovic; Christopher Kruegel; Engin Kirda

2006-01-01

119

Virtual real-time inspection of nuclear material via VRML and secure web pages  

SciTech Connect

Sandia National Laboratories` Straight Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight Line`s efforts is to create a system to securely disseminate this data on the Internet`s World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight Line secure 3-D web page. A discussion of the ``pros and cons`` of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at the following address: http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended.

Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J.

1997-04-01

120

FASH: A web application for nucleotides sequence search  

PubMed Central

FASH (Fourier Alignment Sequence Heuristics) is a web application, based on the Fast Fourier Transform, for finding remote homologs within a long nucleic acid sequence. Given a query sequence and a long text-sequence (e.g, the human genome), FASH detects subsequences within the text that are remotely-similar to the query. FASH offers an alternative approach to Blast/Fasta for querying long RNA/DNA sequences. FASH differs from these other approaches in that it does not depend on the existence of contiguous seed-sequences in its initial detection phase. The FASH web server is user friendly and very easy to operate. FASH can be accessed at (secured website)

Veksler-Lublinksy, Isana; Barash, Danny; Avisar, Chai; Troim, Einav; Chew, Paul; Kedem, Klara

2008-01-01

121

A General Evaluation Criteria for Web Applications Maintainability Models  

Microsoft Academic Search

Many World Wide Web applications incorporate important business assets and offer a convenient way for businesses to promote their services through the Internet. Many of these Web applications evolved from simple HTML pages to complex applications which are difficult to maintain. Several maintainability models have been proposed for measuring the maintainability of Web applications. It is difficult to choose between

Emad Ghosheh; Sue Black; Jihad Qaddour

2008-01-01

122

Evaluation of Web Applications According to Intelligence Parameters  

Microsoft Academic Search

Nowadays evaluation of software is important term in software engineering world. Engineers use conventional metrics to evaluate a software production which was defined in software engineering. Also defining a metric is depending on application of software. Web application is wellknown as software. Evaluation of Web application is possible by conventional metrics. As we know competition in developing of Web application

Alireza Tabatabaei Tabrizi; Mohsen Sadighi Moshkenani

2008-01-01

123

Secure coprocessing applications and research issues  

SciTech Connect

The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

Smith, S.W.

1996-08-01

124

International Affairs Portal: A Semantic Web Application  

Microsoft Academic Search

Abstract This paper describes a semantic portal on the domain of International Affairs. This application is an integration of several technologies in the field of the Semantic Web in a complex project. We describe an approach, tools and techniques that allow building a semantic portal, where access is based on the meaning of concepts and relations of the International Affairs

Jesús Contreras; V. Richard Benjamins; Mercedes Blázquez; Silvestre Losada; R. Salla; J. Sevilla; D. Navarro; Joaquín Casillas; A. Mompó; Diego Patón; Luis Rodrigo; P. Tena; I. Martos

2004-01-01

125

Security Ontology to Facilitate Web Service Description and Discovery  

Microsoft Academic Search

Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents\\u000a the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects\\u000a of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms,\\u000a and credentials in various levels of detail and specificity. The NRL Security

Anya Kim; Jim Luo; Myong H. Kang

2007-01-01

126

A web-service agent-based decision support system for securities exception management  

Microsoft Academic Search

With rising trading volumes and increasing risks in securities transactions, the securities industry is making an effort to shorten the trade lifecycle and minimize transaction risks. While attempting to achieve this, exception management is crucial to pass trade information within the trade lifecycle in a timely and accurate fashion. For a competitive solution to exception management, a web-service-agent-based decision support

Minhong Wang; Huaiqing Wang; Dongming Xu; Kwok Kit Wan; Doug Vogel

2004-01-01

127

Addressing Security Challenges in Pervasive Computing Applications.  

National Technical Information Service (NTIS)

Pervasive computing provides services that use knowledge about the operating environment. The very knowledge that enables an application to provide better services may, however, be misused, causing security and privacy breaches. Uncontrolled disclosure of...

I. Ray I. Ray

2010-01-01

128

Web Spam Challenge 2007 Track II Secure Computing Corporation Research  

Microsoft Academic Search

To discriminate spam Web hosts\\/pages from normal ones, text-based and link-based data are provided for Web Spam Challenge Track II. Given a small part of labeled nodes (about 10%) in a Web linkage graph, the challenge is to predict other nodes' class to be spam or normal. We extract features from link-based data, and then combine them with text-based features.

Yuchun Tang; Yuanchen He; Sven Krasser; Paul Judge

2007-01-01

129

Digital Orthoimage Production for Web GIS Applications  

Microsoft Academic Search

This paper presents a true ortho-image generation scheme in urban areas for web GIS application such as urban management system.\\u000a Proposed scheme includes the solution of conventional problems in normal ortho-image generation. Especially, our approach\\u000a is focused on the automation and consistency of ortho-image in complex urban areas. For this purpose, we generated additionally\\u000a plotted DSM (Digital Surface Model), which

Hong-gyoo Sohn; Hyo-keun Park; Choung-hwan Park; Joon Heo

2006-01-01

130

Use of a secure Internet Web site for collaborative medical research.  

PubMed

Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849. PMID:11025839

Marshall, W W; Haley, R W

2000-10-11

131

Implementation of secure speaker verification at web login page using Mel Frequency Cepstral Coefficient-Gaussian Mixture Model (MFCC-GMM)  

Microsoft Academic Search

The need of security for web page was increased as the development of online activity especially trading or banking. Speaker recognition can be used to secure the web page which need high security level. In this research, the speaker recognition system at web page was successfully built for login authentication security. For enrollment and verification need, speech signal from clients

B. Putra; Suyanto

2011-01-01

132

Mt-wave: profiling multi-tier web applications  

Microsoft Academic Search

Modern web applications consist of many distinct services that collaborate to provide the full application functionality. To improve application performance, developers need to be able to identify the root cause of performance problems; identifying and fixing performance problems in these distributed, heterogeneous applications can be very difficult. As web applications become more complicated, the number of systems involved will continue

Anthony J. Arkles; Dwight J. Makaroff

2011-01-01

133

Development of Content Management System-based Web Applications  

Microsoft Academic Search

Web engineering is the application of systematic and quantifiable approaches (concepts, methods, techniques, tools) to cost-effective requirements analysis, design, implementation, testing, operation, and maintenance of high quality web applications. Over the past years, Content Management Systems (CMS) have emerged as an important foundation for the web engineering process. CMS can be defined as a tool for the creation, editing and

J. Souer

2012-01-01

134

Preparedness Web: Utilizing Regional Collaborative Networks for Homeland Security Preparedness.  

National Technical Information Service (NTIS)

This case study is offered with the purpose of informing the initiation of regional collaborative efforts nationwide. This research effort examines a network of networks, called here a Preparedness Web, utilized to meet locally identified regional homelan...

C. C. Holbrook

2007-01-01

135

A DIAGRAM APPROACH TO AUTOMATIC GENERATION OF JSP\\/SERVLET WEB APPLICATIONS  

Microsoft Academic Search

We defined diagrams called Web transition diagrams to rep- resent overall behavior of Web applications. Using these diagrams, we can generate server program type Web ap- plications such as CGI-based Web applications, and server page type Web applications such as ASP-based Web appli- cations. The purpose of this paper is to design Web transi- tion diagrams to represent wider class

Kornkamol Jamroendararasame; Tetsuya Suzuki; Takehiro Tokuda

136

Using Secure Web Services to Visualize Poison Center Data for Nationwide Biosurveillance: A Case Study  

PubMed Central

Objectives Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. Methods As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Results Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. Discussion This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Conclusion Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.

Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M. Barry; Lee, Brian; Stinn, John; Worthen, Katherine

2010-01-01

137

Reliability, Compliance and Security of Web-based Pre/Post-testing  

NASA Astrophysics Data System (ADS)

Pre/post testing is an important tool for improving science education. Standard in-class administration has drawbacks such as `lost' class time and converting data into electronic format. These are not issues for unproctored web-based administration, but there are concerns about assessment validity, compliance rates, and instrument security. A preliminary investigation compared astronomy students taking pre/post tests on paper to those taking the same tests over the web. The assessments included the Epistemological Beliefs Assessment for Physical Science and a conceptual assessment developed for this study. Preliminary results on validity show no significant difference on scores or on most individual questions. Compliance rates were similar between web and paper on the pretest and much better for web on the posttest. Remote monitoring of student activity during the assessments recorded no clear indication of any copying, printing or saving of questions, and no widespread use of the web to search for answers.

Bonham, Scott

2007-01-01

138

Model-Based Penetration Test Framework for Web Applications Using TTCN-3  

NASA Astrophysics Data System (ADS)

Penetration testing is a widely used method for testing the security of web applications, but it can be inefficient if it is not done systematically. Public databases of web application vulnerabilities can be used to drive penetration testing, but testers need to understand them and interpret them into executable test cases. This requires an in-depth knowledge of security. This paper proposes a model-based testing approach using a data model that describes the relationship between web security knowledge, business domain knowledge, and test case development. The approach consists of a data model that represents the relevance between attack surface, application fingerprint, attack vectors, and fuzz vectors; a test case generator that automatically generates penetration test scenarios for web applications; and a penetration test framework supported by TTCN-3 test environment. The model-based testing approach can be used to provide structured tool support for developing penetration test campaigns. We demonstrate the feasibility and efficiency of the approach at the design level.

Xiong, Pulei; Stepien, Bernard; Peyton, Liam

139

Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application  

ERIC Educational Resources Information Center

|Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

2012-01-01

140

COMPARABILITY: THE KEY TO THE APPLICABILITY OF FOOD WEB RESEARCH  

Microsoft Academic Search

However food webs have always been considered as a central issue of ecology, their value and usefulness are frequently questioned. In this paper, I overview some causes of this skepticism and discuss in which cases two or more food webs can be compared. I suggest that the comparability of different food webs is a key to possible applications. I show

F. JORDÁN

2003-01-01

141

The Lixto Systems Applications in Business Intelligence and Semantic Web  

Microsoft Academic Search

This paper shows how technologies for Web data extraction, syndication and integration allow for new applications and services in the Business Intelligence and the Semantic Web domain. First, we demonstrate how knowledge about market developments and competitor activities on the market can be extracted dynamically and automatically from semi-structured information sources on the Web. Then, we show how the data

Robert Baumgartner; Oliver Frölich; Georg Gottlob

2007-01-01

142

Application of Semantic Web in e-Business and Telecommunication  

Microsoft Academic Search

Semantic web has emerged as a web of next generation providing has various opportunities to enhance the over all performance of current web. The objective of this paper is to review the literature and to provide a critical evaluation of semantic application in the domains of e-business and telecommunications. Literature review reveals that a simple solution to the current e-business

Aakif Nazeer Khan; M. Hussain

2009-01-01

143

Application Research of WebGIS in Resources Environment Management  

Microsoft Academic Search

Under the foundation of setting forth the connotation of spatial information and the characteristic of the development of spatial information technology and WebGIS, the paper studies the main domain of WebGIS applied in the resources environment management and proposes that the application of WebGIS should be strengthened in the resources environment management.

Zhang Yi; Yijing Wu; Jieli Wen; Wu Han

2009-01-01

144

Web Services Provide Access to SCEC Scientific Research Application Software  

Microsoft Academic Search

Web services offer scientific communities a new paradigm for sharing research codes and communicating results. While there are formal technical definitions of what constitutes a web service, for a user community such as the Southern California Earthquake Center (SCEC), we may conceptually consider a web service to be functionality provided on-demand by an application which is run on a remote

N. Gupta; V. Gupta; D. Okaya; L. Kamb; P. Maechling

2003-01-01

145

WebGD: A Framework for Web-Based GIS\\/Database Applications  

Microsoft Academic Search

We have developed a framework for Web-based GIS\\/database applications which allow users to insert, update, delete, and query data with a map interface displayed by Web browsers. The framework was designed so that a Web-based GIS application that uses ArcIMS as a map server can be easily created, customized, and maintained. In order to achieve this goal, we have created

Paphun Wangmutitakul

2004-01-01

146

ANALYSIS OF MOST COMMON PROBLEMS WITH WEB 2.0 BASED APPLICATIONS REGARDING WEB ACCESSIBILITY  

Microsoft Academic Search

On the one side accessible Web sites are becoming increasingly important in general and are a statutory provision in the context of eGovernment. On the other side the trend of creating Web 2.0 based applications is growing exponentially due to the richness of graphical user interfaces, effects, high interactivity and collective intelligence potentials that Web 2.0 based applications can provide.

WALTER KERN

147

Evaluating AVDL descriptions for web application vulnerability analysis  

Microsoft Academic Search

Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified data model for technology-independent vulnerability analysis of Web applications. This

Ha-thanh Le; Peter Kok Keong Loh

2008-01-01

148

Radiation Detection for Homeland Security Applications  

Microsoft Academic Search

In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist

James Ely

2008-01-01

149

Distributed sensing in homeland security applications  

Microsoft Academic Search

The paper deals with the implementation of a suitable technological support to improve the success likelihood of Urban Search and Rescue (USAR) missions. In particular, the adoption of an heterogeneous sensors network for situation awareness and security applications is suggested. The sensor network consists of two types of sensor, mandated, respectively, to through-the-wall radar (TTW) imaging and a vital sign

M. Ascione; A. Buonanno; M. D'Urso; L. Angrisani; R. Schiano Lo Moriello

2011-01-01

150

Video motion detection for physical security applications  

Microsoft Academic Search

Physical security specialists have been attracted to the concept of video motion detection for several years. Claimed potential advantages included additional benefit from existing video surveillance systems, automatic detection, improved performance compared to human observers, and cost-effectiveness. In recent years, significant advances in image-processing dedicated hardware and image analysis algorithms and software have accelerated the successful application of video motion

1990-01-01

151

Video motion detection for physical security applications  

Microsoft Academic Search

Physical security specialists have been attracted to the concept of video motion detection for several years. Claimed potential advantages included additional benefit from existing video surveillance systems, automatic detection, improved performance compared to human observers, and cost effectiveness. In recent years significant advances in image processing dedicated hardware and image analysis algorithms and software have accelerated the successful application of

1990-01-01

152

Towards an agent based framework for the design of secure web services  

Microsoft Academic Search

Web services (WS) are commonly provided by software components accessed through remote procedure calls. One of the major problems encountered during the access process to any WS is their security in terms of, for instance, execution and exchanged data. Several solutions and proposals have been made to solve this problem mainly by OASIS. Despite their contributions, current solutions and proposals

Maher Khemakhem; Hanêne Ben-abdallah; Abdelfattah Belghith

2008-01-01

153

On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework  

Microsoft Academic Search

Discovering and evaluating interesting patterns and semantic associations in vast amount of information provided by many different sources is an important and time-consuming work for homeland security analysts. By publishing or convert- ing such information in semantic web language, intelligent agents can automate the inference without compromising the semantics. This paper describes how trust and provenance can be represented\\/obtained in

Li Ding; Pranam Kolari; Tim Finin; Anupam Joshi; Yun Peng; Yelena Yesha

154

Issues in Securing Web-Accessible Information Systems  

Microsoft Academic Search

Within Higher Education, concerns are growing with regard the gap between what university central services traditionally provide and what the academic departments within the institution need. The Institutionally Secure Integrated Data Environment (INSIDE) project is a JCIEL (JISC Committee for Integrated Environments for Learners) funded collaborative project between the Universities of St Andrew and Durham that proposes to address the

Janet Lavery; Cornelia Boldyreff

2001-01-01

155

Agents of responsibility - freelance web developers in web applications development  

Microsoft Academic Search

Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibilities associated with computing practitioners apply to freelance web developers. The relevant moral question is not \\

Malik Aleem Ahmed; Jeroen van den Hoven

2010-01-01

156

Securing Applications in Personal Computers: The Relay Race Approach.  

National Technical Information Service (NTIS)

This thesis reviews the increasing need for security in a personal computer (PC) environment and proposes a new approach for securing PC applications at the application layer. The Relay Race Approach extends two standard approaches: data encryption and pa...

J. M. Wright

1991-01-01

157

Communicating Health Risks under Pressure: Homeland Security Applications  

Microsoft Academic Search

The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk

K. G. Garrahan; S. L. Collie

2006-01-01

158

The Semantic Data Model for Security: Representing the Security Semantics of an Application  

Microsoft Academic Search

Data security requirements go beyond traditional access control considerations to include relationships among data that must be protected. The author extends the data-modeling concepts to include the secrecy properties of data. The semantic data model for security (SDMS) is proposed as the vehicle for users, database designers and security officers to analyze and understand the security requirements of the application

Gary W. Smith

1990-01-01

159

An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications  

Microsoft Academic Search

Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases mus t accurately reflect usage to expose faults that users are most likely to encounter. User-session-based testing is an auto - mated approach to enhancing an initial test suite with real user data, enabling additional testing during

Sara Sprenkle; Sreedevi Sampath; Emily Gibson; Lori L. Pollock; Amie L. Souter

2005-01-01

160

Comprehending Web Applications by a Clustering Based Approach  

Microsoft Academic Search

The number and complexity of Web applications are increasing dramatically to satisfy market needs, and the need of effective approaches for comprehending them is growing accordingly. Recently, reverse engineering methods and tools have been proposed to support the comprehension of a Web application; the information recovered by these tools is usually rendered in graphical representations. However, the graphical representations become

Giuseppe A. Di Lucca; Anna Rita Fasolino; F. Pace; Porfirio Tramontana; Ugo De Carlini

2002-01-01

161

Web Applications ? Spaghetti Code for the 21st Century  

Microsoft Academic Search

The software industry is currently in the middle of a paradigm shift. Applications are increas- ingly written for the World Wide Web rather than for any specific type of an operating system, computer or device. Unfortunately, the technologies used for web application development today violate well-known software engineering principles. Furthermore,they have reintroduced problems that had already been eliminated years ago

Tommi Mikkonen; Antero Taivalsaari

2008-01-01

162

A mobile application framework for the geospatial web  

Microsoft Academic Search

In this paper we present an application framework that leverages geospatial content on the World Wide Web by enabling innovative modes of interaction and novel types of user interfaces on advanced mobile phones and PDAs. We discuss the current development steps involved in building mobile geospatial Web applications and derive three technological pre-requisites for our framework: spatial query operations based

Rainer Simon; Peter Fröhlich

2007-01-01

163

Semantic Web Application for the Air Tasking Order.  

National Technical Information Service (NTIS)

The purpose of this in-house exploratory development was to investigate using Semantic Web technologies for Command and Control (C2) applications. This paper describes a Semantic Web application we developed for the Air Tasking Order (ATO), the document u...

A. Frantz M. Franco

2005-01-01

164

Application of WebGIS in seismological study  

Microsoft Academic Search

The paper first introduces the concepts, method and recent development of WebGIS technology, then discusses the functionality\\u000a and application prospect of WebGIS in the field of seismological study, finally the paper gives a presentation on application\\u000a of WebGIS to seismological study and constructs a WebGIS information system for seismological study by using GIS component\\u000a MO\\/MOIMS. The system based on Browser\\/Server

Chun-Yan Qu; Hong Ye; Zhi Liu

2002-01-01

165

Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.  

PubMed

We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented. PMID:11156740

Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G

2000-11-01

166

Promoting the development of secure mobile agent applications  

Microsoft Academic Search

In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile agent security have unblocked this technology, but there is still one important issue to overcome: the complexity of programming applications using these security solutions. Our proposal aims to facilitate and speed up the process

Carles Garrigues; Sergi Robles; Joan Borrell; Guillermo Navarro-Arribas

2010-01-01

167

Integrating Web Services and Intelligent Agents in Supply Chain for Securing Sensitive Messages  

Microsoft Academic Search

Security is a global issue for today’s businesses that operate at the crossroads on multiple e-supply chains. Organizations\\u000a increasingly use agent technologies and web services that allow assembling unique business processes. Businesses share information\\u000a and manage electronic transactions with trading partners throughout the e-supply chains. The key factor in business success\\u000a is decisions made on the basis of correct information

Esmiralda Moradian

2008-01-01

168

WISE-CAPS: Web-Based Interactive Secure Environment for Collaborative Analysis of Planetary Science  

Microsoft Academic Search

\\u000a We are now developing Web-GIS based collaboration environment for lunar and planetary science. This system, called WISE-CAPS\\u000a aims for promotion of researchers’ collaboration and data sharing through the network. In WISE-CAPS, all data are stored in\\u000a server and data access to server is controlled with security modules of the server and control files. This system combines\\u000a easy-to-use user environment and

Junya Terazono; Ryosuke Nakamura; Shinsuke Kodama; Naotaka Yamamoto; Hirohide Demura; Naru Hirata; Yoshiko Ogawa; Jun’ichi Haruyama; Makiko Ohtake; Tsuneo Matsunaga

2010-01-01

169

An Incremental Approach for Building Accessible and Usable Web Applications  

Microsoft Academic Search

\\u000a Building accessible Web applications is difficult, moreover considering the fact that they are constantly evolving. To make\\u000a matters more critical, an application which conforms to the well-known W3C accessibility standards is not necessarily usable\\u000a for handicapped persons. In fact, the user experience, when accessing a complex Web application, using for example screen\\u000a readers, tends to be far from friendly. In

Nuria Medina-Medina; Juan Burella; Gustavo Rossi; Julián Grigera; Esteban Robles Luna

2010-01-01

170

Ajax and Firefox: New Web Applications and Browsers  

ERIC Educational Resources Information Center

|Alternative browsers are gaining significant market share, and both Apple and Microsoft are releasing OS upgrades which portend some interesting changes in Web development. Of particular interest for language learning professionals may be new developments in the area of Web browser based applications, particularly using an approach dubbed "Ajax."…

Godwin-Jones, Bob

2005-01-01

171

Case Study : Geospatial Processing Services for Web based Hydrological Applications  

Microsoft Academic Search

River discharge is an important issue to be monitored because of its significant influence on environmental systems, on human lives for water resource exploitation, and hazards related to floods and landslides. In this context, we have designed and developed a web-based Geoportal for hydrological applications that integrates geospatial processing services and web mapping viewers to provide an interactive and user-friendly

Laura Díaz; Carlos Granell; Michael Gould

2008-01-01

172

Process-aware continuation management in web applications  

Microsoft Academic Search

Web applications are subject to an interaction challenge not found in other user interfaces: In addition to the widgets that web pages are built of, browsers provide further navigation features such as the Back and Forward buttons that are beyond the developer's control. Continuations have been suggested as a means to cope with the arbitrary navigation patterns that users may

Volker Gruhn; Marco Buss

2012-01-01

173

MMWA: A Software Sizing Model for Web Applications  

Microsoft Academic Search

Estimating time and costs is a crucial factor in application development projects and low error margins are a priority. In line with the very fast evolution of Internet technologies, all applications are quickly becoming Web applications, which are growing without a consolidated project methodology. Thus there is a clear need for an estimation model for these applications' development projects. The

Leonardo Mangia; Roberto Paiano

2003-01-01

174

Modeling Web-Based Applications Quality: A Probabilistic Approach  

Microsoft Academic Search

Quality assurance of Web-based applications is considered as a main concern. Many factors can affect their quality. Modeling\\u000a and measuring these factors are by nature uncertain and subjective tasks. In addition, representing relationships between\\u000a these factors is a complex task. In this paper, we propose an approach for modeling and supporting the assessment of Web-based\\u000a applications quality. Our proposal is

Ghazwa Malak; Houari A. Sahraoui; Linda Badri; Mourad Badri

2006-01-01

175

Model-Based Testing of Web Applications Using NModel  

NASA Astrophysics Data System (ADS)

We show how model-based on-the-fly testing can be applied in the context of web applications using the NModel toolkit. The concrete case study is a commercial web-based positioning system called WorkForce Management (WFM) which interacts with a number of other services, such as billing and positioning, through a mobile operator. We describe the application and the testing, and discuss the test results.

Ernits, Juhan; Roo, Rivo; Jacky, Jonathan; Veanes, Margus

176

COEUS: "semantic web in a box" for biomedical applications  

PubMed Central

Background As the “omics” revolution unfolds, the growth in data quantity and diversity is bringing about the need for pioneering bioinformatics software, capable of significantly improving the research workflow. To cope with these computer science demands, biomedical software engineers are adopting emerging semantic web technologies that better suit the life sciences domain. The latter’s complex relationships are easily mapped into semantic web graphs, enabling a superior understanding of collected knowledge. Despite increased awareness of semantic web technologies in bioinformatics, their use is still limited. Results COEUS is a new semantic web framework, aiming at a streamlined application development cycle and following a “semantic web in a box” approach. The framework provides a single package including advanced data integration and triplification tools, base ontologies, a web-oriented engine and a flexible exploration API. Resources can be integrated from heterogeneous sources, including CSV and XML files or SQL and SPARQL query results, and mapped directly to one or more ontologies. Advanced interoperability features include REST services, a SPARQL endpoint and LinkedData publication. These enable the creation of multiple applications for web, desktop or mobile environments, and empower a new knowledge federation layer. Conclusions The platform, targeted at biomedical application developers, provides a complete skeleton ready for rapid application deployment, enhancing the creation of new semantic information systems. COEUS is available as open source at http://bioinformatics.ua.pt/coeus/.

2012-01-01

177

Passive terahertz imaging for security application  

NASA Astrophysics Data System (ADS)

The passive detection is safe for passengers and operators as no radiation. Therefore, passive terahertz (THz) imaging can be applied to human body security check. Imaging in the THz band offers the unique property of being able to identify object through a range of materials. Therefore passive THz imaging is meaningful for security applications. This attribute has always been of interest to both the civil and military marks with applications. We took advantage of a single THz detector and a trihedral scanning mirror to propose another passive THz beam scanning imaging method. This method overcame the deficiencies of the serious decline in image quality due to the movement of the focused mirror. We exploited a THz scanning mirror with a trihedral scanning mirror and an ellipsoidal mirror to streamline the structure of the system and increase the scanning speed. Then the passive THz beam scanning imaging system was developed based on this method. The parameters were set as follows: the best imaging distance was 1.7m, the image height was 2m, the image width was 1m, the minimum imaging time of per frame was 8s, and the minimum resolution was 4cm. We imaged humans with different objects hidden under their clothes, such as fruit knife, belt buckle, mobile phone, screwdriver, bus cards, keys and other items. All the tested stuffs could be detected and recognized from the image.

Guo, Lan-tao; Deng, Chao; Zhao, Yuan-meng; Zhang, Cun-lin

2013-08-01

178

Video performance for high security applications.  

SciTech Connect

The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

Connell, Jack C.; Norman, Bradley C.

2010-06-01

179

Mobile Applications for Public Sector: Balancing Usability and Security  

Microsoft Academic Search

Development of mobile software applications for use in specific domains such as Public Security must conform to stringent security requirements. While mobile devices have many known limitations, assuring complex fine-grained security policies poses an additional challenge to quality mobile services and raises usability concerns. We address these challenges by means of a novel approach to authentication and gradual multi-factor authorization

Yuri NATCHETOI; Viktor KAUFMAN; Konstantin BEZNOSOV

2008-01-01

180

Security Vulnerabilities and Mitigation Strategies for Application Development  

Microsoft Academic Search

Anticipating and mitigating security threats is critical during software development. This work investigates security vulnerabilities and mitigation strategies to help software developers build secure applications. The work examines common vulnerabilities, and relevant mitigation strategies, from several perspectives, including the input environment used to supply the software with needed data, the internal data and structures used to store and retrieve the

Brunil Dalila Romero Marino; Hisham M. Haddad; M. Romero

2009-01-01

181

Safe Areas of Computation for Secure Computing with Insecure Applications  

Microsoft Academic Search

Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the security community and have appeared in the popular press. This paper presents an approach to increase the level of security provided to users when interacting with otherwise unsafe applications and computing

André L. M. Dos Santos; Richard A. Kemmerer

1999-01-01

182

A Flexible Integration Framework for Semantic Web 2.0 Applications  

Microsoft Academic Search

The Semantic Web application framework extends Ruby on Rails to enable rapid development of integrated Semantic Web mash-ups. Web applications are mostly database driven. Developers design a database schema and then construct the application logic (which generates Web pages for user interaction) on top of the schema. These applications are centralized and rely on their own relational database, limiting the

Eyal Oren; Armin Haller; Cédric Mesnage; Manfred Hauswirth; Benjamin Heitmann; Stefan Decker

2007-01-01

183

From desktop to web [power engineering software application  

Microsoft Academic Search

This paper presents an overview of the conversion process for a specialized software application from a desk top environment to a web based environment. The technology based business software is used in planning applications for new electric power generation and storage facilities. The software, called TAG-Supply®, is an integrated application of database, text (pdf) and an analytical engine. The desktop

G. Ramachandran; R. Nandwani; T. Boyd

2002-01-01

184

Importance of residency program web sites to emergency medicine applicants.  

PubMed

Emergency Medicine (EM) residency program web sites are an important tool that programs use to attract applicants. However, there are only a few studies examining the aspects of a program's web site that are most important to EM applicants. We conducted a cross-sectional study of 142 prospective residency applicants interviewing for an EM position at one of three EM residency programs for the 2003 match. The survey demonstrated that almost all applicants researched EM programs online. The majority (71%) identified geographic location as the most important factor in applying to a specific program. Approximately 40% considered an easily navigated web site as very/moderately important to their application decision-making process. Rotation schedule was also important in applicant decision-making. The Internet is a significant source of information to the majority of applicants in EM. Online information from programs' web sites, although not as significant as geography, influences an applicant's choice of where to apply for a residency position. An easily navigated, complete web site may improve the recruitment of candidates to EM residency programs. PMID:18439790

Mahler, Simon A; Wagner, Mary-Jo; Church, Amy; Sokolosky, Mitchell; Cline, David M

2008-04-24

185

Application of laser technology to introduce security features on security documents in order to reduce counterfeiting  

NASA Astrophysics Data System (ADS)

The use of laser technology for application of security features into security documents is introduced and specifically the security features which are applied directly into the security documents itself are covered. This innovative way of working creates effective deterrents to counterfeit and forgery. Laser applied security features become an integral part of the documents and its characteristics are unique and well-distinguishable. Together with the high levels of fineness and accuracy which can be achieved, this makes laser applied security features virtually impossible to reproduce with other means. Furthermore lasers can create first line security features which the public can easily verify with the naked eye. An introduction into laser technology gives better insight into the use of lasers in security documents. The laser offers high flexibility as the security features are created one by one under control of computer programs. As result a laser system can produce unique and personalised security features which can be applied automatically during one of the last production stages of the document. Laser applied security features are at this moment used on banknotes, passports and cheques. Examples of such applications will be shown. Also new types of laser applied security features will be introduced.

Hospel, W. G.

1998-04-01

186

Experiences with GRIA - Industrial Applications on a Web Services Grid  

Microsoft Academic Search

The GRIA project set out to make the Grid usable by industry. The GRIA middleware is based on Web Services, and designed to meet the needs of industry for security and business-to-business (B2B) service procurement and operation. It provides well-defined B2B models for accounting and QoS agreement, and proxy-free delegation to support account management and service federation. The GRIA v3

Mike Surridge; Steve Taylor; David De Roure; Ed Zaluska

2005-01-01

187

Radiation Detection for Homeland Security Applications  

NASA Astrophysics Data System (ADS)

In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

Ely, James

2008-05-01

188

A Voice Web Application Based on Dynamic Navigation of VXML  

NASA Astrophysics Data System (ADS)

Voice Web, as the name suggests, accesses web resources via voice. VoiceXML is the markup language used to develop speech applications. VoiceXML is interactive and allows voice input to be received and processed by voice browser. Unfortunately, the navigation of VoiceXML document is completely controlled by application developer. Also, the user does not have flexibility to utter random word from currently executing dialog. The aim of the paper is to address the weakness of VoiceXML and develop an application, which dynamically detects recognition candidates in user content, in contrast with recognition candidates of the existing voice web, which depend on the application developer. In this application, a news service is implemented along with dictionary of IT-specific terms and dictionary of words from currently executing news.

Bhingarkar, Sukhada P.

2010-11-01

189

Students as Designers of Semantic Web Applications  

ERIC Educational Resources Information Center

|This paper draws upon the experience of an interdisciplinary research group in engaging undergraduate university students in the design and development of semantic web technologies. A flexible approach to participatory design challenged conventional distinctions between "designer" and "user" and allowed students to play a role in developing…

Tracy, Fran; Jordan, Katy

2012-01-01

190

Students as Designers of Semantic Web Applications  

ERIC Educational Resources Information Center

This paper draws upon the experience of an interdisciplinary research group in engaging undergraduate university students in the design and development of semantic web technologies. A flexible approach to participatory design challenged conventional distinctions between "designer" and "user" and allowed students to play a role in developing…

Tracy, Fran; Jordan, Katy

2012-01-01

191

Application of Semantic Web to Incident Reporting  

Microsoft Academic Search

While lots of incident reports are accumulated, analyzing them is not kept up with at present. For this reason, a database of incident reports is not utilized sufficiently and reports are only accumulated. Under this situation, efficient way of handling such information is needed. For enabling computer processing of incident reports, a semantic Web approach is applied to incident reporting.

Y. Asada; T. Kanno; K. Furuta

2006-01-01

192

XML: A Door to Automated Web Applications  

Microsoft Academic Search

In Japanese culture, your meishi conveys your place in the company, even in society, as well as your name, phone number, and e-mail address. That is to say, in Japan, business cards matter. They convey complex metadata about the people who carry them. Like people, Web pages come in an abundance of shapes and sizes (and sounds). What makes them

Rohit Khare; Adam Rifkin

1997-01-01

193

Using AOP to separate SOA security concerns from application implementation  

Microsoft Academic Search

Aspect-oriented programming (AOP) is a programming paradigm that increases modularity by enabling improved separation of concerns. Implementing modern Service-Oriented Architecture (SOA) systems requires expertise from people in a variety of roles, including application developers and security experts. Ideally, the application developers should be fully isolated from, and independent of, security implementation. The virtues of AOP offer a practical programming framework

Eric Sonchaiwanich; Jay Zhao; Christopher Dowin; Malcolm McRoberts

2010-01-01

194

Function Clone Detection in Web Applications: A Semiautomated Approach  

Microsoft Academic Search

Analogously to traditional applications, code duplication occurs frequently during the development and evolution of web applications. This ad-hoc but pathological form of reuse consists in copying, and eventually modifying, a block of existing code that implements a piece of required functionality. Duplicated blocks are named clones and the act of copying, including slight modifications, is called cloning. When entire functions

Fabio Calefato; Filippo Lanubile; Teresa Mallardo

2004-01-01

195

Transparent Interface Composition in Web Applications  

Microsoft Academic Search

In this paper we present an approach for oblivious composi- tion of Web user interfaces, particularly for volatile functionality. Our approach, which is inspired on well-known techniques for advanced separation of concerns such as aspect-oriented software design, allows to clearly separate the design of the core's interface from the one corre- sponding to more volatile services, i.e. those that are

Jeronimo Ginzburg; Gustavo Rossi; Matias Urbieta; Damiano Distante

2007-01-01

196

Building Environmental Semantic Web Applications with Drupal  

Microsoft Academic Search

\\u000a Efforts required for publishing information as Linked Data often appears too high compared to obvious and immediate benefits.\\u000a Consequently, only a tiny fraction of the web can be easily used as a semantic ”database” today. Drupal 7 changes the rules\\u000a of the game by integrating the functionality required for structuring and semantically annotating arbitrary content types\\u000a in the Drupal “core”,

Denis Havlik

197

On enabling secure applications through off-line biometric identification  

SciTech Connect

In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

1998-04-01

198

Research on OPC UA security  

Microsoft Academic Search

OPC Unified architectures (OPC UA) is a new software interface specification and application framework based on web service for plant automation systems which communicate with each other over the internet. The security issue holds the key to its development for technology feature based on web service. In this paper, the OPC UA security issues are discussed from the two views

Huang Renjie; Liu Feng; Pan Dongbo

2010-01-01

199

Communicating Health Risks under Pressure: Homeland Security Applications  

SciTech Connect

The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to customization to include radioactive waste management or responses to catastrophic releases of radioactive material due to terrorist actions. (authors)

Garrahan, K.G. [EPA National Homeland Security Research Center, 1200 Pennsylvania Ave NW, Washington, DC 20460 (United States); Collie, S.L. [Tetra Tech, 350 N. St. Paul, Suite 2600, Dallas TX 75201 (United States)

2006-07-01

200

Web Services Provide Access to SCEC Scientific Research Application Software  

NASA Astrophysics Data System (ADS)

Web services offer scientific communities a new paradigm for sharing research codes and communicating results. While there are formal technical definitions of what constitutes a web service, for a user community such as the Southern California Earthquake Center (SCEC), we may conceptually consider a web service to be functionality provided on-demand by an application which is run on a remote computer located elsewhere on the Internet. The value of a web service is that it can (1) run a scientific code without the user needing to install and learn the intricacies of running the code; (2) provide the technical framework which allows a user's computer to talk to the remote computer which performs the service; (3) provide the computational resources to run the code; and (4) bundle several analysis steps and provide the end results in digital or (post-processed) graphical form. Within an NSF-sponsored ITR project coordinated by SCEC, we are constructing web services using architectural protocols and programming languages (e.g., Java). However, because the SCEC community has a rich pool of scientific research software (written in traditional languages such as C and FORTRAN), we also emphasize making existing scientific codes available by constructing web service frameworks which wrap around and directly run these codes. In doing so we attempt to broaden community usage of these codes. Web service wrapping of a scientific code can be done using a "web servlet" construction or by using a SOAP/WSDL-based framework. This latter approach is widely adopted in IT circles although it is subject to rapid evolution. Our wrapping framework attempts to "honor" the original codes with as little modification as is possible. For versatility we identify three methods of user access: (A) a web-based GUI (written in HTML and/or Java applets); (B) a Linux/OSX/UNIX command line "initiator" utility (shell-scriptable); and (C) direct access from within any Java application (and with the correct API interface from within C++ and/or C/Fortran). This poster presentation will provide descriptions of the following selected web services and their origin as scientific application codes: 3D community velocity models for Southern California, geocoordinate conversions (latitude/longitude to UTM), execution of GMT graphical scripts, data format conversions (Gocad to Matlab format), and implementation of Seismic Hazard Analysis application programs that calculate hazard curve and hazard map data sets.

Gupta, N.; Gupta, V.; Okaya, D.; Kamb, L.; Maechling, P.

2003-12-01

201

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2010 CFR

...Applications and other forms used in Social Security Administration programs...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications...Applications and other forms used in Social Security Administration...

2009-04-01

202

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2010 CFR

...Applications and other forms used in Social Security Administration programs...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications...Applications and other forms used in Social Security Administration...

2010-04-01

203

Recent applications of thermal imagers for security assessment  

SciTech Connect

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01

204

Web-based radiology applications for clinicians and radiologists  

NASA Astrophysics Data System (ADS)

The University of Pennsylvania Radiology Department has developed a suite of Web based applications for clinicians and radiologists to provide wide spread, cost-effective and easy access to radiological information. The Image Viewer application provides clinicians and radiologists access to all diagnostic reports and digital images performed in the last week for all Emergency Dept., Intensive Care Unit and Neuro/CT studies. Image control options including zoom/pan, rotate, flip, and window/level are all available. The image mover/viewer application gives radiologists and technologists the ability to both move studies between any DICOM Storage Class Provider (SCP) and DICOM storage class user (SCU) and to view studies from any DICOM displayed. Web server support requires integration using Perl based CGI scripts with our DICOM/PACS and the MIR/CTN for images and our IDXrad/RIS for reports. Targeted images and reports are automatically routed from the PACS and RIS for storage on the web server. All images sent to the web server are modality specific per-processed to reduce size and improve contrast. After processing, all images are stored in DICOM and GIF formats. Client support requires web browsers with JavaScript and frame support.

Feingold, Eric R.; Grevera, George J.; Mezrich, Reuben S.; Horii, Steven C.; Khalsa, Satjeet S.; Phan, Le

1997-05-01

205

Optical Imaging Sensors and Systems for Homeland Security Applications  

NASA Astrophysics Data System (ADS)

Optical and photonic systems and devices have significant potential for homeland security. "Optical Imaging Sensors and Systems for Homeland Security Applications" presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references.

Javidi, Bahram

206

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

SciTech Connect

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01

207

Social Security Disability Applicant Statistics, 1968.  

ERIC Educational Resources Information Center

About one of every 10 dollars in social security benefits under the old-age, survivors, and disability insurance program (OASDI) goes to disabled workers or their families. By the end of 1969, nearly 2,500,000 workers and dependents and 40,000 widows and widowers were receiving some form of social security disability compensation, while another…

Lerner, Philip R., Comp.

208

Framework for Supporting Web-Based Collaborative Applications  

NASA Astrophysics Data System (ADS)

The article proposes an intelligent framework for supporting Web-based applications. The framework focuses on innovative use of existing resources and technologies in the form of services and takes the leverage of theoretical foundation of services science and the research from services computing. The main focus of the framework is to deliver benefits to users with various roles such as service requesters, service providers, and business owners to maximize their productivity when engaging with each other via the Web. The article opens up with research motivations and questions, analyses the existing state of research in the field, and describes the approach in implementing the proposed framework. Finally, an e-health application is discussed to evaluate the effectiveness of the framework where participants such as general practitioners (GPs), patients, and health-care workers collaborate via the Web.

Dai, Wei

209

Neutron detection alternatives to 3He for national security applications  

Microsoft Academic Search

One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to

Richard T. Kouzes; James H. Ely; Luke E. Erikson; Warnick J. Kernan; Azaree T. Lintereur; Edward R. Siciliano; Daniel L. Stephens; David C. Stromswold; Renee M. Van Ginhoven; Mitchell L. Woodring

2010-01-01

210

Process detection in homeland security and defense applications  

Microsoft Academic Search

Process detection is a fundamental problem arising in a variety of homeland security, national defense and commercial applications, including network security, sensor network data fusion, dynamic social network analysis and video tracking of kinematic objects. Our approach to process detection is based on a generic algorithmic approach called Process Query Systems which has been developed at Dartmouth over the past

George Cybenko; Vincent Berk

2006-01-01

211

Reconstructing Software Architecture for J2EE Web Applications  

Microsoft Academic Search

In this paper we describe our approach to reconstructing the software architecture of J2EE web applications. We use the Siemens Four Views approach, separating the architecture into conceptual, module, execution, and code views. We paid particular attention to the dependencies in the implementation, which led to two results. One is the distinction between a traditional usage dependency and a more

Minmin Han; Christine Hofmeister; Robert L. Nord

2003-01-01

212

An embedded web controllable heater interface for industry application  

Microsoft Academic Search

In the present IT age, we are in need of fully automated industrial system. An embedded web based interface used for an industry application is designed in this paper. Here two parameters are being measured. One is sensed voltage of each line in the form of analog and then converts it into Digital signal and the second one is to

Basanta Mahato; Sachin Sharma; Gaurav Chitranshi

2010-01-01

213

Domain-specific web services for scientific application developers  

Microsoft Academic Search

Many scientists today routinely conduct simulations and run models using high performance computing (HPC) resources provided by national, regional and campus grid infrastructures, either directly logging into such resources or indirectly via web portals and other application client software, i.e. science gateways. Science gateways have proven to be an effective way of bringing HPC resources to a much larger user

Han Zhang; Jungha Woo; Lan Zhao; David Braun; Carol X. Song; Madhavan Lakshminarayanan

2010-01-01

214

Extending the Performance Models of Web Applications with Queueing Algorithm  

Microsoft Academic Search

Distributed systems and web applications play an important role in computer science nowadays. The most common consideration is performance, because these systems have to provide cost-effective and high-availability services in the long term, thus, they have to be scaled to meet the expected load. Performance measurements can be the base for performance modeling and prediction. With the help of performance

Ágnes Bogárdi-Mészöly; Tihamér Levendovszky; Hassan Charaf

215

Model and Application of Web-Based Intelligent Tutoring System  

Microsoft Academic Search

Intelligent Tutoring System (ITS) is one of the important fields of the current computer application. In this paper a Web-based intelligent tutoring system model is designed, the system function structure, the construction of the student model and teaching model, and the reasoning process of the inference engine, finally the system is implemented. The aim of this paper is to provide

Gang-Yong Lin; Sheng-Hui Dai; Zhao-You Zhu

2008-01-01

216

Advanced Web Programming for Scientific and Educational Applications  

Microsoft Academic Search

The Center for Advanced Educational Technology at the University of Tennessee is involved extensively in the development of state-of-the-art technology for scientific web sites, accessible and portable scientific visualization, and networked databases for scientific educational applications. These are being developed using primarily Flash Actionscript, Java, and cascading style sheets on the client side, PHP and Java middleware, and SQL databases.

Brett Petrusek; Reuben Budiardja; Mike Guidry

2004-01-01

217

Specifying Quality Requirements for the Web 2.0 Applications  

Microsoft Academic Search

To specify quality requirements for Web 2.0 applications we propose an integrated approach which considers features for contents, functionalities and services. In this work we discuss how to model internal quality, external quality and quality in use views taking into account not only the software characteristics - as those specified in the ISO 9126-1 quality models- but also the own

Luis Olsina; Roberto Sassano; Luisa Mich

2008-01-01

218

Observations on the Implementation and Testing of Scripted Web Applications  

Microsoft Academic Search

Scripting languages have become a very popular choice for implementing server-side programs in Web applications. Scripting languages are thought to provide quick start up and enhance programmer productivity. We present two case studies in which scripting languages were used. In both studies, the projects struggled with implementation; however, project factors such as the strength of management and the training of

Siddhartha Bedi; Patrick J. Schroeder

2004-01-01

219

Web Based Application for Distributed Remote Measurement Viewing  

Microsoft Academic Search

The paper discusses web based application for distributed automation. Realization is made over three-layer distributed model. XML table driven communication model is used for heterogeneous connection of different parts of the system. Functionality of the model is delegated and distributed among servers and embedded systems. Majority features of realization, concerning scalability, flexibility, distribution, collecting and delegating of functionality, reliability and

Ivan Stankov; Grisha Spasov

220

An intelligent Aspect-Oriented framework for web application  

Microsoft Academic Search

Aspect-Oriented Programming (AOP) has been proposed as a technique for improving separation of concerns in software and becomes a popular research topic. The AOP language bindings with implementation framework are generally available which allow you to directly use AOP with several programming languages such as Ruby, Squeak, Smalltalk, C, C++, Java and so on. However, some of popular web application

Yuan-Chih Yu; Shing-chern D. You; Dwen-Ren Tsai

2010-01-01

221

Suggestions for Social Security Disability Applicants  

MedlinePLUS

... and specialty. How much will an attorney cost? Fee Agreement Before the attorney can charge you for ... and your attorney must sign and file a fee agreement with the Social Security Administration. Your attorney ...

222

Securing PC applications: the relay race approach  

Microsoft Academic Search

The widespread use of personal computers and the growth of end-user computing have introduced a myriad of security concerns. As PC-based information systems become readily available and more individuals become computer literate, the risk of ill-intentioned individuals obtaining unauthorized access to computing resources and violating the secrecy and integrity of data increases significantly. But many of these computer security concerns

Moshe Zviran

2002-01-01

223

A microwave imaging spectrometer for security applications  

NASA Astrophysics Data System (ADS)

In recent years the security of people and critical infrastructures is of increasing interest. Passive microwave sensors in the range of 1 - 100 GHz are suitable for the detection of concealed objects and wide-area surveillance through poor weather and at day and night time. The enhanced extraction of significant information about an observed object is enabled by the use of a spectral sensitive system. For such a spectral radiometer in the microwave range also some depth information can be extracted. The usable frequency range is thereby dependent on the application. For through-wall imaging or detection of covert objects such as for example landmines, the lower microwave range is best suited. On the other hand a high spatial resolution requires higher frequencies or instruments with larger physical dimensions. The drawback of a large system is the required movement of a mirror or a deflecting plate in the case of a mechanical scanner system, or a huge amount of receivers in a fully-electronic instrument like a focal plane array. An innovative technique to overcome these problems is the application of aperture synthesis using a highly thinned array. The combination of spectral radiometric measurements within a wide frequency band, at a high resolution, and requiring a minimum of receivers and only minor moving parts led to the development of the ANSAS instrument (Abbildendes Niederfrequenz-Spektrometer mit Apertursynthese). ANSAS is a very flexible aperture synthesis technology demonstrator for the analysis of main features and interactions concerning high spatial resolution and spectral sensing within a wide frequency range. It consists of a rotated linear thinned array and thus the spatial frequency spectrum is measured on concentric circles. Hence the number of receivers and correlators is reduced considerably compared to a fully two-dimensional array, and measurements still can be done in a reasonable time. In this paper the basic idea of ANSAS and its setup are briefly introduced. Some first imaging results showing the basic capabilities are illustrated. Possible error sources and their impacts are discussed by simulation and compared to the measured data.

Jirousek, Matthias; Peichl, Markus; Suess, Helmut

2010-04-01

224

Process detection in homeland security and defense applications  

NASA Astrophysics Data System (ADS)

Process detection is a fundamental problem arising in a variety of homeland security, national defense and commercial applications, including network security, sensor network data fusion, dynamic social network analysis and video tracking of kinematic objects. Our approach to process detection is based on a generic algorithmic approach called Process Query Systems which has been developed at Dartmouth over the past 3 years. This paper surveys the general area of process detection, its applications and recent progress made in various implementations.

Cybenko, George; Berk, Vincent

2006-06-01

225

A Semantic Sensor Web for Environmental Decision Support Applications  

PubMed Central

Sensing devices are increasingly being deployed to monitor the physical world around us. One class of application for which sensor data is pertinent is environmental decision support systems, e.g., flood emergency response. For these applications, the sensor readings need to be put in context by integrating them with other sources of data about the surrounding environment. Traditional systems for predicting and detecting floods rely on methods that need significant human resources. In this paper we describe a semantic sensor web architecture for integrating multiple heterogeneous datasets, including live and historic sensor data, databases, and map layers. The architecture provides mechanisms for discovering datasets, defining integrated views over them, continuously receiving data in real-time, and visualising on screen and interacting with the data. Our approach makes extensive use of web service standards for querying and accessing data, and semantic technologies to discover and integrate datasets. We demonstrate the use of our semantic sensor web architecture in the context of a flood response planning web application that uses data from sensor networks monitoring the sea-state around the coast of England.

Gray, Alasdair J. G.; Sadler, Jason; Kit, Oles; Kyzirakos, Kostis; Karpathiotakis, Manos; Calbimonte, Jean-Paul; Page, Kevin; Garcia-Castro, Raul; Frazer, Alex; Galpin, Ixent; Fernandes, Alvaro A. A.; Paton, Norman W.; Corcho, Oscar; Koubarakis, Manolis; De Roure, David; Martinez, Kirk; Gomez-Perez, Asuncion

2011-01-01

226

Neutron Detection Alternatives to 3He for National Security Applications  

SciTech Connect

One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

2010-11-21

227

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2013 CFR

...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

2013-04-01

228

Macroeconomic Influences on Social Security Disability Insurance Application Rates  

Microsoft Academic Search

It is generally accepted that Social Security Disability Insurance (DI) Program application rates are influenced by the macro economy. DI program data and previous research indicate that a disproportionate number of beneficiaries (past applicants) are less-educated, with low-skill employment histories. These applicants, while they worked, were likely to intertemporally shift their durables consumption expenditures in response to tight budget constraints

Dana A. Kerr; Bert J. Smoluk

2011-01-01

229

GWASS: GRASS web application software system based on the GeoBrain web service  

NASA Astrophysics Data System (ADS)

GRASS is a well-known geographic information system developed more than 30 years ago. As one of the earliest GIS systems, GRASS has currently survived mainly as free, open-source desktop GIS software, with users primarily limited to the research community or among programmers who use it to create customized functions. To allow average GIS end users to continue taking advantage of this widely-used software, we developed a GRASS Web Application Software System (GWASS), a distributed, web-based, multi-tiered Geospatial Information System (GIS) built on top of the GeoBrain web service, a project sponsored by NASA using the latest service oriented architecture (SOA). This SOA enabled system offers an effective and practical alternative to current commercial desktop GIS solutions. With GWASS, all geospatial processing and analyses are conducted by the server, so users are not required to install any software at the client side, which reduces the cost of access for users. The only resource needed to use GWASS is an access to the Internet, and anyone who knows how to use a web browser can operate the system. The SOA framework is revitalizing the GRASS as a new means to bring powerful geospatial analysis and resources to more users with concurrent access.

Qiu, Fang; Ni, Feng; Chastain, Bryan; Huang, Haiting; Zhao, Peisheng; Han, Weiguo; Di, Liping

2012-10-01

230

Specification and Verification of Web Applications in Rewriting Logic  

NASA Astrophysics Data System (ADS)

This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through a communicating protocol abstracting HTTP. The proposed framework includes a scripting language that is powerful enough to model the dynamics of complex Web applications by encompassing the main features of the most popular Web scripting languages (e.g. PHP, ASP, Java Servlets). We also provide a detailed characterization of browser actions (e.g. forward/backward navigation, page refresh, and new window/tab openings) via rewrite rules, and show how our models can be naturally model-checked by using the Linear Temporal Logic of Rewriting (LTLR), which is a Linear Temporal Logic specifically designed for model-checking rewrite theories. Our formalization is particularly suitable for verification purposes, since it allows one to perform in-depth analyses of many subtle aspects related to Web interaction. Finally, the framework has been completely implemented in Maude, and we report on some successful experiments that we conducted by using the Maude LTLR model-checker.

Alpuente, María; Ballis, Demis; Romero, Daniel

231

Teleradiology network system using the web medical image conference system with a new information security solution  

NASA Astrophysics Data System (ADS)

We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme and the tokenization as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of automatic backup. With automatic backup technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged due to the large area disaster like the great earthquake of Japan, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. Moreover, by using tokenization, the history information of dividing the confidential medical information into two or more tallies is prevented from lying scattered by replacing the history information with another character string (Make it to powerlessness). As a result, information is available only to those who have rightful access it and the sender of a message and the message itself are verified at the receiving point. We propose a new information transmission method and a new information storage method with a new information security solution.

Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiro; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

2012-02-01

232

Queueing-Model-Based Adaptive Control of Multi-Tiered Web Applications  

Microsoft Academic Search

Web applications have been increasingly deployed on the Internet. How to effectively allocate system resources to meet the Service Level Objectives (SLOs) is a challenging problem for Web application providers. In this article, we propose a scheme for automated performance control of Web applications via dynamic resource allocations. The scheme uses a queueing model predictor and an online adaptive feedback

Xue Liu; Jin Heo; Lui Sha; Xiaoyun Zhu

2008-01-01

233

Simple 3-D applications in web service  

NASA Astrophysics Data System (ADS)

This paper describes methods of online translation of text files into a visually more intuitive 3-D format. Relatively simple text files are used as examples here, but the approach described can easily be extended to more complicated tasks. Java Servlet Pages (JSP) dynamic homepage technology is used to provide online access and data processing. Different processing methods are used by the example applications.

Zhang, Jie; John, Nigel W.

2002-07-01

234

Web based medicine intake tracking application  

Microsoft Academic Search

One of the issues in healthcare systems or medical information systems is the reduction of medical errors to ensure patient safety. Inside an assistive environment, we apply RFID tags to monitor drug taking pattern and its consequences are reported to the care giver. This paper talks about an application which tracks the medicine intake pattern for the elderly using RFID

Jyothi K. Vinjumur; Eric Becker; Shahina Ferdous; Georgios Galatas; Fillia Makedon

2010-01-01

235

TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones  

NASA Astrophysics Data System (ADS)

Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.

Nauman, Mohammad; Ali, Tamleek

236

Application of technology to aviation security  

Microsoft Academic Search

This paper suggests that the air transport industry may have failed to maximize the security benefits available through ‘high?tech’ developments despite its dependence on technological advances in all other areas of its operations. It highlights passenger and baggage reconciliation as the ‘bedrock of any defence against the baggage bomber’ and cites the introduction of computer?based, automated matching programmes at Frankfurt's

Rodney Wallis

1993-01-01

237

Concept Mapping Your Web Searches: A Design Rationale and Web-Enabled Application  

ERIC Educational Resources Information Center

|Although it has become very common to use World Wide Web-based information in many educational settings, there has been little research on how to better search and organize Web-based information. This paper discusses the shortcomings of Web search engines and Web browsers as learning environments and describes an alternative Web search…

Lee, Y.-J.

2004-01-01

238

Design of a framework for multi-user\\/application oriented WebGIS services  

Microsoft Academic Search

In this paper, a framework is presented to provide a new mode for WebGIS services. This framework consists of three layers: User layer, Application layer and WebGIS service layer. User Layer supports users to access WebGIS services via different network environment; application layer represents WebGIS applications constructed by different organizations or companies, which integrate GIS services to solve some domain-oriented

Luo Yingwei; Wang Xiaolin; Xu Zhuoqun

2001-01-01

239

Integration Testing of Web Applications and Databases Using TTCN-3  

NASA Astrophysics Data System (ADS)

Traditional approaches to integration testing typically use a variety of different test tools (such as HTTPUnit, Junit, DBUnit) and manage data in a variety of formats (HTML, Java, SQL) in order to verify web application state at different points in the architecture of a web application. Managing test campaigns across these different tools and correlating intermediate results in different formats is a difficult problem which we address in this paper. In particular, the major contribution of this paper is to demonstrate that a specification-based approach to integration testing enables one to define integration test campaigns more succinctly and efficiently in a single language/tool and correlate intermediate results in a single data format. We also evaluate the effectiveness of TTCN-3 (a standards-based test specification language and framework) in supporting such an approach.

Stepien, Bernard; Peyton, Liam

240

Attitudes toward Web application supporting pharmacist-clinician comanagement of postexposure prophylaxis patients.  

PubMed

OBJECTIVES To qualitatively explore clinician and pharmacist attitudes toward using a Web application virtual pharmacist-clinician partnership (VPCP) to assist with comanaged care of illicit drug-using patients prescribed postexposure prophylaxis (PEP). DESIGN Qualitative, descriptive, nonexperimental study. SETTING New York City (NYC) from February 2011 to March 2012. PARTICIPANTS Four pharmacists and nine clinicians. INTERVENTION In-depth interviews. MAIN OUTCOME MEASURES Potential impact of the VPCP on pharmacist-clinician communication and potential barriers to use of the VPCP when comanaging PEP patients among pharmacists and clinicians. RESULTS Pharmacists and clinicians were supportive of an interactive Web application that would expand the role of pharmacists to include assistance with PEP access and patient management. Participants noted that the VPCP would facilitate communication between pharmacists and clinicians and have potential to support adherence among patients. Pharmacists and clinicians were concerned about not having time to use the VPCP and security of patient information on the site. Pharmacist and clinician concerns informed final development of the VPCP, including creation of a user-friendly interface, linkage to users' e-mail accounts for timeline notification, and attention to security. CONCLUSION Use of Web-based technology to support communication between pharmacists and clinicians was seen as being a potentially feasible method for improving patient care, particularly in the delivery of PEP to drug users and other high-risk groups. These findings highlight the need for further study of a technology-supported partnership, particularly for comanagement of patients who face challenges with adherence. PMID:24185430

Fuller, Crystal M; Turner, Alezandria K; Hernández, Diana; Rivera, Alexis V; Amesty, Silvia; Lewis, Michael D; Feldman, Stuart

2013-11-01

241

Turning Application Security Inside Out: Security for Service-Oriented Architectures (SOAs)  

Microsoft Academic Search

Service-oriented architectures (SOAs) have become mainstream in the past year due to their ability to provide business agility and flexibility through integration, productivity, and software reuse. The Web services framework enables composite applications that leverage service- oriented architecture (SOA) design practices, creating more cost-effective distributed architectures. As enterprises adopt SOA, they open their systems, enabling greater agility and easier integration.

Brent Carlson; Alan Himler

2005-01-01

242

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2013 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2013-04-01

243

Dynamic content web applications: Crash, failover, and recovery analysis  

Microsoft Academic Search

This work assesses how crashes and recoveries affect the performance of a replicated dynamic content web ap- plication. RobustStore is the result of retrofitting TPC-W's on-line bookstore with Treplica, a middleware for build- ing dependable applications. Implementations of Paxos and Fast Paxos are at the core of Treplica's efficient and programmer-friendly support for replication and recovery. The TPC-W benchmark, augmented

Luiz Eduardo Buzato; Gustavo M. D. Vieira; Willy Zwaenepoel

2009-01-01

244

Embedding Audio and Video Content in Your Web Application  

Microsoft Academic Search

\\u000a As we have stated before, Mobile Safari doesn’t support Flash content. iOS, however, is an extraordinary multimedia platform\\u000a that inherits the quality of the iPod for audio and video content. That the YouTube application is shipped by default on the\\u000a OS is symptomatic of the importance given to multimedia both by Apple and by third-party web sites. The number of

Chris Apers; Daniel Paterson

245

Instant multi-tier web applications without tears  

Microsoft Academic Search

We describe how development productivity for multi-tier web- based database 'forms' oriented applications can be significantly improved using 'InstantApps', an interpretive framework that uses efficient runtime model interpretation and features an integrated 'wysiwig' 'point-and click' design editor for developing forms, database schema, control flow, and functional logic. As compared to related academic as well as commercial work, our approach has

Gautam Shroff; Puneet Agarwal; Premkumar T. Devanbu

2009-01-01

246

The research of some key technologies on the application of WebGIS in ITS  

Microsoft Academic Search

In this paper, based on the discussion of WebGIS characteristics, some key technologies of the integration of WebGIS and ITS were expounded, these technologies includes network mode, the research of metadata search and operation, data structure analysis and data security scheme research.

Zhizhou Wu; Xiaoguang Yang; Zhizhong Li

2003-01-01

247

Collaborative knowledge discovery & marshalling for intelligence & security applications  

Microsoft Academic Search

This paper discusses the Knowledge Encapsulation Framework, a flexible, extensible evidence-marshalling environment built upon a natural language processing pipeline and exposed to users via an open-source semantic wiki. We focus our discussion on applications of the framework to intelligence and security applications, specifically, an instantiation of the KEF environment for researching illicit trafficking in nuclear materials.

Andrew J. Cowell; Russell S. Jensen; Michelle L. Gregory; Peter C. Ellis; Keith Fligg; Liam R. McGrath; Kelly O'Hara; Eric B. Bell

2010-01-01

248

Securing context-aware applications using environment roles  

Microsoft Academic Search

In the future, a largely invisible and ubiquitous computing infrastructure will assist people with a variety of activities in the home and at work. The applications that will be deployed in such systems will create and manipulate private information and will provide access to a variety of other resources. Securing such applications is challenging for a number of reasons. Unlike

Michael J. Covington; Wende Long; Srividhya Srinivasan; Anind K. Dev; Mustaque Ahamad

2001-01-01

249

Social Security Disability Insurance: Applications, Awards, and Lifetime Income Flows  

Microsoft Academic Search

This paper provides new evidence about the impact of Social Security Disability Insurance on male labor force participation decisions based on estimates from a structural model of applications, awards, and state-contingent lifetime income flows. The lifetime framework makes it possible to consider long-term opportunity costs associated with early labor force withdrawal and the disincentive to applications resulting from the statutory

Brent Kreider

1999-01-01

250

MT-WAVE: profiling multi-tier web applications (abstracts only)  

Microsoft Academic Search

Modern web applications consist of many distinct services that collaborate to provide the full application functionality. To improve application performance, developers need to be able to identify the root cause of performance problems; identifying and fixing performance problems in these distributed, heterogeneous applications can be very difficult. As web applications become more complicated, the number of systems involved will continue

Anthony Arkles; Dwight Makaroff

2011-01-01

251

Research and application of web development based on ASP.NET 2.0+Ajax  

Microsoft Academic Search

Ajax is a new concept of web application development proposed in 2005. It is the acronym of Asynchronous JavaScript and XML. Once Ajax appeared, it is rapidly applied to the fields of Web development. Ajax application is different from the traditional Web development model, using asynchronous interaction. The client unnecessarily waits while the server processes the data submitted. So the

H. Wang; J. Yang

2008-01-01

252

Social applications: exploring a more secure framework  

Microsoft Academic Search

Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications - applications and services written by third party developers that provide additional functionality linked to a user's profile. However, current application platforms put users at risk by permitting the disclosure of

Andrew Besmer; Heather Richter Lipford; Mohamed Shehab; Gorrell Cheek

2009-01-01

253

Towards a Secure Application-Semantic Aware Policy Enforcement Architecture  

Microsoft Academic Search

Even though policy enforcement has been studied from dif- ferent angles including notation, negotiation and enforcement, the devel- opment of an application-semantic aware enforcement architecture re- mains an open problem. In this paper we present and discuss the design of such an architecture. As networked and grid computing and web service architectures are gaining ac- ceptance, computer systems are being

Srijith K. Nair; Bruno Crispo; Andrew S. Tanenbaum

2006-01-01

254

GIST Web Services: A New Design Model for Developing GIS Customized ITS Application Systems  

Microsoft Academic Search

\\u000a The GIS-T web services can provide the hosted spatial data and GIS functionalities that can be accessed and integrated into\\u000a the different customized ITS applications. This paper presents the system design for building the Web GIS based intelligent\\u000a transportation application system with GIS-T web service technology. The GIS-T web services are designed to perform basic\\u000a geo-processing tasks, such as address

Xiaolin Lu

2006-01-01

255

Building messaging substrates for Web and Grid applications.  

PubMed

Grid application frameworks have increasingly aligned themselves with the developments in Web services. Web services are currently the most popular infrastructure based on service-oriented architecture (SOA) paradigm. There are three core areas within the SOA framework: (i) a set of capabilities that are remotely accessible, (ii) communications using messages and (iii) metadata pertaining to the aforementioned capabilities. In this paper, we focus on issues related to the messaging substrate hosting these services; we base these discussions on the NARADABROKERING system. We outline strategies to leverage capabilities available within the substrate without the need to make any changes to the service implementations themselves. We also identify the set of services needed to build Grids of Grids. Finally, we discuss another technology, HPSEARCH, which facilitates the administration of the substrate and the deployment of applications via a scripting interface. These issues have direct relevance to scientific Grid applications, which need to go beyond remote procedure calls in client-server interactions to support integrated distributed applications that couple databases, high performance computing codes and visualization codes. PMID:16099746

Fox, Geoffrey; Pallickara, Shrideep; Pierce, Marlon; Gadgil, Harshawardhan

2005-08-15

256

Application of homomorphism to secure image sharing  

NASA Astrophysics Data System (ADS)

In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images (l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

2011-09-01

257

SMART Sensors for Homeland Security Applications  

SciTech Connect

New SMART approaches to fast, high sensitivity, high selectivity, low false indication, self communicating, distributed sensor networks for detection of chemical, biological and radiation threats are being developed at PNNL. These new sensors have their roots in clever combinations of high affinity ligands, self assembled monolayers, shape-specific receptor surfaces, mesoporous superstructures, rapidly fabricated single-chain antibodies, stabilized enzyme reactors and manipulated micro-beads for optical, mass, and direct electronic transduction. Assemblies of these SMART materials and structures are able to efficiently reject the bulk of highly cluttered physical environmental backgrounds, collect the product of interest with extremely high selectivity, concentrate it and present it for efficient and sensitive detection. The general construction methodology for these structures and examples of new sensor systems for detecting chemical, biological and nuclear materials of concern in the Homeland Security context is presented.

Lind, Michael A.; Wright, Bob W.

2004-02-27

258

Muon Fluence Measurements for Homeland Security Applications  

SciTech Connect

This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

2010-08-10

259

SMART sensors for homeland security applications  

NASA Astrophysics Data System (ADS)

New SMART approaches to fast, high sensitivity, high selectivity, low false indication, self communicating, distributed sensor networks for detection of chemical, biological and radiation threats are being developed at PNNL. These new sensors have their roots in clever combinations of high affinity ligands, self assembled monolayers, shape-specific receptor surfaces, mesoporous superstructures, rapidly fabricated single-chain antibodies, stabilized enzyme reactors and manipulated micro-beads for optical, mass, and direct electronic transduction. Assemblies of these SMART materials and structures are able to efficiently reject the bulk of highly cluttered physical environmental backgrounds, collect the product of interest with extremely high selectivity, concentrate it and present it for efficient and sensitive detection. The general construction methodology for these structures and examples of new sensor systems for detecting chemical, biological and nuclear materials of concern in the Homeland Security context is presented.

Lind, Michael A.; Wright, Bob W.

2004-07-01

260

Using the PL/SQL Cartridge of the Oracle Application Server to Deploy Web Applications  

SciTech Connect

Deploying business applications on the internal Web is a priority at Oak Ridge National Laboratory (Lockheed Martin Energy Research) and Lockheed Martin Energy Systems, Inc. as with most corporations. Three separate applications chose the Oracle Application Server (OAS), using the PL/SQL cartridge as a Web deployment method. This method was chosen primarily because the data was already stored in Oracle tables and developers knew HJSQL or at least SQL. The Database Support group had the responsibility of installing, testing, and determining standard methods for interfacing with the PL/SQL cartridge of the OAS. Note that the term Web Application Server was used for version 3, but in this discussion, OAS will be used for both version 3 and version 4.

Begovich, C.L.

1999-06-14

261

WEB SECURITY ISSUES: HOW HAS RESEARCH ADDRESSED THE GROWING NUMBER OF THREATS?  

Microsoft Academic Search

The Internet has drastically changed how organizations do business. The World Wide Web (WWW or Web) is becoming increasingly important in doing business, selling to customers, managing relationships with vendors and partners, etc. In fact, many organizations have only a Web presence and do not have a physical location. This increase in reliance on the Internet has opened organizations to

Randy Brown

262

GCOOS Web Applications for Recreational Boaters and Fishermen  

NASA Astrophysics Data System (ADS)

Spatial and temporal information on the ecology of marine species and encompassing oceanographic environment is vital to the development of effective strategies for marine resource management and biodiversity conservation. Assembling data and generating products is a time-consuming and often laborious part of the workflow required of fisheries specialists, resource managers, marine scientists and other stakeholder groups for effective fishery management and marine spatial planning. Workflow costs for all groups can be significantly reduced through the use of interoperable networked data systems. The Gulf of Mexico Coastal Ocean Observing System Regional Association (GCOOS-RA) is one of 11 RAs comprising the non-Federal part of the U.S. Integrated Ocean Observing System (IOOS). The RAs serve the region’s needs for data and information: by working with data providers to offer their data in standardized ways following IOOS guidance, by gathering stakeholders’ needs and requirements, and by producing basic products or facilitating product-generation by others to meet those needs. The GCOOS Data Portal aggregates regional near real-time data and serves these data through standardized service interfaces suitable for automated machine access or in formats suitable for human consumption. The related Products Portal generates products in graphical displays for humans and in standard formats for importing into common software packages. Web map applications are created using ArcGIS server RESTful service, publicly available Open Geospatial Consortium (OGC) Web Map Service (WMS) layers, and Web Coverage Service (WCS). Use of standardize interfaces allows us to construct seamless workflows that carry data from sensors through to products in an automated fashion. As a demonstration of the power of interoperable standards-based systems we have developed tailored product web pages for recreational boaters and fishermen. This is a part of an ongoing project to provide an interactive tool for decision support in the Gulf of Mexico.

Kobara, S.; Howard, M. K.; Simoniello, C.; Jochens, A. E.; Gulf Of Mexico Coastal Ocean Observing System Regional Association (Gcoos-Ra)

2010-12-01

263

Application of web-GIS approach for climate change study  

NASA Astrophysics Data System (ADS)

Georeferenced datasets are currently actively used in numerous applications including modeling, interpretation and forecast of climatic and ecosystem changes for various spatial and temporal scales. Due to inherent heterogeneity of environmental datasets as well as their huge size which might constitute up to tens terabytes for a single dataset at present studies in the area of climate and environmental change require a special software support. A dedicated web-GIS information-computational system for analysis of georeferenced climatological and meteorological data has been created. It is based on OGC standards and involves many modern solutions such as object-oriented programming model, modular composition, and JavaScript libraries based on GeoExt library, ExtJS Framework and OpenLayers software. The main advantage of the system lies in a possibility to perform mathematical and statistical data analysis, graphical visualization of results with GIS-functionality, and to prepare binary output files with just only a modern graphical web-browser installed on a common desktop computer connected to Internet. Several geophysical datasets represented by two editions of NCEP/NCAR Reanalysis, JMA/CRIEPI JRA-25 Reanalysis, ECMWF ERA-40 Reanalysis, ECMWF ERA Interim Reanalysis, MRI/JMA APHRODITE's Water Resources Project Reanalysis, DWD Global Precipitation Climatology Centre's data, GMAO Modern Era-Retrospective analysis for Research and Applications, meteorological observational data for the territory of the former USSR for the 20th century, results of modeling by global and regional climatological models, and others are available for processing by the system. And this list is extending. Also a functionality to run WRF and "Planet simulator" models was implemented in the system. Due to many preset parameters and limited time and spatial ranges set in the system these models have low computational power requirements and could be used in educational workflow for better understanding of basic climatological and meteorological processes. The Web-GIS information-computational system for geophysical data analysis provides specialists involved into multidisciplinary research projects with reliable and practical instruments for complex analysis of climate and ecosystems changes on global and regional scales. Using it even unskilled user without specific knowledge can perform computational processing and visualization of large meteorological, climatological and satellite monitoring datasets through unified web-interface in a common graphical web-browser. This work is partially supported by the Ministry of education and science of the Russian Federation (contract #8345), SB RAS project VIII.80.2.1, RFBR grant #11-05-01190a, and integrated project SB RAS #131.

Okladnikov, Igor; Gordov, Evgeny; Titov, Alexander; Bogomolov, Vasily; Martynova, Yuliya; Shulgina, Tamara

2013-04-01

264

Annotating and Visualizing Location Data in Geospatial Web Applications  

Microsoft Academic Search

This paper presents the IDIOM Media Watch on Climate Change (www.ecoresearch.net\\/climate),\\u000a\\u0009a prototypical implementation of an environmental portal that emphasizes\\u000a\\u0009the importance of location data for advanced Web applications. The\\u000a\\u0009introductory section outlines the process of retrofitting existing\\u000a\\u0009knowledge repositories with geographical context information, a process\\u000a\\u0009also referred to as geotagging. The paper then describes the portal's\\u000a\\u0009functionality, which aggregates,

Arno Scharl; Hermann Stern; Albert Weichselbraun

2008-01-01

265

AN INTEGRATED WORKFLOW FOR LIDAR \\/ OPTICAL DATA MAPPING FOR SECURITY APPLICATIONS  

Microsoft Academic Search

This paper elucidates the potential of LiDAR data for information generation for security applications. The study is embedded in the EU Network of Excellence GMOSS. General, security applications cover a large area from infrastructure monitoring (e.g. power stations, pipelines) or border monitoring to less tangible threats like terrorism and civil security \\/ homeland security. It is demonstrated that for those

Dirk Tiede; Thomas Blaschke

266

Custom electronic nose with potential homeland security applications  

Microsoft Academic Search

Detailed in this work is the design and development of a handheld electronic nose nose with an array of conducting polymer composite film sensors interfaced to a Compaq iPAQ. The device has potential applications in homeland security, such as screening people packages, luggage and vehicles at key locations such as airports or government buildings, for the prevention of terrorist attacks.

K. I. Arshak; C. Cunniffe; E. G. Moore; L. M. Cavanagh

2006-01-01

267

Current seismic sensor issues for defense and security applications  

Microsoft Academic Search

Seismic footstep detection-based systems are very important for various homeland security and military applications. Their performance and usefulness strongly depends on the characteristics of the seismic sensors. Unfortunately, currently available seismic sensors do not provide in satisfactory results. This paper describes the main issues of using seismic sensors for detection purposes and shows the key disadvantages of the most popular

Alex Pakhomov; Al Sicignano; Matt Sandy; Tim Goldburt

2004-01-01

268

Secure Deployment of Applications to Fielded Devices and Smart Cards  

Microsoft Academic Search

This work presents a process of deploying applications se- curely to flelded devices with smart cards whilst taking into consider- ation the possibility that the client device could be malicious. Advan- tages of the proposed process include; caching functionality upon the device, optimal use of resources, employment of nested security contexts whilst addressing flelded infrastructures and a homogeneous solution. This

William G. Sirett; John A. Macdonald; Keith Mayes; Constantinos Markantonakis

2006-01-01

269

Gate-level characterization: foundations and hardware security applications  

Microsoft Academic Search

Gate-level characterization (GLC) is the process of characterizing each gate of an integrated circuit (IC) in terms of its physical and manifestation properties. It is a key step in the IC applications regarding cryptography, security, and digital rights management. However, GLC is challenging due to the existence of manufacturing variability (MV) and the strong correlations among some gates in the

Sheng Wei; Saro Meguerdichian; Miodrag Potkonjak

2010-01-01

270

Meta4: a web application for sharing and annotating metagenomic gene predictions using web services.  

PubMed

Whole-genome shotgun metagenomics experiments produce DNA sequence data from entire ecosystems, and provide a huge amount of novel information. Gene discovery projects require up-to-date information about sequence homology and domain structure for millions of predicted proteins to be presented in a simple, easy-to-use system. There is a lack of simple, open, flexible tools that allow the rapid sharing of metagenomics datasets with collaborators in a format they can easily interrogate. We present Meta4, a flexible and extensible web application that can be used to share and annotate metagenomic gene predictions. Proteins and predicted domains are stored in a simple relational database, with a dynamic front-end which displays the results in an internet browser. Web services are used to provide up-to-date information about the proteins from homology searches against public databases. Information about Meta4 can be found on the project website, code is available on Github, a cloud image is available, and an example implementation can be seen at. PMID:24046776

Richardson, Emily J; Escalettes, Franck; Fotheringham, Ian; Wallace, Robert J; Watson, Mick

2013-09-05

271

An Evaluation of Web Services in the Design of a B2B Application  

Microsoft Academic Search

This paper describes the architectural considerations in the design of a web services B2B application. A component design is presented which exploits the postulated advantages of object oriented and web services technologies. Our main focus has been to design interim measures to overcome the limitations of current web services architecture and standards. We discuss our interim design with reference to

K. Hogg; P. Chilcott; M. Nolan; B. Srinivasan

2004-01-01

272

From HTTP to HTML: Erlang\\/OTP experiences in web based service applications  

Microsoft Academic Search

This paper describes the lessons learnt when intern ally developing web applications in Erlang. On the basis of these e xperiences, a framework called the Web Platform has been implemented. The Web Platform follows a design pattern separating data processing and formatting, allowing the construction of flexib le and maintainable software architectures. It also delive rs mechanisms for building dynamic

Francesco Cesarini; Lukas Larsson; Michal Slaski

2006-01-01

273

On the Use of Social Networks in Web Services: Application to the Discovery Stage  

Microsoft Academic Search

This chapter discusses the use of social networks in Web services with focus on the discovery stage that characterizes the life cycle of these Web services. Other stages in this life cycle include description, publication, invocation, and composition. Web services are software applications that end users or other peers can invoke and compose to satisfy different needs such as hotel

Zakaria Maamar; Leandro Krug Wives; Khouloud Boukadi

2010-01-01

274

Using Formal Concept Analysis for Semantic Web Applications  

Microsoft Academic Search

Summary. The explosive growth of information in the Internet and the widespread use of databases have created an immense need for semantic web mining methodologies. The semantic web is envisioned to bring structure to the content of the World Wide Web, and ontologies are seen as the key to realise the vision of the semantic web. The effect the theory

Yi Zhao

2007-01-01

275

C3-5: Patient Use of a Secure Web Portal and LDL in Patients with Diabetes.  

PubMed

Background/Aims Patient use of web portals to interact with their healthcare delivery system and healthcare providers could improve the quality and safety of care. Among patients with diabetes in a large integrated delivery system (IDS), we examined the association between patient use of the web portals and cholesterol test results. Methods The health system implemented a web-based tool for all patients who registered to use the website in November 2005, allowing members to securely access a personal health record, as well as e-mail their physicians, and view their lab results. In this study, we defined patients as web-portal users when patients emailed their physicians or viewed lab results at the first time. We examined the association of patient web-portal use and low-density lipoprotein cholesterol (LDL) level using linear regression with fixed effect at patient level, adjusting for medical center electronic health record (EHR) implementation, quarter for seasonality, and year for temporal trend. Results The 169,711 patients in the IDS diabetes registry at the start of 2004 were followed through 2009. The number of patients who had used patient web-portal increased dramatically from 16% in 2006 to 35% in 2009. During 2004-2009, a total number of 1,070,856 LDL tests were performed among the study subjects and 18% of the tests were done after patients used the web-portal. Overall patient web-portal use was associated with reduction of LDL value by 0.81 mg/dL (95% CI: 0.64-0.97). Further examination among patients stratified by their baseline LDL (last value in 2003) showed that the largest reduction in LDL was found among those with worst control: on average, LDL level dropped by 0.36 mg/dL (95% CI: 0.14-0.57) among those with baseline LDL <100 mg/dL, 0.90mg/dL (95% CI: 0.63-1.18) among those with baseline LDL 100- <130mg/dL, and 2.04 mg/dL (95% CI: 1.59-2.50) among those with baseline LDL >130 mg/dL. Conclusions Patient use of a web-based portal to review laboratory results or email their clinicians increased substantially between 2006 and 2009. Patient use of web portals was associated with improvement of LDL level, with greater improvement among patients in worse control. PMID:24085945

Huang, Jie; Graetz, Ilana; Brand, Richard; Hsu, John; Reed, Mary

2013-09-01

276

C3-5: Patient Use of a Secure Web Portal and LDL in Patients with Diabetes  

PubMed Central

Background/Aims Patient use of web portals to interact with their healthcare delivery system and healthcare providers could improve the quality and safety of care. Among patients with diabetes in a large integrated delivery system (IDS), we examined the association between patient use of the web portals and cholesterol test results. Methods The health system implemented a web-based tool for all patients who registered to use the website in November 2005, allowing members to securely access a personal health record, as well as e-mail their physicians, and view their lab results. In this study, we defined patients as web-portal users when patients emailed their physicians or viewed lab results at the first time. We examined the association of patient web-portal use and low-density lipoprotein cholesterol (LDL) level using linear regression with fixed effect at patient level, adjusting for medical center electronic health record (EHR) implementation, quarter for seasonality, and year for temporal trend. Results The 169,711 patients in the IDS diabetes registry at the start of 2004 were followed through 2009. The number of patients who had used patient web-portal increased dramatically from 16% in 2006 to 35% in 2009. During 2004–2009, a total number of 1,070,856 LDL tests were performed among the study subjects and 18% of the tests were done after patients used the web-portal. Overall patient web-portal use was associated with reduction of LDL value by 0.81 mg/dL (95% CI: 0.64–0.97). Further examination among patients stratified by their baseline LDL (last value in 2003) showed that the largest reduction in LDL was found among those with worst control: on average, LDL level dropped by 0.36 mg/dL (95% CI: 0.14–0.57) among those with baseline LDL <100 mg/dL, 0.90mg/dL (95% CI: 0.63–1.18) among those with baseline LDL 100- <130mg/dL, and 2.04 mg/dL (95% CI: 1.59–2.50) among those with baseline LDL >130 mg/dL. Conclusions Patient use of a web-based portal to review laboratory results or email their clinicians increased substantially between 2006 and 2009. Patient use of web portals was associated with improvement of LDL level, with greater improvement among patients in worse control.

Huang, Jie; Graetz, Ilana; Brand, Richard; Hsu, John; Reed, Mary

2013-01-01

277

Nanomaterials and their application to defense and homeland security  

NASA Astrophysics Data System (ADS)

A critical issue to homeland security and defense is the development of broad range collectors and detectors of weapons of mass destruction. Nanoscience and nanotechnology are increasingly important in the area of such separation and detection. This article presents an overview of the research at the Forensic Science Center at Lawrence Livermore National Laboratory to develop nanostructured materials for applications to forensics and homeland security. Among the many types of nanomaterials reviewed are silica-based materials, molecular imprinted polymers, and silicon platforms. The main aim of the article is to optimize these new classes of materials for the collection concentration and detection of chemical weapons or other related compounds.

Reynolds, John G.; Hart, Bradley R.

2004-01-01

278

Lock-free consistency control for web 2.0 applications  

Microsoft Academic Search

Online collaboration and sharing is the central theme of many web-based services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2.0 applications set up mirror sites to provide large-scale availability and to achieve load balance. However, in the age of Web 2.0, where every user is also a writer and publisher, the

Jiangming Yang; Haixun Wang; Ning Gu; Yiming Liu; Chunsong Wang; Qiwei Zhang

2008-01-01

279

Network-Based Learning and Assessment Applications on the Semantic Web  

ERIC Educational Resources Information Center

|Today's Web applications are already "aware" of the network of computers and data on the Internet, in the sense that they perceive, remember, and represent knowledge external to themselves. However, Web applications are generally not able to respond to the meaning and context of the information in their memories. As a result, most applications

Gibson, David

2005-01-01

280

Spring Framework for Rapid Open Source J2EE Web Application Development: A Case Study  

Microsoft Academic Search

In the highly competitive arena of Web application development, it is important to develop the application as accurately, economically, and efficiently as possible. One way to increase productivity is to decrease complexity. This has been an underlying theme in a movement to change the way programmers approach developing Java 2 Platform, Enterprise Edition (J2EE) Web applications. The focus of the

John Arthur; Shiva Azadegan

2005-01-01

281

The Effect of Web-Based Project Applications on Students' Attitudes towards Chemistry  

ERIC Educational Resources Information Center

Students perform intensive web-based applications during their education. One of these is project-based application. In this study, the effect of web based project applications on students' attitudes towards chemistry has been investigated. 42 students attending Hacettepe University, Faculty of Education, and Department of Chemistry Education have…

Morgil, Inci; Gungor Seyhan, Hatice; Ural Alsan, Evrim; Temel, Senar

2008-01-01

282

ScriptGard: Preventing Script Injection Attacks in Legacy Web Applications with Automatic Sanitization  

Microsoft Academic Search

The primary defense against cross site scripting attacks in web applications is the use of sanitization, the practice of filtering untrusted inputs. We analyze sanitizer use in a shipping web application with over 400,000 lines of code, one of the largest applications studied to date. Our analysis reveals two novel problems: inconsistent sanitization and inconsistent multiple sanitization. We formally define

Prateek Saxena; David Molnar; Benjamin Livshits

2010-01-01

283

Build great web search applications quickly with Solr and Blacklight  

NASA Astrophysics Data System (ADS)

The NRAO faced performance and usability issues after releasing a single-search-box ("Google-like") web application to query data across all NRAO telescope archives. Running queries with several relations across multiple databases proved to be very expensive in compute resources. An investigation for a better platform led to Solr and Blacklight, a solution stack which allows in-house development to focus on in-house problems. Solr is an Apache project built on Lucene to provide a modern search server with a rich set of features and impressive performance. Blacklight is a web user interface (UI) for Solr primarily developed by libraries at the University of Virginia and Stanford University. Though Blacklight targets libraries, it is highly adaptable for many types of search applications which benefit from the faceted searching and browsing, minimal configuration, and flexible query parsing of Solr and Lucene. The result: one highly reused codebase provides for millisecond response times and a flexible UI. Not just for observational data, NRAO is rolling out Solr and Blacklight across domains of library databases, telescope proposals, and more -- in addition to telescope data products, where integration with the Virtual Observatory is on-going.

Duplain, Ron; Balser, Dana S.; Radziwill, Nicole M.

2010-07-01

284

Higher Dependability and Security for Mobile Applications  

Microsoft Academic Search

\\u000a In this paper, we are concerned with the detection software faults and tampering of the mobile application as well as the\\u000a mobile device theft. We want to disable mobile device cryptographically once either of these problems are detected. Basically\\u000a the device needs to receive a new cryptographic key after each pre-set period of time in order to continue function. The

Hongxia Jin

2006-01-01

285

StreamStats: A Water Resources Web Application  

USGS Publications Warehouse

Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (the flow that is exceeded, on average, once in 100 years and has a 1-percent chance of being exceeded in any year, sometimes referred to as the 100-year flood) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; water-use appropriations and permitting; wastewater and industrial discharge permitting; hydropower facility design and regulation; and the setting of minimum required streamflows to protect freshwater ecosystems. In addition, researchers, planners, regulators, and others often need to know the physical and climatic characteristics of the drainage basins (basin characteristics) and the influence of human activities, such as dams and water withdrawals, on streamflow upstream from locations of interest to understand the mechanisms that control water availability and quality at those locations. Knowledge of the streamflow network and downstream human activities also is necessary to adequately determine whether an upstream activity, such as a water withdrawal, can be allowed without adversely affecting downstream activities. Streamflow statistics could be needed at any location along a stream. Most often, streamflow statistics are needed at ungaged sites, where no streamflow data are available to compute the statistics. At U.S. Geological Survey (USGS) streamflow data-collection stations, which include streamgaging stations, partial-record stations, and miscellaneous-measurement stations, streamflow statistics can be computed from available data for the stations. Streamflow data are collected continuously at streamgaging stations. Streamflow measurements are collected systematically over a period of years at partial-record stations to estimate peak-flow or low-flow statistics. Streamflow measurements usually are collected at miscellaneous-measurement stations for specific hydrologic studies with various objectives. StreamStats is a Web-based Geographic Information System (GIS) application (fig. 1) that was created by the USGS, in cooperation with Environmental Systems Research Institute, Inc. (ESRI)1, to provide users with access to an assortment of analytical tools that are useful for water-resources planning and management. StreamStats functionality is based on ESRI's ArcHydro Data Model and Tools, described on the Web at http://support.esri.com/index.cfm?fa=downloads.dataModels.filteredGateway&dmid=15. StreamStats allows users to easily obtain streamflow statistics, basin characteristics, and descriptive information for USGS data-collection stations and user-selected ungaged sites. It also allows users to identify stream reaches that are upstream and downstream from user-selected sites, and to identify and obtain information for locations along the streams where activities that may affect streamflow conditions are occurring. This functionality can be accessed through a map-based user interface that appears in the user's Web browser (fig. 1), or individual functions can be requested remotely as Web services by other Web or desktop computer applications. StreamStats can perform these analyses much faster than historically used manual techniques. StreamStats was designed so that each state would be implemented as a separate application, with a reliance on local partnerships to fund the individual applications, and a goal of eventual full national implementation. Idaho became the first state to implement StreamStats in 2003. By mid-2008, 14 states had applications available to the public, and 18 other states were in various stages of implementation.

Ries, Kernell G., III; Guthrie, John G.; Rea, Alan H.; Steeves, Peter A.; Stewart, David W.

2008-01-01

286

78 FR 46622 - Application of Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...  

Federal Register 2010, 2011, 2012, 2013

...Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...an Application for Registration as a National Securities Exchange (``Form 1...Application.\\6\\ Topaz Exchange submitted a detailed response to comments on July...

2013-08-01

287

Web-Based Recruitment: Effects of Information, Organizational Brand, and Attitudes Toward a Web Site on Applicant Attraction  

Microsoft Academic Search

Recruitment theory and research show that objective characteristics, subjective considerations, and critical contact send signals to prospective applicants about the organization and available opportunities. In the generating applicants phase of recruitment, critical contact may consist largely of interactions with recruitment sources (e.g., newspaper ads, job fairs, organization Web sites); however, research has yet to fully address how all 3 types

David G. Allen; Raj V. Mahto; Robert F. Otondo

2007-01-01

288

Improving secure handling of air cargo by means of web based blended learning  

Microsoft Academic Search

Container security and contraband interdiction in air cargo have become highly relevant topics at airports all over the world. The European Union (EU) requires detailed measures for standards in the field of aviation security that also cover training and certification of security personnel. In Switzerland, the same standards are being enacted by the Federal Office of Civil Aviation (FOCA). The

Philipp Sury; Adrian Schwaninger; Jasmin Nef

2011-01-01

289

Noble Gas Excimer Detectors for Security and Safeguards Applications  

SciTech Connect

Noble gas excimer detectors are a technology that is common in particle physics research and less common in applications for security and international safeguards. These detectors offer the capability to detect gammas with an energy resolution similar to NaI and to detect neutrons with good energy resolution as well. Depending on the noble gas selected and whether or not it is in a gaseous or liquid state, the sensitivity to gammas and neutrons can be tuned according to the needs of the application. All of this flexibility can be available at a significant cost saving over alternative technologies. This paper will review this detector technology and its applicability to security and safeguards.

Hynes, Michael V.; Lanza, Richard [Nuclear Science and Engineering Department Massachusetts Institute of Technology, Cambridge, MA 02139 (United States); Chandra, Rico; Davatz, Giovanna [Arktis Radiation Detectors, Zurich, CH (Switzerland)

2011-12-13

290

Noble Gas Excimer Detectors for Security and Safeguards Applications  

NASA Astrophysics Data System (ADS)

Noble gas excimer detectors are a technology that is common in particle physics research and less common in applications for security and international safeguards. These detectors offer the capability to detect gammas with an energy resolution similar to NaI and to detect neutrons with good energy resolution as well. Depending on the noble gas selected and whether or not it is in a gaseous or liquid state, the sensitivity to gammas and neutrons can be tuned according to the needs of the application. All of this flexibility can be available at a significant cost saving over alternative technologies. This paper will review this detector technology and its applicability to security and safeguards.

Hynes, Michael V.; Chandra, Rico; Davatz, Giovanna; Lanza, Richard

2011-12-01

291

The research of network database security technology based on web service  

NASA Astrophysics Data System (ADS)

Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

2013-03-01

292

A Security Architecture for Mobile Agent Based Applications  

Microsoft Academic Search

This paper describes a security architecture for mobile agent based systems. It defines the notion of a security-enhanced agent and outlines security management components in agent platform bases and considers secure migration of agents from one base to another. The security enhanced agent carries a passport that contains its security credentials and some related security code. Then we describe how

V. Varadharajan; D. Foster

2003-01-01

293

Advancements in web-database applications for rabies surveillance  

PubMed Central

Background Protection of public health from rabies is informed by the analysis of surveillance data from human and animal populations. In Canada, public health, agricultural and wildlife agencies at the provincial and federal level are responsible for rabies disease control, and this has led to multiple agency-specific data repositories. Aggregation of agency-specific data into one database application would enable more comprehensive data analyses and effective communication among participating agencies. In Québec, RageDB was developed to house surveillance data for the raccoon rabies variant, representing the next generation in web-based database applications that provide a key resource for the protection of public health. Results RageDB incorporates data from, and grants access to, all agencies responsible for the surveillance of raccoon rabies in Québec. Technological advancements of RageDB to rabies surveillance databases include 1) automatic integration of multi-agency data and diagnostic results on a daily basis; 2) a web-based data editing interface that enables authorized users to add, edit and extract data; and 3) an interactive dashboard to help visualize data simply and efficiently, in table, chart, and cartographic formats. Furthermore, RageDB stores data from citizens who voluntarily report sightings of rabies suspect animals. We also discuss how sightings data can indicate public perception to the risk of racoon rabies and thus aid in directing the allocation of disease control resources for protecting public health. Conclusions RageDB provides an example in the evolution of spatio-temporal database applications for the storage, analysis and communication of disease surveillance data. The database was fast and inexpensive to develop by using open-source technologies, simple and efficient design strategies, and shared web hosting. The database increases communication among agencies collaborating to protect human health from raccoon rabies. Furthermore, health agencies have real-time access to a wide assortment of data documenting new developments in the raccoon rabies epidemic and this enables a more timely and appropriate response.

2011-01-01

294

VoSeq: A Voucher and DNA Sequence Web Application  

PubMed Central

There is an ever growing number of molecular phylogenetic studies published, due to, in part, the advent of new techniques that allow cheap and quick DNA sequencing. Hence, the demand for relational databases with which to manage and annotate the amassing DNA sequences, genes, voucher specimens and associated biological data is increasing. In addition, a user-friendly interface is necessary for easy integration and management of the data stored in the database back-end. Available databases allow management of a wide variety of biological data. However, most database systems are not specifically constructed with the aim of being an organizational tool for researchers working in phylogenetic inference. We here report a new software facilitating easy management of voucher and sequence data, consisting of a relational database as back-end for a graphic user interface accessed via a web browser. The application, VoSeq, includes tools for creating molecular datasets of DNA or amino acid sequences ready to be used in commonly used phylogenetic software such as RAxML, TNT, MrBayes and PAUP, as well as for creating tables ready for publishing. It also has inbuilt BLAST capabilities against all DNA sequences stored in VoSeq as well as sequences in NCBI GenBank. By using mash-ups and calls to web services, VoSeq allows easy integration with public services such as Yahoo! Maps, Flickr, Encyclopedia of Life (EOL) and GBIF (by generating data-dumps that can be processed with GBIF's Integrated Publishing Toolkit).

Pena, Carlos; Malm, Tobias

2012-01-01

295

The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking  

NASA Astrophysics Data System (ADS)

Communication is a fundamental function of life, and it exists in almost all living things: from single-cell bacteria to human beings. Communication, together with competition and cooperation,arethree fundamental processes in nature. Computer scientists are familiar with the study of competition or 'struggle for life' through Darwin's evolutionary theory, or even evolutionary computing. They may be equally familiar with the study of cooperation or altruism through the Prisoner's Dilemma (PD) game. However, they are likely to be less familiar with the theory of animal communication. The objective of this article is three-fold: (i) To suggest that the study of animal communication, especially the honesty (reliability) of animal communication, in which some significant advances in behavioral biology have been achieved in the last three decades, should be on the verge to spawn important cross-disciplinary research similar to that generated by the study of cooperation with the PD game. One of the far-reaching advances in the field is marked by the publication of "The Handicap Principle: a Missing Piece of Darwin's Puzzle" by Zahavi (1997). The 'Handicap' principle [34][35], which states that communication signals must be costly in some proper way to be reliable (honest), is best elucidated with evolutionary games, e.g., Sir Philip Sidney (SPS) game [23]. Accordingly, we suggest that the Handicap principle may serve as a fundamental paradigm for trust research in computer science. (ii) To suggest to computer scientists that their expertise in modeling computer networks may help behavioral biologists in their study of the reliability of animal communication networks. This is largely due to the historical reason that, until the last decade, animal communication was studied with the dyadic paradigm (sender-receiver) rather than with the network paradigm. (iii) To pose several open questions, the answers to which may bear some refreshing insights to trust research in computer science, especially secure and resilient computing, the semantic web, and social networking. One important thread unifying the three aspects is the evolutionary game theory modeling or its extensions with survival analysis and agreement algorithms [19][20], which offer powerful game models for describing time-, space-, and covariate-dependent frailty (uncertainty and vulnerability) and deception (honesty).

Ma, Zhanshan (Sam); Krings, Axel W.; Hung, Chih-Cheng

296

Evolving and Managing a Data Communication Model for Web-Centric Applications  

Microsoft Academic Search

Managing data distributed over the Web has been a major problem in providing enterprise-wide information to support Web-centric applications, such as e-commerce. For example, the popular three-phase e-commerce application model does not support explicit informal interactions by customers because of data communication problems inherent in the system. We design a high level architecture for Web data communication system that provides

Chima Adiele; Lethbridge AB

2006-01-01

297

Workload characterization of selected JEE-based Web 2.0 applications  

Microsoft Academic Search

Web 2.0 represents the evolution of the web from a source of information to a platform. Network advances have permitted users to migrate from desktop applications to so-called Rich Internet Applications (RIAs) character- ized by thin clients, which are browser-based and store their state on managed servers. Other Web 2.0 technolo- gies have enabled users to more easily participate, col-

Priya Nagpurkar; William Horn; U. Gopalakrishnan; Niteesh Dubey; Joefon Jann; Pratap Pattnaik

2008-01-01

298

A methodology for evaluating JavaScript execution behavior in interactive web applications  

Microsoft Academic Search

JavaScript has gone from being a mechanism for providing dynamic web pages to an important component of many web applications. Currently one of the most popular type of web applications is so-called social networks, e.g., Facebook, Twitter, and MySpace. However, the workload and execution behavior of JavaScript in this context have not been fully explored or understood. In this paper

Jan Kasper Martinsen; Hakan Grahn

2011-01-01

299

The Secure DAES Design for Embedded System Application  

Microsoft Academic Search

Recently, Advanced Encryption Standard (AES) has become one of the major symmetric encryption algorithms used in the embedded\\u000a system applications. Many researches extended use of the algorithm of AES for system security. In this paper, we propose a\\u000a diversified AES (DAES) to create more variations. In the architecture of the DAES, the diversity results from the modification\\u000a of the parameters

Ming-haw Jing; Jian-hong Chen; Zih-heng Chen; Yaotsu Chang

2007-01-01

300

Nanomaterials and their application to defense and homeland security  

Microsoft Academic Search

A critical issue to homeland security and defense is the development of broad range collectors and detectors of weapons of\\u000a mass destruction. Nanoscience and nanotechnology are increasingly important in the area of such separation and detection.\\u000a This article presents an overview of the research at the Forensic Science Center at Lawrence Livermore National Laboratory\\u000a to develop nanostructured materials for applications

John G. Reynolds; Bradley R. Hart

2004-01-01

301

A Wireless Sensor Network Architecture for Homeland Security Application  

Microsoft Academic Search

This paper introduces an innovative wireless sensor network architecture, which has intrinsic reliability and can therefore\\u000a be used for some components of homeland security applications such as intrusion detection. The proposed architecture includes\\u000a a set of communication protocols in the different layers of the model. DTSN is a transport protocol used for reliable data\\u000a transfer and DSDV is a routing

António Grilo; Krzysztof Piotrowski; Peter Langendoerfer; Augusto Casaca

2009-01-01

302

NEUTRON AND GAMMA RAY DETECTION FOR BORDER SECURITY APPLICATIONS  

SciTech Connect

Countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments in the U.S. and in a number of other countries by governments and international organizations. Most deployed radiation portal monitor systems are based on plastic scintillator for gamma-ray detection and 3He tubes for neutron detection. The approach to this homeland security application, and lessons learned, are discussed.

Kouzes, Richard T.

2010-05-21

303

Web and Desktop Applications for ALMA Science Verification Data  

NASA Astrophysics Data System (ADS)

ALMA is the largest radio telescope operating in Chile, and it is expected to produce 200 TB of data every year. Even a data cube obtained for a single source can exceed 1 TB. It is, therefore, crucial to reduce the size of data transmitted through the Internet by doing a cutout of a part of a data cube and/or reducing the spatial/frequency resolution before transferring the data. To specify the cutout region or required resolution, one needs to overview the whole of the data without transferring the large data cube. For this purpose, we developed two applications for quick-looking ALMA data cube, ALMA Web QL and Desktop Viewer (Vissage).

Shirasaki, Y.; Kawasaki, W.; Eguchi, S.; Komiya, Y.; Kosugi, G.; Ohishi, M.; Mizumoto, Y.

2013-10-01

304

The Application of Web in Mental Counseling for College Students  

Microsoft Academic Search

With the development of web and computer technology, web-based psychological counseling is becoming an important fashion in mental consultation at university. Web counseling is a new type counseling model which can be used to help students to resolve all kinds of problems about life and study. In this model, college students seeking for help could communicate with consultant by the

Zhao Yun; Tian Yuan

2010-01-01

305

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications  

NASA Astrophysics Data System (ADS)

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

306

Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications  

Microsoft Academic Search

The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile\\u000a networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh\\u000a look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security\\/efficiency analysis\\u000a to this discussion and highlights the role of trusted platform technology to approach

Mike Meyerstein; Inhyok Cha; Yogendra Shah

2009-01-01

307

Web-Based Intelligent E-Learning Systems: Technologies and Applications  

ERIC Educational Resources Information Center

|Collecting and presenting the latest research and development results from the leading researchers in the field of e-learning systems, Web-Based Intelligent E-Learning Systems: Technologies and Applications provides a single record of current research and practical applications in Web-based intelligent e-learning systems. This book includes major…

Ma, Zongmin

2006-01-01

308

Object-Oriented Hypermedia Design and J2EE Technology for Web-based Applications  

Microsoft Academic Search

Web-based application development is a difficult ta sk, since these applications include various features, like graphical interfaces, navigational s tructures, business models, and wireless commu- nications, as well as other issues, such as serving a multitude of users, and the need for shorter development time. To overcome these complexities, it is indispensable to use web-based applica- tion designs and software

Habib Karimpour; Ayaz Isazadeh; Mohsen Heydarian

2008-01-01

309

Web-Based Intelligent E-Learning Systems: Technologies and Applications  

ERIC Educational Resources Information Center

Collecting and presenting the latest research and development results from the leading researchers in the field of e-learning systems, Web-Based Intelligent E-Learning Systems: Technologies and Applications provides a single record of current research and practical applications in Web-based intelligent e-learning systems. This book includes major…

Ma, Zongmin

2006-01-01

310

Regression and Performance Testing of an e-Learning Web Application: dotLRN  

Microsoft Academic Search

Along with the continuous development of big and complex Web applications such as dotLRN, it is mandatory to execute in a scheduled way a set of test cases to assure its functional stability and to make sure that the Web application still runs whatever the modifications applied to the implementation. This article highlights the importance of testing and presents the

Ana Cavalli; Stephane Maag; Gerardo Morales

2007-01-01

311

Semantic Web Application for the Air Tasking Order (ATO) (Briefing Charts).  

National Technical Information Service (NTIS)

The purpose of this in-house exploratory development was to investigate using Semantic Web technologies for Command and Control (C2) applications. This paper describes a Semantic Web application we developed for the Air Tasking Order (ATO), the document u...

A. Frantz M. Franco

2005-01-01

312

A Case Study in Web 2.0 Application Development  

NASA Astrophysics Data System (ADS)

Recent web technologies focusing on languages, frameworks, and tools are discussed, using the Robert C. Byrd Green Bank Telescopes (GBT) new Dynamic Scheduling System as the primary example. Within that example, we use a popular Python web framework, Django, to build the extensive web services for our users. We also use a second complimentary server, written in Haskell, to incorporate the core scheduling algorithms. We provide a desktop-quality experience across all the popular browsers for our users with the Google Web Toolkit and judicious use of JQuery in Django templates. Single sign-on and authentication throughout all NRAO web services is accomplished via the Central Authentication Service protocol, or CAS.

Marganian, P.; Clark, M.; Shelton, A.; McCarty, M.; Sessoms, E.

2010-12-01

313

Performance Driven Database Design for Scalable Web Applications  

NASA Astrophysics Data System (ADS)

Scaling up web applications requires distribution of load across multiple application servers and across multiple database servers. Distributing load across multiple application servers is fairly straightforward; however distributing load (select and UDI queries) across multiple database servers is more complex because of the synchronization requirements for multiple copies of the data. Different techniques have been investigated for data placement across multiple database servers, such as replication, partitioning and de-normalization. In this paper, we describe our architecture that utilizes these data placement techniques for determining the best possible layout of data. Our solution is general, and other data placement techniques can be integrated within our system. Once the data is laid out on the different database servers, our efficient query router routes the queries to the appropriate database server/(s). Our query router maintains multiple connections for a database server so that many queries are executed simultaneously on a database server, thus increasing the utilization of each database server. Our query router also implements a locking mechanism to ensure that the queries on a database server are executed in order. We have implemented our solutions in our system, that we call SIPD (System for Intelligent Placement of Data). Preliminary experimental results illustrate the significant performance benefits achievable by our system.

Patvarczki, Jozsef; Mani, Murali; Heffernan, Neil

314

A web application for managing data of cardiovascular risk patients.  

PubMed

In the last years the development of home based e-health applications, which use information, telecommunication and videoconferencing technologies, is increased because of their characteristics that allow reducing hospitalization costs and managing and monitoring patient health in real time. However, the development of a home based e-health monitoring system requires the contribution of different expertise, from medicine to engineering, and technologies, from electronics to medical informatics and telemedicine. Here we illustrate a home based e-health project that has been developed with the cooperation of several different research groups of the Bioengineer Department of the "Politecnico di Milano". They provided and integrated all required knowledge and background, including Biomedical Electronics and Biosensors, Biosignal Processing, Medical Informatics and Telemedicine, and Information And Communication Technologies. The aim of the discussed work was to design and implement a Web application that enables different healthcare actors to insert and browse healthcare data, bio-signals, and biomedical images of patients enrolled in a program of cardiovascular risk prevention. Such application is intended to be part of a home monitoring system to be used during the home physical training program of cardiovascular risk patients. PMID:17946759

Bonacina, Stefano; Masseroli, Marco

2006-01-01

315

Empower the patients with a dialogue-based web application.  

PubMed

Based on a clinical intervention study this paper adds to the significance of users involvement in design processes and substantiate the potential of online, flexible health informatics tools as useful components to accommodate organizational changes that short stay treatment demands. A dialogue-based web application was designed and implemented to accommodate patients' information and communication needs in short stay hospital settings. To ensure the system meet the patients' needs, both patients and healthcare professionals were involved in the design process by applying various participatory methods. Contextualization of the new application was also central in all phases to ensure a focus not only on the technology itself, but also the way it is used and in which relations and contexts. In evaluation of the tool, the patients' descriptions as user substantiate that the use of Internet applications can expand the time for dialogue between the individual patient and healthcare professionals. The patients experience being partners in an on going dialogue, and thereby are empowered, e.g. in managing their care even at home, as these dialogues generate individualized information. PMID:22874231

Bjørnes, Charlotte D; Cummings, Elizabeth; Nøhr, Christian

2012-01-01

316

Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues  

ERIC Educational Resources Information Center

|This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

2007-01-01

317

A knowledge-based risk assessment framework for evaluating web-enabled application outsourcing projects  

Microsoft Academic Search

The convergence between telecommunications and computing industries enabling the provision of web-enabled software applications facilitates new opportunities for small and medium businesses (SMBs) to embrace application outsourcing projects. Application service providers (ASPs) offering web-enabled software applications on a subscription (pay-as-you-go) basis revisits the traditional service bureau model of outsourcing, and promises additional business benefits of economies of scale, increased scope

Wendy L Currie

2003-01-01

318

Terahertz wave opto-mechanical scanner for security application  

NASA Astrophysics Data System (ADS)

This paper describes a new opto-mechanical scanner that is hopeful for terahertz imaging in security applications. The target of using this scanner is portal screening of personnel for high-resolution imaging of concealed threat objects. It is not only applied to active terahertz imaging but also applied to passive Terahertz imaging. Terahertz wave can penetrate many materials that are opaque to visible and infrared light, such as plastics, cardboard, textiles and so on. So the terahertz imaging technology has a potential to be applicable in security inspection at airports, stations and other public place. Now, the most terahertz imaging system works at point to point mechanical scan pattern. The speed of this raster scan is too slow to apply in practical field. 2-D terahertz array detector can be applied to real time imaging. But at present their cost is prohibitively high. Fortunately low cost, high performance, opto-mechanically scanner is able to meet the current requirements. An opto-mechanical scanner should be able to rapidly scan a 2-D image of the scene. It also should have high optical efficiency so that an image system can achieve the required thermal sensitivity with the minimum number of receivers. These ensure that it can easily operate at any wavelength, and be active or passive. The opto-mechanically scanning can meets these requirements and is being developed into a high performance, low-cost prototype system that will meet the future needs for terahertz security.

Deng, Chao; Zheng, Yongju; Zhang, Cunlin

2010-11-01

319

Security Technologies for Open Networking Environments (STONE)  

SciTech Connect

Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi-domain scenarios is supported by a set of security engines that represent the core of the Federated Identities Management Server, which is also an extension of the Domain Security Server. The Federated Identity Management server allows users to federate their identities or terminate the federation between the service provider and the identity provider. At the service provider web site, the users are offered a list of identity providers to which they can choose to federate their identities. After users federate their identity, they can perform Single Sign-On protocol in an environment of federated domains. The group security system consists of a number of security technologies under a unified architecture, which supports creation of secure groups and execution of secure group transactions and applications in an open networking environment. The system is based on extensions of the GSAKMP standard for group key distribution and management. The Top layer is the Security Infrastructure with the Security Management and Administration System components and protocols that provide security functions common to all secure network applications The Middle layer is the Secure Group Protocols and Applications layer, consisting of the Policy and Group Key Distribution Server and Web-based (thin) Client. The Bottom layer is the supporting Middleware Security Platform, the cryptographic platform already described above. The group security system is designed to perform the functions necessary to create secure groups and enable secure group applications. Specifically, the system can manage group roles, create and disseminate a group security policy, perform authentication and authorization of users using PKI certificates and Web services security, generate group keys, and recover from compromises. In accordance with the GSAKMP standard, the group security system must perform all the required group life-cycle functions: group definition, group establishment, group maintenance, and group removal. The group security system has been designed to support four roles: The Security Domain Ad

Muftic, Sead

2005-03-31

320

VoSeq: a voucher and DNA sequence web application.  

PubMed

There is an ever growing number of molecular phylogenetic studies published, due to, in part, the advent of new techniques that allow cheap and quick DNA sequencing. Hence, the demand for relational databases with which to manage and annotate the amassing DNA sequences, genes, voucher specimens and associated biological data is increasing. In addition, a user-friendly interface is necessary for easy integration and management of the data stored in the database back-end. Available databases allow management of a wide variety of biological data. However, most database systems are not specifically constructed with the aim of being an organizational tool for researchers working in phylogenetic inference. We here report a new software facilitating easy management of voucher and sequence data, consisting of a relational database as back-end for a graphic user interface accessed via a web browser. The application, VoSeq, includes tools for creating molecular datasets of DNA or amino acid sequences ready to be used in commonly used phylogenetic software such as RAxML, TNT, MrBayes and PAUP, as well as for creating tables ready for publishing. It also has inbuilt BLAST capabilities against all DNA sequences stored in VoSeq as well as sequences in NCBI GenBank. By using mash-ups and calls to web services, VoSeq allows easy integration with public services such as Yahoo! Maps, Flickr, Encyclopedia of Life (EOL) and GBIF (by generating data-dumps that can be processed with GBIF's Integrated Publishing Toolkit). PMID:22720030

Peña, Carlos; Malm, Tobias

2012-06-12

321

Development of grid-like applications for public health using Web 2.0 mashup techniques.  

PubMed

Development of public health informatics applications often requires the integration of multiple data sources. This process can be challenging due to issues such as different file formats, schemas, naming systems, and having to scrape the content of web pages. A potential solution to these system development challenges is the use of Web 2.0 technologies. In general, Web 2.0 technologies are new internet services that encourage and value information sharing and collaboration among individuals. In this case report, we describe the development and use of Web 2.0 technologies including Yahoo! Pipes within a public health application that integrates animal, human, and temperature data to assess the risk of West Nile Virus (WNV) outbreaks. The results of development and testing suggest that while Web 2.0 applications are reasonable environments for rapid prototyping, they are not mature enough for large-scale public health data applications. The application, in fact a "systems of systems," often failed due to varied timeouts for application response across web sites and services, internal caching errors, and software added to web sites by administrators to manage the load on their servers. In spite of these concerns, the results of this study demonstrate the potential value of grid computing and Web 2.0 approaches in public health informatics. PMID:18755998

Scotch, Matthew; Yip, Kevin Y; Cheung, Kei-Hoi

2008-08-28

322

Security Applications of Diodes with Unique Current-Voltage Characteristics  

NASA Astrophysics Data System (ADS)

Diodes are among the most simple and inexpensive electric components. In this paper, we investigate how random diodes with irregular I(U) curves can be employed for crypto and security purposes. We show that such diodes can be used to build Strong Physical Unclonable Functions (PUFs), Certificates of Authenticity (COAs), and Physically Obfuscated Keys (POKs), making them a broadly usable security tool. We detail how such diodes can be produced by an efficient and inexpensive method known as ALILE process. Furthermore, we present measurement data from real systems and discuss prototypical implementations. This includes the generation of helper data as well as efficient signature generation by elliptic curves and 2D barcode generation for the application of the diodes as COAs.

Rührmair, Ulrich; Jaeger, Christian; Hilgers, Christian; Algasinger, Michael; Csaba, György; Stutzmann, Martin

323

Exploiting Agent-Oriented Programming for Developing Future Internet Applications Based on the Web: The JaCa-Web Framework  

Microsoft Academic Search

\\u000a Besides being suitable for tackling Distributed Artificial Intelligence problems, we argue that agent-oriented programming\\u000a languages and multi-agent programming technologies provide an effective level of abstraction for tackling the design and programming\\u000a of complex software systems in general. Internet applications based on the Web are an important example of such systems. Following\\u000a the cloud computing perspective, these kinds of applications will

Mattia Minotti; Alessandro Ricci; Andrea Santi

324

Intelligent Facial Recognition Systems: Technology advancements for security applications  

SciTech Connect

Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

Beer, C.L.

1993-07-01

325

8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...  

Code of Federal Regulations, 2013 CFR

...is subject to the conduct of identity, law enforcement, or security...has completed the appropriate identity, law enforcement, or security...consequences of filing under the Child Status Protection Act. ...application for relief for which identity, law...

2013-01-01

326

18 CFR 34.3 - Contents of application for issuance of securities.  

Code of Federal Regulations, 2013 CFR

...Contents of application for issuance of securities. 34.3 Section 34.3 Conservation...Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT...FOR AUTHORIZATION OF THE ISSUANCE OF SECURITIES OR THE ASSUMPTION OF LIABILITIES...

2013-04-01

327

National Voluntary Laboratory Accreditation Program. Homeland Security Applications: Radiation Detection Instruments, April 2010.  

National Technical Information Service (NTIS)

The laboratory accreditation program for Radiation Detection Instruments used in homeland security applications was established in 2006 in response to a request from the United States Department of Homeland Security (DHS), Science and Technology Directora...

B. A. Sandoval C. Brannon G. Gillerman L. Pibida M. Unterweger

2010-01-01

328

Research of Flex-based WebGIS application  

Microsoft Academic Search

Analyze the implementations of the current traditional WebGIS, such as CGI, Server API and ActiveX, summarize their advantages and disadvantages. Through these, propose three urgent problems existing in the traditional WebGIS. The WebGIS based on Flex technology can just remedy these defects. Base on the comprehensive analysis of the characteristic of Flex, the paper builds a demo version of oilfield

Zukuan Wei; Jae-Hong Kim; JingRong Zhao

2010-01-01

329

Web 2.0 applications in top Chinese university libraries  

Microsoft Academic Search

Purpose – This paper aims to explore the status and construction pattern of Web 2.0 technologies employed in top Chinese university libraries, their functionalities and features. Design\\/methodology\\/approach – A combination of online survey and content analysis methodology is applied to a sample of 38 top Chinese university libraries' web sites. The Web 2.0 tools are categorized by generally accepted standards

Zhiping Han; Yan Quan Liu

2010-01-01

330

Initial Empirical Research With an Experimental Secure Web Portal of Electronics Records Archives.  

National Technical Information Service (NTIS)

This document reports the results of an initial empirical research with an experimental secured portal of sensitive electronic records archives. The experimentation focused on measuring the effective data-transfer rates (throughputs) of the portal under v...

B. Nguyen G. Racine

2005-01-01

331

Context-Driven Policy Enforcement and Reconciliation for Web Services  

Microsoft Academic Search

Security of Web services is a major factor to their successful integration into critical IT applications. An extensive research in this direction concentrates on low level aspects of security such as message secrecy, data integrity, and authentication. Thus, proposed solutions are mainly built upon the assumption that security mechanisms are static and predefined. However, the dynamic nature of the Internet

Subramanian Sattanathan; Nanjangud C. Narendra; Zakaria Maamar; Ghita Kouadri Mostéfaoui

2006-01-01

332

A web-based application for initial screening of living kidney donors: development, implementation and evaluation.  

PubMed

Most centers utilize phone or written surveys to screen candidates who self-refer to be living kidney donors. To increase efficiency and reduce resource utilization, we developed a web-based application to screen kidney donor candidates. The aim of this study was to evaluate the use of this web-based application. Method and time of referral were tabulated and descriptive statistics summarized demographic characteristics. Time series analyses evaluated use over time. Between January 1, 2011 and March 31, 2012, 1200 candidates self-referred to be living kidney donors at our center. Eight hundred one candidates (67%) completed the web-based survey and 399 (33%) completed a phone survey. Thirty-nine percent of donors accessed the application on nights and weekends. Postimplementation of the web-based application, there was a statistically significant increase (p < 0.001) in the number of self-referrals via the web-based application as opposed to telephone contact. Also, there was a significant increase (p = 0.025) in the total number of self-referrals post-implementation from 61 to 116 per month. An interactive web-based application is an effective strategy for the initial screening of donor candidates. The web-based application increased the ability to interface with donors, process them efficiently and ultimately increased donor self-referral at our center. PMID:23205926

Moore, D R; Feurer, I D; Zavala, E Y; Shaffer, D; Karp, S; Hoy, H; Moore, D E

2012-12-03

333

FAFSA on the Web Toolkit.  

ERIC Educational Resources Information Center

The online version of the Free Application for Federal Student Aid (FAFSA) allows students to apply for federal financial aid using the Internet. In many cases, FAFSA on the Web may be used to apply for financial aid from other sources, such as states or schools. Data are secured, so sending an application through the Internet is as safe as…

Office of Student Financial Assistance (ED), Washington, DC.

334

FAFSA on the Web Toolkit.  

ERIC Educational Resources Information Center

|The online version of the Free Application for Federal Student Aid (FAFSA) allows students to apply for federal financial aid using the Internet. In many cases, FAFSA on the Web may be used to apply for financial aid from other sources, such as states or schools. Data are secured, so sending an application through the Internet is as safe as…

Office of Student Financial Assistance (ED), Washington, DC.

335

A dialogue-based web application enhances personalized access to healthcare professionals - an intervention study  

PubMed Central

Background In today’s short stay hospital settings the contact time for patients is reduced. However, it seems to be more important for the patients that the healthcare professionals are easy to get in contact with during the whole course of treatment, and to have the opportunity to exchange information, as a basis for obtaining individualized information and support. Therefore, the aim was to explore the ability of a dialogue-based application to contribute to accessibility of the healthcare professionals and exchangeability of information. Method An application for online written and asynchronous contacts was developed, implemented in clinical practice, and evaluated. The qualitative effect of the online contact was explored using a Web-based survey comprised of open-ended questions. Results Patients valued the online contacts and experienced feelings of partnership in dialogue, in a flexible and calm environment, which supported their ability to be active partners and feelings of freedom and security. Conclusion The online asynchronous written environment can contribute to accessibility and exchangeability, and add new possibilities for dialogues from which the patients can benefit. The individualized information obtained via online contact empowers the patients. The Internet-based contacts are a way to differentiate and expand the possibilities for contacts outside the few scheduled face-to-face hospital contacts.

2012-01-01

336

3D NormalModes Shockwave; A Web Application for Interactive Visualization and Three Dimensional Perc  

NSDL National Science Digital Library

3D Normal Modes is a Web application for interactive visualization and three-dimensional perception of the normal modes of molecular vibration, suitable for undergraduate students in chemistry. The application uses the Macromedia Shockwave plug-in and has been designed and developed especially for the Web. It has a simple graphical user interface and requires a download of only 120 KB, allowing it to be used even with low bandwidth Internet connections. Its performance is comparable to a desktop application.

337

Passive millimeter-wave imaging for airborne and security applications  

NASA Astrophysics Data System (ADS)

As a result of its relatively short wavelength coupled with relatively high penetration of such things as fog, bad weather and clothing, millimeter-wave imaging provides a powerful tool for both airborne and security type applications. By using a passive approach such as that implemented here, it is possible to image through bad weather or detect concealed weapons and articles all without generating any form of radiation that might either help an enemey or raise health concerns. In this paper we will show imagery from our second generation state-of-the-art unit and discuss the technology involved.

Clark, Stuart E.; Lovberg, John A.; Martin, Christopher A.; Kolinko, Vladimir G.

2003-08-01

338

Image fusion technology for security and surveillance applications  

NASA Astrophysics Data System (ADS)

Image fusion technology offers a range of potential benefits to the security and surveillance community, including increased situational awareness and enhanced detection capabilities. This paper reports on how image fusion technology is being adapted from the military arena (in which it is generally found today) to provide a new and powerful asset in the fight against crime and terrorism. The combination of detection and tracking processing with image fusion is discussed and assessed. Finally, a number of specific examples are presented which include land, air, and sea applications.

Riley, Tom; Smith, Moira

2006-10-01

339

Computer-aided diagnosis workstation and teleradiology network system for chest diagnosis using the web medical image conference system with a new information security solution  

NASA Astrophysics Data System (ADS)

Diagnostic MDCT imaging requires a considerable number of images to be read. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. Because of such a background, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis. We also have developed the teleradiology network system by using web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. Our teleradiology network system can perform Web medical image conference in the medical institutions of a remote place using the web medical image conference system. We completed the basic proof experiment of the web medical image conference system with information security solution. We can share the screen of web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with the workstation that builds in some diagnostic assistance methods. Biometric face authentication used on site of teleradiology makes "Encryption of file" and "Success in login" effective. Our Privacy and information security technology of information security solution ensures compliance with Japanese regulations. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new teleradiology network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our teleradiology network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaro; Moriyama, Noriyuki

2010-03-01

340

Introduction to the Application of Web-Based Surveys.  

ERIC Educational Resources Information Center

This paper discusses some basic assumptions and issues concerning web-based surveys. Discussion includes: assumptions regarding cost and ease of use; disadvantages of web-based surveys, concerning the inability to compensate for four common errors of survey research: coverage error, sampling error, measurement error and nonresponse error; and…

Timmerman, Annemarie

341

Pragmatic applications of the Semantic Web using SemTalk  

Microsoft Academic Search

The Semantic Web is a new layer of the Internet that enables semantic representation of the contents of existing Web pages. Using common ontologies, human users sketch out the most important facts in models that act as intelligent whiteboards. Once models are broadcasted to the Internet, new and intelligent search engines, “ambient” intelligent devices and agents will be able to

Christian Fillies; Gay Wood-albrecht; Frauke Weichhardt

2003-01-01

342

RECOMMENDATION WITH ASSOCIATION RULES: A WEB MINING APPLICATION  

Microsoft Academic Search

Data mining tools can bring many new possibilities for the analysis of web access log files. In this paper we follow one case (the Infoline web site) and describe our study on how to build recommendation models in order to improve the usability of the site. Our recommendation models are sets of association rules. We measure the performance of the

Alípio Jorge; Mário Amado Alves; Paulo Azevedo

2002-01-01

343

Application of traditional system design techniques to web site design  

Microsoft Academic Search

After several decades of computer program construction there emerged a set of principles that provided guidance to produce more manageable programs. With the emergence of the plethora of Internet web sites one wonders if similar guidelines are followed in their construction. Since this is a new technology no apparent universally accepted methods have emerged to guide the designer in Web

Gerald P. Marquis

2002-01-01

344

Separation of Navigation Routing Code in J2EE Web Applications  

Microsoft Academic Search

The navigation routing code of a web application is the part of the code involved in routing a request from a web page through the appropriate components on the server, typically ending with the display of a response page. Common maintenance activities are to change the sequence of pages or the processing for a page, and for these activities the

Minmin Han; Christine Hofmeister

2005-01-01

345

The Design and Application of a Web-Based Self- And Peer-Assessment System  

ERIC Educational Resources Information Center

This study describes the web-based self- and peer-assessments system, or the Web-SPA, which has been shown to provide teachers with a flexible interface with which to arrange various self- and peer-assessment procedures. Secondly, this study examines the effects of the application of the progressively focused self- and peer-assessment (PFSPA)…

Sung, Yao-Ting; Chang, Kuo-En; Chiou, Shen-Kuan; Hou, Huei-Tse

2005-01-01

346

Gender Divide and Acceptance of Collaborative Web 2.0 Applications for Learning in Higher Education  

ERIC Educational Resources Information Center

|Situated in the gender digital divide framework, this survey study investigated the role of computer anxiety in influencing female college students' perceptions toward Web 2.0 applications for learning. Based on 432 college students' "Web 2.0 for learning" perception ratings collected by relevant categories of "Unified Theory of Acceptance and…

Huang, Wen-Hao David; Hood, Denice Ward; Yoo, Sun Joo

2013-01-01

347

A secure and privacy-preserving web banner system for targeted advertising  

Microsoft Academic Search

A solution for privacy-preserving targeted advertising through web banners is proposed. The solution allows users to make a balance between the exposure of their privacy and the personalization of advertisements. The general idea of the solution lies in dynamically associating users with profiles according to their interests and\\/or demographics instead of to individual and unique identifiers. Users have complete control

Joris Claessens; Claudia D ´ iaz; Raimondo Faustinelli; Bart Preneel

348

Security applications of a remote electric-field sensor technology  

NASA Astrophysics Data System (ADS)

A new generation of electric field sensors developed at the University of Sussex is enabling an alternative to contact voltage and non-contact magnetic field measurements. We have demonstrated the capability of this technology in a number of areas including ECG through clothing, remote off-body ECG, through wall movement sensing and electric field imaging. Clearly, there are many applications for a generic sensor technology with this capability, including long term vital sign monitoring. The non-invasive nature of the measurement also makes these sensors ideal for man/machine and human/robot interfacing. In addition, there are obvious security and biometric possibilities since we can obtain physiological data remotely, without the knowledge of the subject. This is a clear advantage if such systems are to be used for evaluating the psychological state of a subject. In this paper we report the results obtained with a new version of the sensor which is capable of acquiring electrophysiological signals remotely in an open unshielded laboratory. We believe that this technology opens up a new area of remote biometrics which could have considerable implications for security applications. We have also demonstrated the ability of EPS to function in closely-packed one and two dimensional arrays for real-time imaging.

Prance, Robert J.; Harland, Christopher J.; Prance, Helen

2008-10-01

349

Application of Near-Space Passive Radar for Homeland Security  

NASA Astrophysics Data System (ADS)

To protect the homeland from terrorist attacks employing explosive devices, revolutionary advances across a wide range of technologies are required. Inspired by recent advances in near-space (defined as the region between 20 km and 100 km), this paper proposes a new passive radar system using opportunistic transmitter as an illuminator and near-space platform as a receiver. This concept differs substantially from current radars. This system can be operated as a passive bistatic or multistatic radar and hence largely immune to jamming. By placing the receiver in near-space platforms, many functions that are currently performed with satellites or airplanes could be performed much more cheaply and with much greater operational utility. These advantages make near-space passive attractive for a variety of applications, many of which fit well with the needs of homeland security. This paper details the role of near-space passive radar as sensor system that can support homeland security applications. The strengths and weakness of near-space passive radar, compared to current spaceborne and airborne radars, are detailed. The signal models and processing algorithms for near-space passive radar are provided. It is shown that the use of cost effective near-space platforms can provide the solutions that were previously thought to be out of reach to remote sensing and government customers.

Wang, Wenqin

2007-03-01

350

Game Theory for Security: Lessons Learned from Deployed Applications  

Microsoft Academic Search

Security at major locations of economic or political importance or transportation or other infrastructure is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security coverage at all times; instead, these limited resources must be deployed intelligently taking into account differences in priorities of targets requiring security coverage, the responses of the

M. Tambe

2010-01-01

351

AMP: a science-driven web-based application for the TeraGrid  

NASA Astrophysics Data System (ADS)

The Asteroseismic Modeling Portal (AMP) provides a web-based interface for astronomers to run and view simulations that derive the properties of Sun-like stars from observations of their pulsation frequencies. In this paper, we describe the architecture and implementation of AMP, highlighting the lightweight design principles and tools used to produce a functional fully-custom web-based science application in less than a year. Targeted as a TeraGrid science gateway, AMP's architecture and implementation are intended to simplify its orchestration of TeraGrid computational resources. AMP's web-based interface was developed as a traditional standalone database-backed web application using the Python-based Django web development framework, allowing us to leverage the Django framework's capabilities while cleanly separating the user interface development from the grid interface development. We have found this combination of tools flexible and effective for rapid gateway development and deployment.

Woitaszek, M.; Metcalfe, T.; Shorrock, I.

352

Development and applications of diffractive optical security devices for banknotes and high value documents  

NASA Astrophysics Data System (ADS)

Embossed holograms and othe rdiffractive optically variable devices are increasingly familiar security items on plastic cards, banknotes, securyt documetns and on branded gods and media to protect against counterfeit, protect copyright and to evidence tamper. This paper outlines some of the diffractive optical seuryt and printed security develoepd for this rapidly growing field and provides examles of some current security applications.

Drinkwater, John K.; Holmes, Brian W.; Jones, Keith A.

2000-04-01

353

Security Loop Agents for the Enterprise Applications based on Resource Description Framework  

Microsoft Academic Search

Security loop-holes can cost a fortune to a large enterprise organization providing e-commerce services. Meanwhile, the enterprise applications have been applied widely to simplify and generate better performance in managing the business tasks. Most of these applications (Enterprise Applications) unable to provide a high level of security due to the new daily threats specially when malicious agents entered into agent

Ahmed Isam Khaleel; Ibraheem T. Nather; Adib M. Monzer Habbal

2011-01-01

354

M-Commerce Secured Using Web-Enabled Mobile Biometric Agents  

Microsoft Academic Search

M-commerce brings challenges for both individuals and society. The creation and maintenance of secure identities for online payment has emerged as an important priority of businesses and consumers. In order to address some of these challenges we implement an efficient biometric mobile payment authorization system combined with an embedded commercial barcode reader to provide a worldwide platform-independent mobile payment authentication

Huiqi Lu; Frederic Claret-Tournier; Chris Chatwin; Rupert C. D. Young

2007-01-01

355

A social approach to security: Using social networks to help detect malicious web content  

Microsoft Academic Search

In the midst of a social networking revolution, social media has become the new vehicle for effective business marketing and transactions. As social aspects to the Internet continue to expand in both quantity and scope, so has the security threat towards enterprise networks and systems. Many social networking users also become main targets of spams, phishing, stalking, and other malware

Michael Robertson; Yin Pan; Bo Yuan

2010-01-01

356

OSP with Jython Web Start application - step-by-step guide  

NSDL National Science Digital Library

A description of how to build Java Web Start applications using the OSP library. Integrates the OpenSourcePhysics .jar library files and the Python classes generated by Jython during compiling time with jythonc.

2008-11-13

357

Exploring Software Partitions for Fast Security Processing on a Multiprocessor Mobile SoC  

Microsoft Academic Search

The functionality of mobile devices, such as cell phones and personal digital assistants (PDAs), has evolved to include various applications where security is a critical concern (secure web transactions, mobile commerce, download and playback of protected audio\\/video content, connection to corporate private networks, etc.). Security mechanisms (e.g., secure communication protocols) involve cryptographic algorithms, and are often quite computationally intensive, challenging

Divya Arora; Anand Raghunathan; Srivaths Ravi; Murugan Sankaradass; Niraj K. Jha; Srimat T. Chakradhar

2007-01-01

358

Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing  

Microsoft Academic Search

Security testing is a major means for assuring software security and many security testing techniques have been developed in the past. Benchmarks, however, are in great demands for empirically evaluating the vulnerability detection capabilities of these techniques. To develop such a benchmark, this paper presents an approach to security mutation analysis of Magento, a fully-fledged open source e-commerce web application

Lijo Thomas; Weifeng Xu; Dianxiang Xu

2011-01-01

359

Model, Properties, and Applications of Context-Aware Web Services  

Microsoft Academic Search

Context-aware Web services is a seamless interaction between service requestors and services considering both contextual requirements\\u000a of services and contextual conditions of the service requestors. We envision that providing context- aware Web services is\\u000a the first step toward the ultimate goal of e-services by delivering right services from right partners at right time. This\\u000a chapter aims for the models, properties,

Stephen J. H. Yang; Jia Zhang; Angus F. M. Huang

360

Securing the anonymity of content providers in the World Wide Web  

NASA Astrophysics Data System (ADS)

Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

Demuth, Thomas; Rieke, Andreas

1999-04-01

361

Building Collaboration Applications that Mix Web Services Hosted Content with P2P Protocols  

Microsoft Academic Search

The most commonly deployed web service applications employ client-server communication patterns, with clients running remotely and services hosted in data centers. In this paper, we make the case for Service-Oriented Colla- boration (SOC) applications that combine service-hosted data with collaboration features implemented using peer- to-peer protocols. Collaboration features are awkward to support solely based on the existing web services technol-

Ken Birman; Jared Cantwell; Daniel Freedman; Qi Huang; Petko Nikolov; Krzysztof Ostrowski

2009-01-01

362

A Comparative Study of Web Application Design Models Using the Java Technologies  

Microsoft Academic Search

\\u000a The Servlet technology has been the most widely used technology for building scalable Web applications. In the events, there\\u000a are four design models for developing Web applications using the Java technologies: Model 1, Model 2, Struts, and JavaServer\\u000a Faces (JSF). Model 1 employs a series of JSP pages; Model 2 adopts the Model-View-Controller pattern; Struts is a framework\\u000a employing the

Budi Kurniawan; Jingling Xue

2004-01-01

363

Porting a web-based mapping application to a smartphone app  

Microsoft Academic Search

NewsStand is a Web-based mapping application that we have developed to enable searching for spatially-referenced information by using a map query interface. Previously, we adapted the Web version to execute on mobile devices such as smartphones where the main issue that was confronted was how to deal with the considerably smaller display screen while retaining access to the application through

Hanan Samet; Marco D. Adelfio; Brendan C. Fruin; Michael D. Lieberman; Benjamin E. Teitler

2011-01-01

364

The application research of airport security information management system on the field of civil aviation security  

Microsoft Academic Search

The airport security information management system (ASIMS) has been playing very important role in preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database

Wu Wei

2009-01-01

365

Security Checkpoint Optimizer (SCO): An Application for Simulating the Operations of Airport Security Checkpoints  

Microsoft Academic Search

For most security planners, a key challenge is to continuously evaluate how changes or additions to their facilities or procedures impact security effectiveness, operational costs, and passenger throughput. Each change must be analyzed to ensure negative effects do not outweigh the benefits. This paper presents security checkpoint optimizer (SCO), a 2-D spatially aware discrete event simulation tool developed by Northrop

D. Wilson; E. K. Roe; S. A. So

2006-01-01

366

Security Checkpoint Optimizer (SCO): an application for simulating the operations of airport security checkpoints  

Microsoft Academic Search

For most security planners, a key challenge is to continu- ously evaluate how changes or additions to their facilities or procedures impact security effectiveness, operational costs, and passenger throughput. Each change must be analyzed to ensure negative effects do not outweigh the benefits. This paper presents Security Checkpoint Opti- mizer (SCO), a 2-D spatially aware discrete event simula- tion tool

Diane Wilson; Eric K. Roe; S. Annie So

2006-01-01

367

Security Aspects of an Enterprise-Wide Network Architecture.  

ERIC Educational Resources Information Center

|Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…

Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan

1999-01-01

368

A Novel Framework for Database Security Based on Mixed Cryptography  

Microsoft Academic Search

Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiality, privacy and integrity of data is a major issue for the security of database systems. Recent high profile data thefts have shown that perimeter defenses are insufficient to secure sensitive data. This paper studies

Hasan Kadhem; Toshiyuki Amagasa; Hiroyuki Kitagawa

2009-01-01

369

Development of a Secure Mobile GPS Tracking and Management System  

ERIC Educational Resources Information Center

|With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …

Liu, Anyi

2012-01-01

370

How to write application code even a security auditor could love  

SciTech Connect

In the past the application programmer was frequently isolated from the computer security professional. The target machine might have various access controls and security plans, but when the programmer delivered a new application, it was rarely scrutinized from a security standpoint. Security reviews of application code are now being used to overcome this apparent oversight, but these reviews are often hampered by a lack of knowledge among programmers of techniques that make code secure and facilitate security analysis of the code. This paper informally describes fifteen general principles for producing good code that is easily reviewed. This paper is not a formal guideline, but is intended as an inside view of how one reviewer looks at code from a security standpoint.

Barlich, G.L.

1989-01-01

371

Test of radiation detectors used in homeland security applications.  

PubMed

This work was performed as part of the National Institute of Standards and Technology (NIST) program to support the development of the new American National Standards Institute (ANSI) standards N42.32-2003 and N42.33-2003 for hand-held detectors, and personal electronic dosimeters, as well as to support the Office of Law Enforcement Standards (OLES) and the Department of Homeland Security (DHS) in testing these types of detectors for their use by first responders. These instruments are required to operate over a photon energy range of 60 keV to 1.33 MeV and over a wide range of air-kerma rates. The performance and response of various radiation detectors, purchased by the NIST, was recorded when placed in 60Co, 137Cs, and x-ray beams at different air-kerma rates. The measurements described in this report were performed at the NIST x-ray and gamma-ray radiation calibration facilities. The instruments' response (exposure or dose rate readings) shows strong energy dependence but almost no dependence to different air-kerma rates. The data here reported provide a benchmark in support of current protocols that are being developed for radiation detection instrumentation used in homeland security applications. A future plan is to test these devices, plus other commercially available detectors, against ANSI standards N42.32-2003 and N42.33-2003. PMID:15824588

Pibida, L; Minniti, R; O'Brien, M; Unterweger, M

2005-05-01

372

A Secure RFID-based WBAN for Healthcare Applications.  

PubMed

A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years. PMID:24061704

Ullah, Sana; Alamri, Atif

2013-09-06

373

Wireless sensors and sensor networks for homeland security applications.  

PubMed

New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers. PMID:23175590

Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

2012-08-11

374

Wireless sensors and sensor networks for homeland security applications  

PubMed Central

New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

Potyrailo, Radislav A.; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M.; Kelley-Loughnane, Nancy; Naik, Rajesh R.

2012-01-01

375

Web Integration of gOcad Using a 3d-Xml Application Server  

Microsoft Academic Search

The background of this paper is situated in the area of integrating gOcad into a web based in- formation system. Traditionally, an information system consists of the user application, the data storage and - according to the complexity of the information system - an application server. Current implementations of common application servers are designed for E-Business but not for complex

Tobias Frank; Marcus Apel; Helmut Schaeben

376

A Framework for Decentralized, Context-Aware Mobile Applications Using Semantic Web Technology  

Microsoft Academic Search

The recent evolution in mobile devices, combined with rapid advancements in identification techniques, has lead to new opportunities for mobile application developers: mobile applications that can be made aware of their environment and the objects in it. Additionally, by combining mobile devices and identification technology with the Web, mobile applications can be developed that exploit services and information associated with

William Van Woensel; Sven Casteleyn; Olga De Troyer

2009-01-01

377

Learning transportation mode from raw gps data for geographic applications on the web  

Microsoft Academic Search

Geographic information has spawned many novel Web applications where global positioning system (GPS) plays important roles in bridging the applications and end users. Learning knowledge from users' raw GPS data can provide rich context information for both geographic and mobile applications. However, so far, raw GPS data are still used directly without much understanding. In this paper, an approach based

Yu Zheng; Like Liu; Longhao Wang; Xing Xie

2008-01-01

378

A development environment for knowledge-based medical applications on the World-Wide Web.  

PubMed

The World-Wide Web (WWW) is increasingly being used as a platform to develop distributed applications, particularly in contexts, such as medical ones, where high usability and availability are required. In this paper we propose a methodology for the development of knowledge-based medical applications on the web, based on the use of an explicit domain ontology to automatically generate parts of the system. We describe a development environment, centred on the LISPWEB Common Lisp HTTP server, that supports this methodology, and we show how it facilitates the creation of complex web-based applications, by overcoming the limitations that normally affect the adequacy of the web for this purpose. Finally, we present an outline of a system for the management of diabetic patients built using the LISPWEB environment. PMID:9821518

Riva, A; Bellazzi, R; Lanzola, G; Stefanelli, M

1998-11-01

379

Grid-optimized Web 3D applications on wide area network  

NASA Astrophysics Data System (ADS)

Geographical information system has come into the Web Service times now. In this paper, Web3D applications have been developed based on our developed Gridjet platform, which provides a more effective solution for massive 3D geo-dataset sharing in distributed environments. Web3D services enabling web users could access the services as 3D scenes, virtual geographical environment and so on. However, Web3D services should be shared by thousands of essential users that inherently distributed on different geography locations. Large 3D geo-datasets need to be transferred to distributed clients via conventional HTTP, NFS and FTP protocols, which often encounters long waits and frustration in distributed wide area network environments. GridJet was used as the underlying engine between the Web 3D application node and geo-data server that utilizes a wide range of technologies including the one of paralleling the remote file access, which is a WAN/Grid-optimized protocol and provides "local-like" accesses to remote 3D geo-datasets. No change in the way of using software is required since the multi-streamed GridJet protocol remains fully compatible with existing IP infrastructures. Our recent progress includes a real-world test that Web3D applications as Google Earth over the GridJet protocol beats those over the classic ones by a factor of 2-7 where the transfer distance is over 10,000 km.

Wang, Frank; Helian, Na; Meng, Lingkui; Wu, Sining; Zhang, Wen; Guo, Yike; Parker, Michael Andrew

2008-08-01

380

Web-based recruitment: effects of information, organizational brand, and attitudes toward a Web site on applicant attraction.  

PubMed

Recruitment theory and research show that objective characteristics, subjective considerations, and critical contact send signals to prospective applicants about the organization and available opportunities. In the generating applicants phase of recruitment, critical contact may consist largely of interactions with recruitment sources (e.g., newspaper ads, job fairs, organization Web sites); however, research has yet to fully address how all 3 types of signaling mechanisms influence early job pursuit decisions in the context of organizational recruitment Web sites. Results based on data from 814 student participants searching actual organization Web sites support and extend signaling and brand equity theories by showing that job information (directly) and organization information (indirectly) are related to intentions to pursue employment when a priori perceptions of image are controlled. A priori organization image is related to pursuit intentions when subsequent information search is controlled, but organization familiarity is not, and attitudes about a recruitment source also influence attraction and partially mediate the effects of organization information. Theoretical and practical implications for recruitment are discussed. PMID:18020806

Allen, David G; Mahto, Raj V; Otondo, Robert F

2007-11-01

381

Security issues in healthcare applications using wireless medical sensor networks: a survey.  

PubMed

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

Kumar, Pardeep; Lee, Hoon-Jae

2011-12-22

382

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey  

PubMed Central

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

Kumar, Pardeep; Lee, Hoon-Jae

2012-01-01

383

Boca: an open-source RDF store for building Semantic Web applications.  

PubMed

This article presents the design goals and features of the open-source Boca RDF server in the context of a community of cancer-tumor modeling investigators. Boca supplements the desirable data features of the Semantic Web with important enterprise and application features to power a new generation of Semantic-Web-based applications. The data features enable the integration and retrieval of tremendous quantities of diverse data. The enterprise features promote data integrity, fidelity, provenance and robustness. The application features provide for collaborative applications and dynamic user interfaces. PMID:17491005

Feigenbaum, Lee; Martin, Sean; Roy, Matthew N; Szekely, Benjamin; Yung, Wing C

2007-05-08

384

Autonomous energy harvesting embedded sensors for border security applications  

NASA Astrophysics Data System (ADS)

Wireless networks of seismic sensors have proven to be a valuable tool for providing security forces with intrusion alerts even in densely forested areas. The cost of replenishing the power source is one of the primary obstacles preventing the widespread use of wireless sensors for passive barrier protection. This paper focuses on making use of energy from multiple sources to power these sensors. A system comprising of Texas Micropower's (TMP's) energy harvesting device and Crane Wireless Monitoring Solutions' sensor nodes is described. The energy harvesters are suitable for integration and for low cost, high volume production. The harvesters are used for powering sensors in Crane's wireless hub and spoke type sensor network. TMP's energy harvesting methodology is based on adaptive power management circuits that allow harvesting from multiple sources making them suitable for underground sensing/monitoring applications. The combined self-powered energy harvesting solutions are expected to be suitable for broad range of defense and industry applications. Preliminary results have indicated good feasibility to use a single power management solution that allows multi-source energy harvesting making such systems practical in remote sensing applications.

Hande, Abhiman; Shah, Pradeep; Falasco, James N.; Weiner, Doug

2010-04-01

385

Satellite services for disaster management and security applications  

NASA Astrophysics Data System (ADS)

Advantages of communications satellites are the inherent broadcast capability, high bandwidth, reliability and flexibility in network expansion. Small transportable terminals can be made operational very quickly. Recent developments in communications and computer technology allow to provide low-cost equipment, which is affordable even in developing countries. Communications satellites can also play an important role in case of emergencies or natural disasters. The combination of satellite communications and navigation can support new services for emergency teams. At the Institute of Applied Systems Technology and the Institute of Communication Networks and Satellite Communications highly transportable terminals have been developed, both for star and mesh network topologies. A fully meshed VSAT system is used for symmetrical links. For other applications, which do not require high return link capacity an asymmetrical system is an efficient solution. It uses low-cost DVB technology for the forward link and satellite phones with data capability on the return link. Novel multicast protocols allow to use these asymmetrical links in an efficient way. The paper describes the different systems and their applications in disaster management and security applications. Emphasis is put on transfer of remote sensing images and voice over IP (VoIP) as well as videoconference services.

Koudelka, Otto; Schrotter, P.

2007-06-01

386

Web-based multimedia information retrieval for clinical application research  

NASA Astrophysics Data System (ADS)

We described a web-based data warehousing method for retrieving and analyzing neurological multimedia information. The web-based method supports convenient access, effective search and retrieval of clinical textual and image data, and on-line analysis. To improve the flexibility and efficiency of multimedia information query and analysis, a three-tier, multimedia data warehouse for epilepsy research has been built. The data warehouse integrates clinical multimedia data related to epilepsy from disparate sources and archives them into a well-defined data model.

Cao, Xinhua; Hoo, Kent S.; Zhang, Hong; Ching, Wan; Zhang, Ming; Wong, Stephen T.

2001-08-01

387

The application of neural networks to UNIX computer security  

Microsoft Academic Search

Computer security can be divided into two distinct areas, preventive security and the detection of security violations. Of the two, a greater degree of research and emphasis has been applied to prevention, while detection has been relatively overlooked. This is a costly oversight as preventive measures are never infallible. To date the detection of intruder violation on computer systems is

Kymie Tan

1995-01-01

388

Secure protocol lifecycle and its application in power industry  

Microsoft Academic Search

With advancing of communication technologies, various protocols have been designed, developed and widely deployed in modern industries, including power industry. And the security issues of these protocol systems which involve the security of national infrastructure have gained more and more concerns. Since protocols are not only communication services, but also evolving developing processes, security vulnerabilities could be introduced at the

Wen Tang; Aifen Sui

2008-01-01

389

Dynamic programming model estimates of Social Security Disability Insurance application timing  

Microsoft Academic Search

This paper develops a dynamic programming model of the Social Security Disability Insurance (SSDI) application timing decision. We estimate the time to application from the point at which a health condition first begins to affect the kind or amount of work that a currently employed person can do. We use Health and Retirement Study (HRS) and restricted access Social Security

Richard V. Burkhauser; J. S. Butler; Gulcin Gumus

2004-01-01

390

Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application  

Microsoft Academic Search

† We propose a method for analyzing trade-off between security policies for Java mobile codes and requirements for Java application. We assume that mobile codes are downloaded from different sites, they are used in an application on a site, and their functions are restricted by security policies on the site. We clarify which functions can be performed under the policies

Haruhiko Kaiya; Kouta Sasaki; Yasunori Maebashi; Kenji Kaijiri

2003-01-01

391

Analyzing the Feasibility of Using Secure Application Integration Methodology (SAIM) for Integrating DON Enterprise Resource Planning (ERP) applications.  

National Technical Information Service (NTIS)

A thorough examination of the Secure Application Integration Methodology (SAIM) for applicability in the Department of the Navy (DON) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directio...

R. O. Marin

2004-01-01

392

Web 2.0 Technologies: Applications for Community Colleges  

ERIC Educational Resources Information Center

The current generation of new students, referred to as the Millennial Generation, brings a new set of challenges to the community college. The influx of these technologically sophisticated students, who interact through the social phenomenon of Web 2.0 technology, bring expectations that may reshape institutions of higher learning. This chapter…

Bajt, Susanne K.

2011-01-01

393

Analysis of navigability of Web applications for improving blind usability  

Microsoft Academic Search

Various accessibility activities are improving blind access to the increasingly indispensable WWW. These approaches use various metrics to measure the Web's accessibility. “Ease of navigation” (navigability) is one of the crucial factors for blind usability, especially for complicated webpages used in portals and online shopping sites. However, it is difficult for automatic checking tools to evaluate the navigation capabilities even

Hironobu Takagi; Shin Saito; Kentarou Fukuda; Chieko Asakawa

2007-01-01

394

CaTTS: Calendar Types and Constraints for Web Applications  

Microsoft Academic Search

Data referring to cultural calendars such as the widespread Gregorian dates but also dates after the Chinese, Hebrew, or Islamic calendars as well as data referring to professional calendars like fiscal years or teaching terms are omnipresent on the Web. Formalisms such as XML Schema have acknowledged this by offering a rather extensive set of Gregorian dates and times as

Franccois Bry; Frank-Andr'e Rieß; Stephanie Spranger

2005-01-01

395

AN ARCHAEOLOGICAL WEB GIS APPLICATION BASED ON MAPSERVER AND POSTGIS  

Microsoft Academic Search

The availability of cultural heritage information of a territory can lead to an improvement in its exploitation and preservation and to a greater fruition by the community. To this aim, a web GIS of Spina Verde - a natural and archaeological park in the northern part of Italy - has been designed and implemented. The main topic has been to

M. A. Brovelli; D. Magni

396

Web 2.0 Technologies: Applications for Community Colleges  

ERIC Educational Resources Information Center

|The current generation of new students, referred to as the Millennial Generation, brings a new set of challenges to the community college. The influx of these technologically sophisticated students, who interact through the social phenomenon of Web 2.0 technology, bring expectations that may reshape institutions of higher learning. This chapter…

Bajt, Susanne K.

2011-01-01

397

Android Protection Mechanism: A Signed Code Security Mechanism for Smartphone Applications.  

National Technical Information Service (NTIS)

This research develops the Android Protection System (APS), a hardware-implemented application security mechanism on Android smartphones. APS uses a hash-based white-list approach to protect mobile devices from unapproved application execution. Functional...

J. Stueckle

2011-01-01

398

Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy  

NASA Astrophysics Data System (ADS)

We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

Xue, Mingfu; Hu, Aiqun; He, Chunlong

399

Tools for remote usability evaluation of Web applications through browser logs and task models.  

PubMed

The dissemination of Web applications is extensive and still growing. The great penetration of Web sites raises a number of challenges for usability evaluators. Video-based analysis can be rather expensive and may provide limited results. In this article, we discuss what information can be provided by automatic tools able to process the information contained in browser logs and task models. To this end, we present a tool that can be used to compare log files of user behavior with the task model representing the actual Web site design, in order to identify where users' interactions deviate from those envisioned by the system design. PMID:14587544

Paganelli, Laila; Paternò, Fabio

2003-08-01

400

A Hike through Post-EJB J2EE Web Application Architecture  

Microsoft Academic Search

Since the mid-nineties, server-based Web applications have emerged as a convenient way to provide functionality to a user audience without any specific software or system requirements except the need for a reasonably up-to-date Web browser. The tricky integration, installation, and configuration tasks are under the control of an expert on the server side. These advantages apply to both the general

K. Laufer

2005-01-01

401

A survey of the application of Web 2.0 in Australasian university libraries  

Microsoft Academic Search

Purpose – This paper aims to provide an overall picture of the application of Web 2.0 technologies in Australasian university libraries. The focus of the research was what types of Web 2.0 technologies were applied in such libraries as well as their purposes and features. Design\\/methodology\\/approach – Content analysis was used in terms of quantitative approach. A checklist as the

Nguyen Cuong Linh

2008-01-01

402

AMP: A Science-driven Web-based Application for the TeraGrid  

Microsoft Academic Search

The Asteroseismic Modeling Portal (AMP) provides a web-based interface for astronomers to run and view simulations that derive the properties of Sun-like stars from observations of their pulsation frequencies. In this paper, we describe the architecture and implementation of AMP, highlighting the lightweight design principles and tools used to produce a functional fully-custom web-based science application in less than a

Matthew Woitaszek; Travis Metcalfe; Ian Shorrock

2010-01-01

403

AMP: a science-driven web-based application for the TeraGrid  

Microsoft Academic Search

The Asteroseismic Modeling Portal (AMP) provides a web-based interface for\\u000aastronomers to run and view simulations that derive the properties of Sun-like\\u000astars from observations of their pulsation frequencies. In this paper, we\\u000adescribe the architecture and implementation of AMP, highlighting the\\u000alightweight design principles and tools used to produce a functional\\u000afully-custom web-based science application in less than a

Matthew Woitaszek; Travis Metcalfe; Ian Shorrock

2009-01-01

404

Applications of shape analysis to domestic and international security.  

SciTech Connect

The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

2002-01-01

405

Bacteriorhodopsin-based photochromic pigments for optical security applications  

NASA Astrophysics Data System (ADS)

Bacteriorhodopsin is a two-dimensional crystalline photochromic protein which is astonishingly stable towards chemical and thermal degradation. This is one of the reasons why this is one of the very few proteins which may be used as a biological pigment in printing inks. Variants of the naturally occurring bacteriorhodopsin have been developed which show a distinguished color change even with low light intensities and without the requirement of UV-light. Several pigments with different color changes are available right now. In addition to this visual detectable feature, the photochromism, the proteins amino acid sequence can be genetically altered in order to code and identify specific production lots. For advanced applications the data storage capability of bacteriorhodopsin will be useful. Write-once-read-many (WORM) recording of digital data is accomplished by laser excitation of printed bacteriorhodopsin inks. A density of 1 MBit per square inch is currently achieved. Several application examples for this biological molecule are described where low and high level features are used in combination. Bacteriorhodopsin-based inks are a new class of optical security pigments.

Hampp, Norbert A.; Fischer, Thorsten; Neebe, Martin

2002-04-01

406

Application of the JDL data fusion process model for cyber security  

NASA Astrophysics Data System (ADS)

A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

Giacobe, Nicklaus A.

2010-04-01

407

Exploring client logs towards characterizing the user behavior on web applications  

NASA Astrophysics Data System (ADS)

Analysis of user interaction with computer systems can be used for several purposes, the most common being analysis of the effectiveness of the interfaces used for interaction (in order to adapt or enhance its usefulness) and analysis of intention and behavior of the users when interacting with these systems. For web applications, often the analysis of user interaction is done using the web server logs collected for every document sent to the user in response to his/her request. In order to capture more detailed data on the users' interaction with sites, one could collect actions the user performs in the client side. An effective approach to this is the USABILICS system, which also allows the definition and analysis of tasks in web applications. The fine granularity of logs collected by USABILICS allows a much more detailed log of users' interaction with a web application. These logs can be converted into graphs where vertices are users' actions and edges are paths made by the user to accomplish a task. Graph analysis and visualization tools and techniques allow the analysis of actions taken in relation to an expected action path, or characterization of common (and uncommon) paths on the interaction with the application. This paper describes how to estimate users' behavior and characterize their intentions during interaction with a web application, presents the analysis and visualization tools on those graphs and shows some practical results with an educational site, commenting on the results and implications of the possibilities of using these techniques.

Guarino de Vasconcelos, Leandro; Coelho dos Santos, Rafael D.; Baldochi, Laercio A.

2013-05-01

408

AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications  

Microsoft Academic Search

The rise of the software-as-a-service paradigm has led to the development of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications have become larger and more complex, web application developers today have little visibility into the end-to-end behavior of their systems. This paper presents AjaxScope, a dynamic instrumentation platform that enables cross-user monitoring and just-in-time

Emre Kiciman; Benjamin Livshits

2007-01-01

409

AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications  

Microsoft Academic Search

The rise of the software-as-a-service paradigm has led to the de- velopment of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications have become larger and more complex, web application developers today have little visibility into the end-to-end behavior of their systems. This pa- per presents AjaxScope, a dynamic instrumentation platform that enables cross-user monitoring

Emre Kiciman; V. Benjamin Livshits

2007-01-01

410

Optimizing the Replication of Multi-Quality Web Applications Using ACO and WoLF.  

National Technical Information Service (NTIS)

This thesis presents the adaptation of Ant Colony Optimization to a new NP-hard problem involving the replication of multi-quality database-driven web applications (DAs) by a large application service provider (ASP). The ASP must assign DA replicas to its...

J. C. Dressler

2006-01-01

411

Using reinforcement learning for controlling an elastic web application hosting platform  

Microsoft Academic Search

In this paper, we propose and implement a control mechanism that interfaces with Infrastructure as a Service (IaaS) or cloud providers to provision resources and manage instances of web applications in response to volatile and complex request patterns. We use reinforcement learning to orchestrate control actions such as provisioning servers and application placement to meet performance requirements and minimize ongoing

Han Li; Srikumar Venugopal

2011-01-01

412

Thema: Byzantine-Fault-Tolerant Middleware forWeb-Service Applications  

Microsoft Academic Search

Distributed applications composed of collections of Web Services may call for diverse levels of reliability in differ- ent parts of the system. Byzantine fault tolerance (BFT) is a general strategy that has recently been shown to be prac- tical for the development of certain classes of survivable, client-server, distributed applications; however, little re- search has been done on incorporating it

Michael G. Merideth; Arun Iyengar; Thomas A. Mikalsen; Stefan Tai; Isabelle Rouvellou; Priya Narasimhan

2005-01-01

413

Learning new Methodologies to Deal with Large Disasters: Multi Sensor Web System for Natural Hazard Applications  

Microsoft Academic Search

The Mutisensor Sensor Web System (MSWS) consists of a portable and widely applicable technology to advance the knowledge and practical use of remote sensing for Natural hazard applications and to maximize the use and sharing of NASA satellite observations. The initial prototype was proposed for monitoring the earthquake hazard. The rationale for using MSWS is that there are insufficient spatial

Dimitar Ouzounov; Guido Cervone; Shahid Habib; Sergey Pulinets

2008-01-01

414

A Web Application Dedicated to Online Practical Activities: The Case of System and Network Experiments  

Microsoft Academic Search

In this paper, we describe a web application composed of a set of tools and graphical user interfaces. This application aims at simplifying learning design and enhancing effective learning of distant lab work activities, in the field of computer education. This work is based on the educational concepts of the social constructivism theory, which focuses on the crucial role of

Amine Bouabid; Philippe Vidal; Julien Broisin

2011-01-01

415

Protecting a Multiuser Web Application against Online Password-Guessing Attacks  

Microsoft Academic Search

This white paper presents a method for protecting a Web application against online password-guessing attacks. A user logs in with three credentials: the name of the application instance, a user ID, and a password, where the instance name is a secret known only to the instance users, the user ID is a secret kwnon only to the instance administrators, and

Francisco Corella

416

Visualizing Energy Data Using Web-Based Applications  

NASA Astrophysics Data System (ADS)

I will demonstrate a series of web-based visualizations of domestic state-level and international country-level energy statistics. The time-series energy consumption and production data sets are from the International Energy Agency (IEA) and the United States Department of Energy's Energy Information Administration (EIA). I will demonstrate the capabilities of existing web-based community data analysis sites, such as Swivel.com and IBM's Many-Eyes.com, as well as the capabilities of embeddable visualization gadgets, such as the Gapminder-inspired Motion Charts created by Google. These tools will allow students and the public to interactively explore relationships and trends of energy consumption and production. These visualizations will be particularly useful in exploring energy statistics that are traditionally presented in a multitude of competing units. The tools will also be useful for students in inquiry-based learning programs.

Vermylen, J. P.

2008-12-01

417

Conceptual Modeling of Device-Independent Web Applications  

Microsoft Academic Search

PresentationDiagram" section).7. Other implementations: Adapt the observerpattern11to hypermedia environments.Navigational access diagramFor a more general perspective of the approach,we'll use a discussion list management system as anexample. As a basic explanation (for reasons ofbrevity), we assume the list manager system containsseveral discussion lists dealing with differentWeb technology topics, and the system forms eachlist by a set of hierarchically ordered messages...

Jaime Gómez; Cristina Cachero; Oscar Pastor

2001-01-01

418

76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...  

Federal Register 2010, 2011, 2012, 2013

...1974; Department of Homeland Security/ALL--032 Official Passport Application and...Department of Homeland Security/ ALL--032 Official Passport Application and...Washington, DC 20528. Instructions: All submissions received must include the...

2011-02-15

419

Security  

ERIC Educational Resources Information Center

|Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

Technology & Learning, 2008

2008-01-01

420

Defense and homeland security applications of multi-agent simulations  

Microsoft Academic Search

Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to exam- ine national security issues. This paper summarizes three MAS national security studies conducted at the Naval Post- graduate School. The first example explores equipment and employment options for protecting critical infrastructure. The second case considers non-lethal weapons within the spectrum of force-protection options in a

Thomas W. Lucas; Susan M. Sanchez; Felix Martinez; Lisa R. Sickinger; Jonathan W. Roginski

2007-01-01

421

Overcoming Channel Bandwidth Constraints in Secure SIM Applications  

Microsoft Academic Search

In this paper we present an architecture based on a Java (J2SE, J2EE, J2ME and Java Card) platform supporting a secure channel from a Mobile Operator to the SIM card. This channel offers the possibility of end to end security for delivery of large data files to a GSM SIM card. Such a secure channel could be used for delivery

John A. Macdonald; William G. Sirett; Chris J. Mitchell

2005-01-01

422

Secure authentication protocol for Internet applications over CATV network  

NASA Astrophysics Data System (ADS)

An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

Chin, Le-Pond

1998-02-01

423

WebCIS: large scale deployment of a Web-based clinical information system.  

PubMed

WebCIS is a Web-based clinical information system. It sits atop the existing Columbia University clinical information system architecture, which includes a clinical repository, the Medical Entities Dictionary, an HL7 interface engine, and an Arden Syntax based clinical event monitor. WebCIS security features include authentication with secure tokens, authorization maintained in an LDAP server, SSL encryption, permanent audit logs, and application time outs. WebCIS is currently used by 810 physicians at the Columbia-Presbyterian center of New York Presbyterian Healthcare to review and enter data into the electronic medical record. Current deployment challenges include maintaining adequate database performance despite complex queries, replacing large numbers of computers that cannot run modern Web browsers, and training users that have never logged onto the Web. Although the raised expectations and higher goals have increased deployment costs, the end result is a far more functional, far more available system. PMID:10566471

Hripcsak, G; Cimino, J J; Sengupta, S

1999-01-01

424

Applicability of Army Automation Security Guidance to Local Area Computer Network Security.  

National Technical Information Service (NTIS)

The U.S. Army Combat Developments Experimentation Center (USACDEC) Directorate of Information Management (DIM), Fort Ord, is currently involved with several network implementations, all at various stages of development, and wants adequate network security...

J. D. Ayres

1987-01-01

425

SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization  

Microsoft Academic Search

\\u000a An application information system (IS) of public or private organization should be developed securely and cost-effectively\\u000a by using security engineering and software engineering technologies, as well as a security requirement specification (SRS).\\u000a We present a SRS-Process that is a development process for SRS of IS, and a SRS-Tool that is a development tool for SRS in\\u000a accordance with the SRS-Process.

Sang-soo Choi; Soo-young Chae; Gang-soo Lee

2005-01-01

426

SEAL: A secure communication library for building dynamic group key agreement applications  

Microsoft Academic Search

We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms that allow a communication group to periodically renew a common secret group key for secure and private communication. The group key agreement protocols satisfy several important characteristics: distributed property (i.e., no centralized key server is needed), collaborative

Patrick P. C. Lee; John C. S. Lui; David K. Y. Yau

2007-01-01

427

The application of data mining technology in the quality and security of agricultural products  

NASA Astrophysics Data System (ADS)

The quality and security of agricultural products is the hot issue with public attention in China and also one of the issues that Chinese government attaches great importance to. This paper describes the principle of data mining technology and based on the environmental information data of agricultural production and the quality-security testing data of agricultural products, analyses the application of data mining technology in the quality and security of agricultural products.

Li, Huaqin; Luo, Ying

428

Laser-induced breakdown spectroscopy in industrial and security applications  

SciTech Connect

Laser-induced breakdown spectroscopy (LIBS) offers rapid, localized chemical analysis of solid or liquid materials with high spatial resolution in lateral and depth profiling, without the need for sample preparation. Principal component analysis and partial least squares algorithms were applied to identify a variety of complex organic and inorganic samples. This work illustrates how LIBS analyzers can answer a multitude of real-world needs for rapid analysis, such as determination of lead in paint and children's toys, analysis of electronic and solder materials, quality control of fiberglass panels, discrimination of coffee beans from different vendors, and identification of generic versus brand-name drugs. Lateral and depth profiling was performed on children's toys and paint layers. Traditional one-element calibration or multivariate chemometric procedures were applied for elemental quantification, from single laser shot determination of metal traces at {approx}10 {mu}g/g to determination of halogens at 90 {mu}g/g using 50-shot spectral accumulation. The effectiveness of LIBS for security applications was demonstrated in the field by testing the 50-m standoff LIBS rasterizing detector.

Bol'shakov, Alexander A.; Yoo, Jong H.; Liu Chunyi; Plumer, John R.; Russo, Richard E.

2010-05-01

429

Ultra Wideband (UWB) communication vulnerability for security applications  

Microsoft Academic Search

RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth

Cooley; H. Timothy

2010-01-01

430

Secure positioning of wireless devices with application to sensor networks  

Microsoft Academic Search

So far, the problem of positioning in wireless net- works has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call Verifiable Multilateration. We then show how this mechanism can be used to secure

Srdjan Capkun; Jean-pierre Hubaux

2005-01-01

431

Hidden object detection: security applications of terahertz technology  

Microsoft Academic Search

Recent events have led to dramatic changes to the methods employed in security screening. For example, following the failed shoe bombing, it is now common for shoes to be removed and X-rayed at airport checkpoints. There is therefore an increasing focus on new Recent events have led to dramatic changes to the methods employed in security screening. For example, following

William R. Tribe; David A. Newnham; Philip F. Taday; Michael C. Kemp

2004-01-01

432

Applications, Denials, and Appeals for Social Security Disability Insurance  

Microsoft Academic Search

This project explores the process by which older workers apply for, and are awarded, Social Security Disability Insurance (DI) benefits. Our focus is on how and whether DI serves as a path out of the labor market at older ages. This research is important to the extent that proposals to raise the early retirement age under Social Security alter the

Olivia S. Mitchell; John W. R. Phillips

2002-01-01

433

Hidden object detection: security applications of terahertz technology  

Microsoft Academic Search

Recent events have led to dramatic changes to the methods employed in security screening. For example, following the failed shoe bombing, it is now common for shoes to be removed and X-rayed at airport checkpoints. There is therefore an increasing focus on new technologies that can be applied to security screening, either to simplify or speed up the checking process,

William R. Tribe; David A. Newnham; Philip F. Taday; Michael C. Kemp

434

Skyalert: A Web Application to Manage Astronomical Transients  

NASA Astrophysics Data System (ADS)

Skyalert.org is a web-based management system for collecting and disseminating observations about time-critical astronomical transients, and for adding annotations and intelligent machine-learning to those observations. The information is "pushed” to subscribers, who may be either humans (email, text message etc) or they may be machines that control telescopes. Subscribers can prepare precise "trigger rules” to decide which events should reach them and their robots, rules that may be based on sky position, or on the specific vocabulary of parameters that define a particular type of event. Each event has its own web page updated immediately when new information comes, with long-lived URLs and wiki capability. The subscriber has an account on the web, and builds the trigger-rules and watch-lists there, defining decision criteria about future events. As soon as the transient event is seen and causes trigger, a message can be pushed to the subscriber, email, IM, text-message, etc. Annotations can be fetched automatically and immediately from the archives, such as SDSS, DSS, NED, Simbad, or other Virtual Observatory resources. Other actions upon event arrival include immediate running of data mining or classification modules, based on the event and past data. Skyalert can also drive robotic telescopes through the HTN and dc3.org schedulers; it can evaluate joint trigger rules such as "magnitude difference from SDSS". Skyalert is a component system allowing pluggable custom data mining modules, distributed intelligence, and a central point of information for each transient. Our twin thrusts are automation of process, and discrimination of interesting events.

Graham, Matthew; Williams, R. D.; Djorgovski, S. D.; Drake, A. J.; Mahabal, A.

2009-05-01

435

MAGDA and MAGNATE: Secure Web-Based Data Distribution and Visualization for the Cassini Magnetometer  

Microsoft Academic Search

The measurements of Saturn's magnetic field acquired by the Cassini magnetometer (MAG) to date have provided the basis of numerous pioneering scientific studies of the planet's magnetic and plasma environs. MAG data is essential for, among other applications, understanding the nature of the particle distributions observed by the plasma instruments onboard Cassini. In order to facilitate interaction and collaboration between

T. Seears; N. Achilleos; S. Kellock; P. Slootweg; M. Dougherty

2006-01-01

436

ICOMC: Invocation Complexity Of Multi-Language Clients for Classified Web Services and its Impact on Large Scale SOA Applications  

Microsoft Academic Search

Theoretically, multi-language clients invocating web services is no longer a problem due to XML-based interface descriptions by WSDL, but the reality is not so good. Some implementation level difficulties still exist when invoking web services from clients in different programming languages. These difficulties are caused by involving complex data structures in the service interface, carrying additional information such as WS-security

Xiaoyi Lu; Yongqiang Zou; Fei Xiong; Jian Lin; Li Zha

2009-01-01

437

Compact, rugged, and intuitive thermal imaging cameras for homeland security and law enforcement applications  

Microsoft Academic Search

Low cost, small size, low power uncooled thermal imaging sensors have completely changed the way the world views commercial law enforcement and military applications. Key applications include security, medical, automotive, power generation monitoring, manufacturing and process control, aerospace application, defense, environmental and resource monitoring, maintenance monitoring and night vision. Commercial applications also include law enforcement and military special operations. Each

Charles M. Hanson

2005-01-01

438

Web-Enabled Systems for Student Access.  

ERIC Educational Resources Information Center

|California State University, Fullerton is developing a suite of server-based, Web-enabled applications that distribute the functionality of its student information system software to external customers without modifying the mainframe applications or databases. The cost-effective, secure, and rapidly deployable business solution involves using the…

Harris, Chad S.; Herring, Tom

1999-01-01

439

Enabling adaptation of J2EE applications using components, web services and aspects  

Microsoft Academic Search

This paper presents an architecture framework, the Adaptive Server Framework (ASF) to facilitate the development of adaptive behavior for legacy server applications. ASF is devised on top of J2EE application servers and integrates components, web services and aspects to enable adaptation of J2EE-based applications. The principle behind ASF is the clear separation between the implementation of adaptive behavior and the

Yan Liu

2006-01-01

440

Model-Driven Development of Audio-Visual Web Search Applications: The PHAROS Demonstration  

Microsoft Academic Search

PHAROS is an EU-founded project aimed at building a platform for advanced audiovisual search applications. In this demo we\\u000a show the application of a Model-Driven Development (MDD) approach to the PHAROS demonstrator, which consists of an audio-visual\\u000a Web search portal. The demo highlights the peculiar needs of search based applications and describes how existing MDD approaches\\u000a can help fulfilling such

Alessandro Bozzon; Marco Brambilla; Piero Fraternali

2009-01-01

441

An Environment for Web-based Interaction and Steering of High-Performance Scientific Applications  

Microsoft Academic Search

This paper presents an environment for Web-based interrogation, interaction and steering of high-performance parallel\\/distributed scientific applications. The architecture is composed of detachable thin-clients at the front-end, a netwo rk of Java interaction servers in the middle, and (a control network of sensors, actuators, interaction agents, and an application interaction proxy, superimposed on the application data-network, at the back-end. A key

Samian Kaur; Rajeev Muralidhar; Manish Parashar

2000-01-01

442

An Architecture for Web-Based Interaction and Steering of Adaptive Parallel\\/Distributed Applications  

Microsoft Academic Search

This paper presents an environment for Web-based interaction and steering of adaptive parallel\\/distributed scientific applications. The architecture is composed of detachable thin-clients at the front-end, a network of Java interaction servers i n the middle, and a control network of sensors, actuators, interaction agents, and an application interaction proxy, superimposed on the application data-network, at the back-end. There are three

Rajeev Muralidhar; Samian Kaur; Manish Parashar

2000-01-01

443

Integrated Web-Based Access to and use of Satellite Remote Sensing Data for Improved Decision Making in Hydrologic Applications  

NASA Astrophysics Data System (ADS)

Using NASA satellite remote sensing data from multiple sources for hydrologic applications can be a daunting task and requires a detailed understanding of the data's internal structure and physical implementation. Gaining this understanding and applying it to data reduction is a time-consuming task that must be undertaken before the core investigation can begin. In order to facilitate such investigations, the NASA Goddard Earth Sciences Data and Information Services Center (GES DISC) has developed the GES-DISC Interactive Online Visualization ANd aNalysis Infrastructure or "Giovanni," which supports a family of Web interfaces (instances) that allow users to perform interactive visualization and analysis online without downloading any data. Two such Giovanni instances are particularly relevant to hydrologic applications: the Tropical Rainfall Measuring Mission (TRMM) Online Visualization and Analysis System (TOVAS) and the Agricultural Online Visualization and Analysis System (AOVAS), both highly popular and widely used for a variety of applications, including those related to several NASA Applications of National Priority, such as Agricultural Efficiency, Disaster Management, Ecological Forecasting, Homeland Security, and Public Health. Dynamic, context- sensitive Web services provided by TOVAS and AOVAS enable users to seamlessly access NASA data from within, and deeply integrate the data into, their local client environments. One example is between TOVAS and Florida International University's TerraFly, a Web-enabled system that serves a broad segment of the research and applications community, by facilitating access to various textual, remotely sensed, and vector data. Another example is between AOVAS and the U.S. Department of Agriculture Foreign Agricultural Service (USDA FAS)'s Crop Explorer, the primary decision support tool used by FAS to monitor the production, supply, and demand of agricultural commodities worldwide. AOVAS is also part of GES DISC's Agricultural Information System (AIS), which can operationally provide satellite remote sensing data products (e.g., near- real-time rainfall) and analysis services to agricultural users. AIS enables the remote, interoperable access to distributed data, by using the GrADS-Data Server (GDS) and the Open Geospatial Consortium (OGC)- compliant MapServer. The latter allows the access of AIS data from any OGC-compliant client, such as the Earth-Sun System Gateway (ESG) or Google Earth. The Giovanni system is evolving towards a Service- Oriented Architecture and is highly customizable (e.g., adding new products or services), thus availing the hydrologic applications user community of Giovanni's simple-to-use and powerful capabilities to improve decision-making.

Teng, W.; Chiu, L.; Kempler, S.; Liu, Z.; Nadeau, D.; Rui, H.

2006-12-01

444

Security for real-time MPEG compressed video in distributed multimedia applications  

Microsoft Academic Search

Emerging computer network technologies promise to provide distributed multimedia in real-time. Security of real-time video, an important component of distributed multimedia applications, is increasingly becoming one of the major concerns of the computer networking community. This study presents Aegis, a security system for Motion Picture Experts Group (MPEG) compressed video transmissions. Aegis utilizes the concepts of the MPEG video compression

G. A. Spanos; Tracy Bradley Maples

1996-01-01

445

Active Millimeter-Wave and Sub-Millimeter-Wave Imaging for Security Applications  

SciTech Connect

Active imaging at millimeter and sub-millimeter wavelengths has been developed for security applications including concealed weapon detection. The physical properties that affect imaging performance are discussed along with a review of the current state-of-the-art and future potential for security imaging systems.

Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

2011-09-02

446

Filtergraph: A Flexible Web Application for Instant Data Visualization of Astronomy Datasets  

NASA Astrophysics Data System (ADS)

Filtergraph is a web application being developed by the Vanderbilt Initiative in Data-intensive Astrophysics (VIDA) to flexibly handle a large variety of astronomy datasets. While current datasets at Vanderbilt are being used to search for eclipsing binaries and extrasolar planets, this system can be easily reconfigured for a wide variety of data sources. The user loads a flat-file dataset into Filtergraph which instantly generates an interactive data portal that can be easily shared with others. From this portal, the user can immediately generate scatter plots, histograms, and tables based on the dataset. Key features of the portal include the ability to filter the data in real time through user-specified criteria, the ability to select data by dragging on the screen, and the ability to perform arithmetic operations on the data in real time. The application is being optimized for speed in the context of very large datasets: for instance, plot generated from a stellar database of 3.1 million entries render in less than 2 seconds on a standard web server platform. This web application has been created using the Web2py web framework based on the Python programming language.

Burger, D.; Stassun, K. G.; Pepper, J. A.; Siverd, R. J.; Paegert, M. A.; De Lee, N. M.

2013-10-01

447

AMBIT RESTful web services: an implementation of the OpenTox application programming interface.  

PubMed

The AMBIT web services package is one of the several existing independent implementations of the OpenTox Application Programming Interface and is built according to the principles of the Representational State Transfer (REST) architecture. The Open Source Predictive Toxicology Framework, developed by the partners in the EC FP7 OpenTox project, aims at providing a unified access to toxicity data and predictive models, as well as validation procedures. This is achieved by i) an information model, based on a common OWL-DL ontology ii) links to related ontologies; iii) data and algorithms, available through a standardized REST web services interface, where every compound, data set or predictive method has a unique web address, used to retrieve its Resource Description Framework (RDF) representation, or initiate the associated calculations.The AMBIT web services package has been developed as an extension of AMBIT modules, adding the ability to create (Quantitative) Structure-Activity Relationship (QSAR) models and providing an OpenTox API compliant interface. The representation of data and processing resources in W3C Resource Description Framework facilitates integrating the resources as Linked Data. By uploading datasets with chemical structures and arbitrary set of properties, they become automatically available online in several formats. The services provide unified interfaces to several descriptor calculation, machine learning and similarity searching algorithms, as well as to applicability domain and toxicity prediction models. All Toxtree modules for predicting the toxicological hazard of chemical compounds are also integrated within this package. The complexity and diversity of the processing is reduced to the simple paradigm "read data from a web address, perform processing, write to a web address". The online service allows to easily run predictions, without installing any software, as well to share online datasets and models. The downloadable web application allows researchers to setup an arbitrary number of service instances for specific purposes and at suitable locations. These services could be used as a distributed framework for processing of resource-intensive tasks and data sharing or in a fully independent way, according to the specific needs. The advantage of exposing the functionality via the OpenTox API is seamless interoperability, not only within a single web application, but also in a network of distributed services. Last, but not least, the services provide a basis for building web mashups, end user applications with friendly GUIs, as well as embedding the functionalities in existing workflow systems. PMID:21575202

Jeliazkova, Nina; Jeliazkov, Vedrin

2011-05-16

448

How secure is the Internet for healthcare applications?  

PubMed

The Internet has grown faster than any other communications medium or consumer electronics technology--including the fax machine and personal computer. It offers new possibilities for providing economical and good quality patient care, but how secure is it? Is it prudent to communicate patient information over the Internet? For confidential patient information to be transmitted appropriately on the Internet, the originator must be clearly identified without any chance of impersonation; the information must be transmitted without any possibility of corruption or alteration; and the process must be secure. Many experts recognize the need to secure privacy of information, and there are some standards for electronic signatures and data encryption. However, no one has yet come up with a plan that offers a comprehensive solution. Appropriate confidentiality and security legislation has not yet been passed by the U.S. Congress. The following security technologies are currently available and are described in this article: cryptography, authentication devices, electronic signature systems, firewalls, secure hypertext transfer protocol and secure sockets layer protocol. Until proper standards are developed and accepted, providers should use available technologies to protect both patient records and themselves. The legal consequences of mishandling confidential patient information can be disastrous. PMID:10154332

Campbell, L A

449

Dynamic hosting management of web based applications over clouds  

Microsoft Academic Search

Dynamic Application Hosting Management (DAHM) allows clouds to dynamically host applications in data centers at different locations based on: (i) spatio-temporal variation of energy price, (ii) data center computing and cooling energy efficiency, (iii) Virtual Machine (VM) migration cost for the applications, and (iv) any SLA violations due to migration overhead or network delay. DAHM is complementary to dynamic workload

Zahra Abbasi; Tridib Mukherjee; Georgios Varsamopoulos; Sandeep K. S. Gupta

2011-01-01

450

A WebGIS system on the base of spatial data processing system for land application  

NASA Astrophysics Data System (ADS)

Traditional land management system based on PC has some shortages, such as bad openness and bad timeliness. And, it is hard to unify the criteria of data norm and database construction, easy to result in data redundancy. As a new development stage of GIS, WebGIS has perfectly solved the above-mentioned problems, so it is greatly meaningful to study digital land WebGIS. The system adopts GeoBeans6.5 as the platform which is developed by institute of remote sensing applications, CAS (Chinese Academy of Sciences). In addition, using ncgmec.jar component supplied by GeoBeans6.5, the system which is called "A WebGIS system on the base of spatial data processing system for land application" is developed under the support of IIS5.1 and java virtual machine. In the end, the main function of this system is demoed.

Wu, Dong; Wang, Qing; Wang, Huiqing; Wang, Zhijie

2009-12-01

451

GinisWeb - the tool for GIS applications development based on Web  

Microsoft Academic Search

The Internet is overwhelmed by a large variety of GIS applications. Very often, it is hard to find the information you need. There are all kinds of spatial information systems, some with large raster maps and sufficient information that needs time to load. On other hand, there are fast systems using vector data that can show a world to you

A. Stojanovic; L. Stoimenov; A. Dimitrijevic; S. Djordjevic-Kajan

2000-01-01

452

The HNODC Management System: A Geospatial Web Services Application  

NASA Astrophysics Data System (ADS)

During the past fifteen years the Hellenic National Oceanographic Data Centre (HNODC) through its participation in several national and international projects has obtained a large archive of more than 300.000 observational in-situ stations of physical, chemical and biological parameters. For the efficient management and exploitation of these data a multidisciplinary oceanographic database has been developed using a relational database management system. All the information related to the data such as oceanographic cruises (ROSCOP), descriptions of environmental datasets (EDMED) and descriptions of monitoring systems (EDIOS) are also organized in relational databases compliant with internationally established standards for metadata and common vocabularies for data exchange as these are developed in the framework of the SeaDataNet Project (http://www.seadatanet.org). Both raw data and metadata are subjected to quality controls checks in conformity to ICES, IOC and EU recommendations. By exploiting the increasing capabilities of the Geospatial Web Services, HNODC has built a new integrated management system that follows the basic concepts of a Service Oriented Architecture (SOA). The main advantages of the new system are: a) inherit interoperability between data centers and data providers and this is an already ongoing implementation within SeaDataNet Project, b) interchange and combination of data sets with minimum programming efforts offering the capability of integration between oceanographic and other geospatial data (eg. land observations, satellite data, land networks, etc), c) production of comprehensive and self explained new data products combing various and diverse data sources and in the future version, WPS Services will be available in order to produce on demand "on-line" data products, and d) capability for end users to navigate through a wide range of information. The new system web interface is available at the address: http://hnodc.hcmr.gr/services.html.

Iona, S.; Lykiardopoulos, A.; Lakes, V.; Balopoulou, S.; Karagevrekis, P.; Batis, A.

2009-04-01

453

Intelligent Facial Recognition Systems: Technology advancements for security applications.  

National Technical Information Service (NTIS)

Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just cr...

C. L. Beer

1993-01-01

454

Modeling and Simulation of Incident Management for Homeland Security Applications.  

National Technical Information Service (NTIS)

Incident management models and simulations may be used to support analysis, planning, and training needs pertaining to terrorist attacks, national security events, natural and man-made disasters. Simulation models may be used to understand incident manage...

C. Hutchings C. McLean S. Jain Y. T. Lee

2011-01-01

455

Applicability of Visual Analytics to Defence and Security Operations.  

National Technical Information Service (NTIS)

In the context of modern defence and security operations, analysts are faced with a continuously growing set of information of different nature which causes significant information overload problems and prevent developing good situation awareness. Fortuna...

D. Gouin V. Lavigne

2011-01-01

456

Reviews of computing technology: Securing network applications, Kerberos and RSA  

SciTech Connect

This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

Johnson, S.M.

1992-06-01

457

Developing High Brightness Semiconductor Lasers for Homeland Security and Defense Applications  

Microsoft Academic Search

We present recent advances in high brightness, high power semiconductor lasers and their applications in homeland security and defense including countermeasures, bio-chemical agent detection, rangefinding, targeting, and directed energy weapons.

P. T. Rudy; M. L. Osowski; R. M. Lammert; S. W. Oh; C. Ocochlain; C. Panja; T. Stakelon; J. E. Ungar

2007-01-01

458

Developing high brightness semiconductor lasers for homeland security and defense applications  

Microsoft Academic Search

We present recent advances in high brightness, high power semiconductor lasers and their applications in homeland security and defense including countermeasures, bio-chemical agent detection, rangefinding, targeting, and directed energy weapons.

P. T. Rudy; M. L. Osowski; R. M. Lammert; S. W. Oh; C Ocochlain; C. Panja; T. Stakelon; J. E. Ungar

2007-01-01

459

Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue  

SciTech Connect

This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica.

Dreizler, Andreas; Fried, Alan; Gord, James R

2007-07-01

460

Beyond grid security  

NASA Astrophysics Data System (ADS)

While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

Hoeft, B.; Epting, U.; Koenig, T.

2008-07-01

461

A Classification of Web Adaptivity: Tailoring Content and Navigational Systems of Advanced Web Applications  

Microsoft Academic Search

All texts and, more specifically, their electronically distributed variations are multimodally articulated, integrating language,\\u000a spatial arrangements, visual elements, and other semiotic modes [1]. Users usually have varying preferences regarding multimodal access representations or differing capacities to make use\\u000a of them [2]. The number of alternatives provided by paper-based media is inherently limited. Adaptive hypertext applications do not\\u000a share this limitation.

Arno Scharl

2001-01-01

462

Knowledge Sharing through a Simple Release Planning Method for Web Application Development  

Microsoft Academic Search

Web application development is - under circumstances such as a strong emphasis on time-to-market - charac- terised by the use of informal and ad-hoc development prac- tices and a lot of tacit knowledge. A recently proposed release planning method, that has been developed for the use in these environments, aims at bringing stakeholders to- gether to share their knowledge and

Sven Ziemer; Ilaria Canova Calori

2007-01-01

463

How to Measure and Evaluate Web Applications in a Consistent Way  

Microsoft Academic Search

In the present chapter we analyze the rationale to measure and evaluate software and web applications or products from different perspectives. First, we focus on the process for measurement and evalua- tion, i.e. the main technical activities that might be planned. Second, we discuss a measurement and evaluation framework that relies on a sound conceptual base. This framework so-called INCAMI

Luis Olsina; Fernanda Papa; Hernán Molina

464

A Role-Playing Virtual World for Web-Based Application Courses  

ERIC Educational Resources Information Center

With the rapid development of the information communication and technology (ICT) infrastructure in the Caribbean, there is an increasing demand for skilled software developers to meet the ICT needs of the region. Consequently, the web-based applications course offered at the University of the West Indies, has been redeveloped. One major part of…

Depradine, Colin

2007-01-01

465

Page replacement with multi-size pages and applications to Web caching  

Microsoft Academic Search

We consider the paging problem where the pages have varying size. This problem has applications to page replacement policies for caches containing World Wide Web documents. We consider two models for the cost of an algorithm on a request sequence. In this first, (the FAULT model) the goal is to minimize the number of page faults. In the second, (the

Sandy Irani

1997-01-01

466

Web Application System with Synthetic Aperture Rader Image Processing for Education  

Microsoft Academic Search

Remotely sensed images observed by synthetic aperture radar (SAR) become to be more significant for a variety of purposes. It is necessary to process and focus SAR images at a user's side for required precision. This paper presents a concept, a system structure, and an implementation method for a web application system with a SAR image processing for education. The

Yuuhei Teramoto; Yosuke Ito; Kenji Abe

2009-01-01

467

Learning Application Suite Creating and Playing SCORM Compatible Web and Computer Based Training  

Microsoft Academic Search

In the process of developing Web Based Training (WBT) applications, the Sharable Content Object Reference Model (SCORM) has become the most common eLearning standard making it possible to integrate eLearning objects from different sources in a common environment, but it is not intended to deliver offline Computer Based Training (CBT) on CD or DVD. CBT should also profit from the

Marco Nordmann; Jens Neumann

2008-01-01

468

A WEB-BASED APPLICATION FOR IDENTIFYING AND EVALUATING ALTERNATIVE PIPELINE ROUTES AND CORRIDORS  

Microsoft Academic Search

A.NET web-based application for siting pipelines is described that integrates a routing model for alternative route generation and hydraulic, cost and economic models that through an iterative process enable the user to rigorously evaluate route alternatives. The routing model identifies a project area, start and end points and then invokes one of three routing model levels depending on data availability

Joseph K. Berry; Michael D. King; Chuck Lopez

469

Building a Multi-Agent System for Automatic Negotiation in Web Service Applications  

Microsoft Academic Search

Within the last decade, much effort has been put into the development of standards and technologies that enable the integration of Internet applications and the interoperability of Web services. The ultimate goal of these initiatives is to increase the automation of business processes. However many challenges remain to be addressed in order to reach a high-level of automation in Internet-based

Ambroise Ncho; Esma Aimeur

2004-01-01

470

The bull's-eye: a framework for web application user interface design guidelines  

Microsoft Academic Search

A multi-leveled framework for user interface design guidelines of Web applications is presented. User interface design guidelines tend to provide information that is either too general, so that it is difficult to apply to a specific case, or too specific, so that a wide range of products is not supported. The framework presented is unique in that it provides a

Betsy Beier; Misha W. Vaughan

2003-01-01

471

SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud  

NASA Astrophysics Data System (ADS)

Current service-level agreements (SLAs) offered by cloud providers make guarantees about quality attributes such as availability. However, although one of the most important quality attributes from the perspective of the users of a cloud-based Web application is its response time, current SLAs do not guarantee response time. Satisfying a maximum average response time guarantee for Web applications is difficult due to unpredictable traffic patterns, but in this paper we show how it can be accomplished through dynamic resource allocation in a virtual Web farm. We present the design and implementation of a working prototype built on a EUCALYPTUS-based heterogeneous compute cloud that actively monitors the response time of each virtual machine assigned to the farm and adaptively scales up the application to satisfy a SLA promising a specific average response time. We demonstrate the feasibility of the approach in an experimental evaluation with a testbed cloud and a synthetic workload. Adaptive resource management has the potential to increase the usability of Web applications while maximizing resource utilization.

Iqbal, Waheed; Dailey, Matthew; Carrera, David

472

Towards a multilevel secure database management system for real-time applications  

Microsoft Academic Search

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. The paper addresses issues that must be investigated in order

Sang H. Son; Bhavani Thuraisingham

1993-01-01

473

Intelligent maritime security system with sensor networks for coastal environmental and homeland security applications  

Microsoft Academic Search

This paper proposes an innovative command and control system design and the use of low, cost distributed sensor networks for an intelligent maritime security system. This concept utilizes a network of small passive and active multi-phenomenological unattended sensors and shore based optical sensors to detect, classify, and track submerged threat objects approaching high value coastal assets, such as ports, harbors,

Edward M. Carapezza; Ann Bucklin

2007-01-01

474

Secure interoperation for effective data mining in border control and homeland security applications  

Microsoft Academic Search

Our NSF funded project aims at providing decision makers with the ability to extract and fuse information from multiple, hetertgeneous sources in response to a query while operating under a decentralized security administration. Our motivation comes from US Customs, which embarked on a major modernization initiative of its Information Technology systems. Drawing in data from Customs trade systems, targeting inspectors

Nabil R. Adam; Vijayalakshmi Atluri; Rey Koslowski; Robert Grossman; Vandana Pursnani Janeja; Janice Warner

2006-01-01

475

Educators' Perceived Importance of Web 2.0 Technology Applications  

ERIC Educational Resources Information Center

|This research study was designed to examine the degree of perceived importance of interactive technology applications among various groups of certified educators; the degree to which education professionals utilized interactive online technology applications and to determine if there was a significant difference between the different groups based…

Pritchett, Christal C.; Wohleb, Elisha C.; Pritchett, Christopher G.

2013-01-01

476

Designing an overload control strategy for secure e-commerce applications  

Microsoft Academic Search

Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload pre- vention in these applications is a critical issue. In this paper we present a complete characterization of secure e-commerce applications scalability to determine which are the bottlenecks in their performance that must be considered for an over- load control strategy. With this information, we design

Jordi Guitart; David Carrera; Vicenç Beltran; Jordi Torres; Eduard Ayguadé

2007-01-01

477

High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications  

Microsoft Academic Search

The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in

Madhavi Z Martin; Stan D Wullschleger; Arpad Alexander Vass; Rodger Carl Martin; Henri Grissino-Mayer

2006-01-01

478

The Growth in Applications for Social Security Disability Insurance: A Spillover Effect from Workers’ Compensation  

Microsoft Academic Search

We investigate the determinants of application for Social Security Disability Insurance (DI) benefits in approxi­mately 45 jurisdictions between 1981 and 1999. We reproduce findings of previous studies of the determinants of DI application then test the additional influence of changes to workers’ compensation program benefits and rules on DI application rates. Our findings indicate that the programs are interrelated: When

Xuguang Guo; John F. Burton

2012-01-01

479

Latest electro-optic and photonic devices for security and military applications  

NASA Astrophysics Data System (ADS)

This paper reveals performance capabilities of state-of-the-art electro-optic and photonic devices, which are best suited for security and defense system applications. These devices can be used in battlefield, space surveillance, medical diagnosis, and detection of terrorist activities. Performance capabilities of fiber optic components for possible applications in WDM and DWDM systems are summarized. Photonic devices for covert military and security communication applications are identified with particular emphasis on performance and reliability. Performance parameters of Erbium-doped fiber amplifiers (EDFAs), Erbium-doped waveguide amplifiers (EDWAs), and optical hybrid amplifiers (OHAs) comprising of EDFAs and Raman amplifiers are discussed with emphasis on bandwidth, gain-flatness, data handling capability, channel capacity and cost-effectiveness. Performance parameters of very long wavelength infrared (VLWIR) detectors are summarized, which have potential applications in remote sensing and ballistic missile defense applications. Electro-optic and photonic devices best suited for security and defense applications are identified.

Jha, A. R.

2006-10-01

480

The EarthScope Array Network Facility: application-driven low-latency web-based tools for accessing high-resolution multi-channel waveform data  

NASA Astrophysics Data System (ADS)

Since April 2004 the EarthScope USArray seismic network has grown to over 400 broadband stations that stream multi-channel data in near real-time to the Array Network Facility in San Diego. Providing secure, yet open, access to real-time and archived data for a broad range of audiences is best served by a series of platform agnostic low-latency web-based applications. We present a framework of tools that interface between the world wide web and Boulder Real Time Technologies Antelope Environmental Monitoring System data acquisition and archival software. These tools provide audiences ranging from network operators and geoscience researchers, to funding agencies and the general public, with comprehensive information about the experiment. This ranges from network-wide to station-specific metadata, state-of-health metrics, event detection rates, archival data and dynamic report generation over a stations two year life span. Leveraging open source web-site development frameworks for both the server side (Perl, Python and PHP) and client-side (Flickr, Google Maps/Earth and jQuery) facilitates the development of a robust extensible architecture that can be tailored on a per-user basis, with rapid prototyping and development that adheres to web-standards.

Newman, R. L.; Lindquist, K. G.; Clemesha, A.; Vernon, F. L.

2008-12-01

481

EpiCollect: Linking Smartphones to Web Applications for Epidemiology, Ecology and Community Data Collection  

PubMed Central

Background Epidemiologists and ecologists often collect data in the field and, on returning to their laboratory, enter their data into a database for further analysis. The recent introduction of mobile phones that utilise the open source Android operating system, and which include (among other features) both GPS and Google Maps, provide new opportunities for developing mobile phone applications, which in conjunction with web applications, allow two-way communication between field workers and their project databases. Methodology Here we describe a generic framework, consisting of mobile phone software, EpiCollect, and a web application located within www.spatialepidemiology.net. Data collected by multiple field workers can be submitted by phone, together with GPS data, to a common web database and can be displayed and analysed, along with previously collected data, using Google Maps (or Google Earth). Similarly, data from the web database can be requested and displayed on the mobile phone, again using Google Maps. Data filtering options allow the display of data submitted by the individual field workers or, for example, those data within certain values of a measured variable or a time period. Conclusions Data collection frameworks utilising mobile phones with data submission to and from central databases are widely applicable and can give a field worker similar display and analysis tools on their mobile phone that they would have if viewing the data in their laboratory via the web. We demonstrate their utility for epidemiological data collection and display, and briefly discuss their application in ecological and community data collection. Furthermore, such frameworks offer great potential for recruiting ‘citizen scientists’ to contribute data easily to central databases through their mobile phone.

Aanensen, David M.; Huntley, Derek M.; Feil, Edward J.; al-Own, Fada'a; Spratt, Brian G.

2009-01-01

482

3D Molecular Symmetry Shockwave; A Web Application for Interactive Visualization  

NSDL National Science Digital Library

3D Molecular Symmetry Shockwave is a Web-based application for interactive visualization and three-dimensional perception of molecular symmetry. The user interface is simple, and students learn how to use the program from the built-in help screens. The animation uses the Macromedia Shockwave browser plug-in, and requires a download of only 256 KB, allowing it to be used even with low bandwidth Internet connections. Its performance is comparable to a desktop application.

483

A Web Application to Support Telemedicine Services in Brazil  

PubMed Central

This paper describes a system that has been developed to support Telemedicine activities in Brazil, a country that has serious problems in the delivery of health services. The system is a part of the broader Tele-health Project that has been developed to make health services more accessible to the low-income population in the northeast region. The HealthNet system is based upon a pilot area that uses fetal and pediatric cardiology. This article describes both the system’s conceptual model, including the tele-diagnosis and second medical opinion services, as well as its architecture and development stages. The system model describes both collaborating tools used asynchronously, such as discussion forums, and synchronous tools, such as videoconference services. Web and free-of-charge tools are utilized for implementation, such as Java and MySQL database. Furthermore, an interface with Electronic Patient Record (EPR) systems using Extended Markup Language (XML) technology is also proposed. Finally, considerations concerning the development and implementation process are presented.

Barbosa, Ana Karina P.; de A. Novaes, Magdala; de Vasconcelos, Alexandre M. L.

2003-01-01

484

Contributions to Human Errors and Breaches in National Security Applications.  

SciTech Connect

Los Alamos National Laboratory has recognized that security infractions are often the consequence of various types of human errors (e.g., mistakes, lapses, slips) and/or breaches (i.e., deliberate deviations from policies or required procedures with no intention to bring about an adverse security consequence) and therefore has established an error reduction program based in part on the techniques used to mitigate hazard and accident potentials. One cornerstone of this program, definition of the situational and personal factors that increase the likelihood of employee errors and breaches, is detailed here. This information can be used retrospectively (as in accident investigations) to support and guide inquiries into security incidents or prospectively (as in hazard assessments) to guide efforts to reduce the likelihood of error/incident occurrence. Both approaches provide the foundation for targeted interventions to reduce the influence of these factors and for the formation of subsequent 'lessons learned.' Overall security is enhanced not only by reducing the inadvertent releases of classified information but also by reducing the security and safeguards resources devoted to them, thereby allowing these resources to be concentrated on acts of malevolence.

Pond, D. J. (Daniel J.); Houghton, F. K. (Florence Kay); Gilmore, W. E. (Walter E.)

2002-01-01

485

A design of usable and secure access-control APIs for mashup applications  

Microsoft Academic Search

Mashups, which are applications that are developed rapidly by combining multiple Web applications, are currently gathering much attention. One issue arising when creating mashups using data that is subject to access control is the difficulty in adding authentication and access control functions without losing the advantage of rapid development. We discuss the design and prototype implementation of an access control

Ryota Hashimoto; Nachi Ueno; Michio Shimomura

2009-01-01

486

Securing industry-wide EPCglobal Network with WS-Security  

Microsoft Academic Search

Purpose – To provide the secure web services framework in an environment designed to integrate RFID system into the EPCglobal Network. Design\\/methodology\\/approach – Utilizing web services helps maximize the value of information generated from RFID systems and, taking advantage of web services security (WSS) technology, to provide an XML-based abstraction layer for established security technologies that delivers confidentiality, integrity, authentication,

Dong-her Shih; Po-ling Sun; Binshan Lin

2005-01-01

487

Applications of omics for food safety and security  

Technology Transfer Automated Retrieval System (TEKTRAN)

Food safety and food security are important global issues. Research employing 'omics' technologies, including genomics, proteomics, and metabolomics, is helping to elucidate pathogen behavior at the molecular level and to develop better detection and typing systems. Omics-based tools enable resear...

488

Image fusion technology for security and surveillance applications  

Microsoft Academic Search

Image fusion technology offers a range of potential benefits to the security and surveillance community, including increased situational awareness and enhanced detection capabilities. This paper reports on how image fusion technology is being adapted from the military arena (in which it is generally found today) to provide a new and powerful asset in the fight against crime and terrorism. The

Tom Riley; Moira Smith

2006-01-01

489

Coherent millimeter-wave imaging for security applications  

Microsoft Academic Search

Homeland security today presents a major field for technology improvement and systems development. For instance body scanners, commonly operated at airports, are basically metal detectors and therefore are not able to detect other potential hazards like ceramics or explosives as well. In this context millimeter-wave (MMW) radar systems are a promising approach, because the radiation does not present a health

Alexander Dallinger; Sebastian Bertl; J. Detlefsen

2007-01-01