These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Web Applications and Security Web protocol overview  

E-print Network

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

2

Web application security Executive brief  

E-print Network

, two key trends have emerged in the secu- rity world: 1. Hackers are no longer attacking for pride increasingly become high-value targets for hackers. Since so many Web sites contain vulnerabilities, hackers

3

Architectures for Inlining Security Monitors in Web Applications  

E-print Network

policies to be enforced in web applications. This paper focuses on securing JavaScript code by inlining architectures for inlining security monitors for JavaScript: via browser extension, via web proxy, via suffix the modern browsing experience on the web. JavaScript enables dynamic and interactive web pages. Glued

Sabelfeld, Andrei

4

Web application security assessment by fault injection and behavior monitoring  

Microsoft Academic Search

As a large and complex application platform, the World Wide Web is capable of delivering a broad range of sophisticated applications. However, many Web applications go through rapid development phases with extremely short turnaround time, making it difficult to eliminate vulnerabilities. Here we analyze the design of Web application security assessment mechanisms in order to identify poor coding practices that

Yao-Wen Huang; Shih-Kun Huang; Tsung-Po Lin; Chung-Hung Tsai

2003-01-01

5

From client-side encryption to secure web applications  

E-print Network

This thesis presents an approach for designing secure web applications that use client-side encryption to keep user data private in the face of arbitrary web server compromises, as well as a set of tools, called CryptFrame, ...

Stark, Emily (Emily Margarete)

2013-01-01

6

Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2).  

E-print Network

Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2). Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices

Grishok, Alla

7

Securing web application code by static analysis and runtime protection  

Microsoft Academic Search

Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabilities have been attributed to Web application bugs. Many verification tools are discovering previously unknown vulnerabilities in legacy C programs, raising hopes that the same success can be achieved with Web applications. In this paper,

Yao-Wen Huang; Fang Yu; Christian Hang; Chung-Hung Tsai; Der-Tsai Lee; Sy-Yen Kuo

2004-01-01

8

A Security Architecture for Web 2.0 Applications  

Microsoft Academic Search

The problem of supporting the secure execution of potentially mali- cious third-party applications has received a considerable amount of attention in the past decade. In this paper we describe a security architecture for Web 2.0 applications that supports the flexible integration of a variety of advanced tech- nologies for such secure execution of applications, including run-time monitor- ing, static verification

Lieven Desmet; Wouter Joosen; Fabio Massacci; Katsiaryna Naliuka; Pieter Philippaerts; Frank Piessens; Ida Siahaan; Dries Vanoverberghe

2009-01-01

9

Web Application Security—Past, Present, and Future  

Microsoft Academic Search

Web application security remains a major roadblock to universal acceptance of the Web for many kinds of online transactions,\\u000a especially since the recent sharp increase in remotely exploitable vulnerabilities has been attributed to Web application\\u000a bugs. In software engineering, software testing is an established and well-researched process for improving software quality.\\u000a Recently, formal verification tools have also shown success in

Yao-Wen Huang; D. T. Lee

10

Simultaneous scalability and security for data-intensive web applications  

Microsoft Academic Search

For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches application data and supplies query answers on behalf of the application. Cost-effective DSSPs will need to cache data from many applications, inevitably raising concerns about security. However, if all data passing through a DSSP is

Amit Manjhi; Anastassia Ailamaki; Bruce M. Maggs; Todd C. Mowry; Christopher Olston; Anthony Tomasic

2006-01-01

11

Web-Based Training Applications in Safeguards and Security  

SciTech Connect

The U.S. Department of Energy (DOE) requires all employees who hold a security clearance and have access to classified information and/or special nuclear material to be trained in the area of Safeguards and Security. Since the advent of the World Wide Web, personnel who are responsible for training have capitalized on this communication medium to develop and deliver Web-based training. Unlike traditional computer based training where the student was required to find a workstation where the training program resided, one of Web-based training strongest advantage is that the training can be delivered right to the workers desk top computer. This paper will address reasons for the driving forces behind the utilization of Web-based training at the Laboratory with a brief explanation of the different types of training conducted. Also discussed briefly is the different types of distance learning used in conjunction with Web-based training. The implementation strategy will be addressed and how the Laboratory utilized a Web-Based Standards Committee to develop standards for Web-based training applications. Web-based problems resulting from little or no communication between training personnel across the Laboratory will be touched on and how this was solved. Also discussed is the development of a ''Virtual Training Center'' where personnel can shop on-line for their training needs. Web-based training programs within the Safeguards and Security arena will be briefly discussed. Specifically, Web-based training in the area of Materials Control and Accountability will be explored. A Web-based example of what a student would experience during a training session is also discussed. A short closing statement of what the future of Web-based Training holds in the future is offered.

Lopez, R.L.

1999-05-21

12

Anomaly detection using negative security model in web application  

Microsoft Academic Search

Today's combat zone for both ethical and unethical hackers is the web. Rapid growth of web sites and web applications gives way to deliver complex business applications through the web. As the web dependency increases, so do the web hacking activities. Web applications are normally written in scripting languages like JavaScript, PHP embedded in HTML allowing connectivity to the databases,

M. Auxilia; D. Tamilselvan

2010-01-01

13

Turning a Web 2.0 social network into a Web 3.0, distributed, and secured social web application  

Microsoft Academic Search

This demonstration presents the process of transforming a Web 2.0 centralized social network into a Web 3.0, distributed, and secured Social application, and what was learnt in this process. The initial Web 2.0 Social Network application was written by a group of students over a period of 4 months in the spring of 2011. It had all the bells and

Henry Story; Romain Blin; Julien Subercaze; Christophe Gravier; Pierre Maret

2012-01-01

14

Open, flexible and portable secure web-based health applications.  

PubMed

This paper presents a totally generic client-server model for accessing legacy and new databases according to the three tier architecture principles. It is based on an integrated environment that eases the dynamic creation and instantiation of secure web applications that access multiple database management systems. Emphasis is placed on the ability to query almost any type of relational database and queries can simultaneously address a multitude of data sources. The information is collected, assembled and presented to users depending on a possible set of user profiles. These profiles originate from work on securing the conduct of clinical studies. This has been achieved in the context of the EU funded project HARP (Harmonisation for the Security of Web Technologies and Applications). The generic character of the model is exploited through an accompanying set of development tools. This permits efficient and effective creation and maintenance of applications in several domains of health telematics and beyond. Main merit is the lightweight character of the resulting platform, whereby all necessary instantiations are accomplished through a set of related XML documents. PMID:15061523

Vlachos, Michael; Stassinopoulos, George

2003-01-01

15

Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms  

Microsoft Academic Search

Overload control mechanisms such as admission control and connection differentiation have proven effective for pre- venting overload of application servers running secure web applications. However, achieving optimal results in overload prevention is only possible when some kind of resource management is considered in addition to these mechanisms. In this paper we propose an overload control strategy for secure web applications

Jordi Guitart; David Carrera; Vicenç Beltran; Jordi Torres; Eduard Ayguadé

2008-01-01

16

Practical security for multi-user web application databases  

E-print Network

Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can ...

Redfield, Catherine M. S

2012-01-01

17

SBSQLID: Securing Web Applications with Service Based SQL Injection Detection  

Microsoft Academic Search

Vulnerability in web applications allows malicious users to obtain unrestricted access to private and confidential information. SQL injection is ranked at the top in web application attack mechanisms used by hackers to steal data from organizations. Hackers' can take advantages due to flawed design, improper coding practices, improper validations of user input, configuration errors, or other weaknesses in the infrastructure.

S. V. Shanmughaneethi; S. C. E. Shyni; S. Swamynathan

2009-01-01

18

Towards a Formal Foundation of Web Security  

Microsoft Academic Search

We propose a formal model of web security based on an abstraction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We identify three distinct threat models that can be used to analyze web applications, ranging from a web attacker who controls malicious web sites and clients, to stronger attackers

Devdatta Akhawe; Adam Barth; Peifung E. Lam; John C. Mitchell; Dawn Song

2010-01-01

19

Supporting secure programming in web applications through interactive static analysis.  

PubMed

Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

2014-07-01

20

Supporting secure programming in web applications through interactive static analysis  

PubMed Central

Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

2013-01-01

21

Teaching Web Security Using Portable Virtual Labs  

ERIC Educational Resources Information Center

We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

Chen, Li-Chiou; Tao, Lixin

2012-01-01

22

Security Lab Series Introduction to Web Technologies  

E-print Network

Security Lab Series Introduction to Web Technologies Prof. Lixin Tao Pace University http...........................................................................................................................................1 1.1 Web ArchitectureScript..................................................................................16 4.6 Creating Your First JavaServer Page Web Application

Tao, Lixin

23

January 2008 SECURE WEB SERVERS  

E-print Network

-44, Guidelines on Securing Public Web Servers, which focuses on the design, implementation, and operation, which focuses on the design, implementation, and operation of publicly accessible and secure Web serversJanuary 2008 SECURE WEB SERVERS: PROTECTING WEB SITES SECURE WEB SERVERS: PROTECTING WEB SITES

24

Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications  

Microsoft Academic Search

\\u000a While Java and PHP are two of the most popular languages for open source web applications found at \\u000a freshmeat.net\\u000a , Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is deserved.\\u000a We studied whether the variation in vulnerability density is greater between languages or between different applications written\\u000a in a single

James Walden; Maureen Doyle; Robert Lenhof; John Murray

2010-01-01

25

Security Analysis and Improvement Model for Web-based Applications  

E-print Network

user logins, remote IP addresses, and physical locations as subject credentials to combine with the requested objects and privilege modes. Access control algorithms are developed for subjects, objects, and access privileges. A secure implementation...

Wang, Yong

2010-01-14

26

To appear in Proceedings of the 16th USENIX Security Symposium (Security '07) SIF: Enforcing Confidentiality and Integrity in Web Applications  

E-print Network

and integrity information security policies. SIF web applications are written in Jif 3.0, an extended version). The enforcement mechanisms of SIF and Jif 3.0 track the flow of information within a web application applications, in exchange for trust in the servlet framework and the Jif 3.0 compiler--a good bargain be- cause

Myers, Andrew C.

27

Testing Web Applications  

Microsoft Academic Search

The rapid diffusion of Internet and open standard technologies is producing a significant growth of the demand of Web sites and Web applications with more and more strict requirements of usability, reliability, interoperability and security. While several methodological and technological proposals for developing Web applications are coining both from industry and academia, there is a general lack of methods and

Giuseppe Antonio Di Lucca; Anna Rita Fasolino; Francesco Faralli; Ugo De Carlini

2002-01-01

28

A Secure Web Application Providing Public Access to High-Performance Data Intensive Scientific Resources - ScalaBLAST Web Application  

SciTech Connect

This work presents the ScalaBLAST Web Application (SWA), a web based application implemented using the PHP script language, MySQL DBMS, and Apache web server under a GNU/Linux platform. SWA is an application built as part of the Data Intensive Computer for Complex Biological Systems (DICCBS) project at the Pacific Northwest National Laboratory (PNNL). SWA delivers accelerated throughput of bioinformatics analysis via high-performance computing through a convenient, easy-to-use web interface. This approach greatly enhances emerging fields of study in biology such as ontology-based homology, and multiple whole genome comparisons which, in the absence of a tool like SWA, require a heroic effort to overcome the computational bottleneck associated with genome analysis. The current version of SWA includes a user account management system, a web based user interface, and a backend process that generates the files necessary for the Internet scientific community to submit a ScalaBLAST parallel processing job on a dedicated cluster.

Curtis, Darren S.; Peterson, Elena S.; Oehmen, Chris S.

2008-05-04

29

Secure Web Access Control Algorithm  

Microsoft Academic Search

The paper presents a flexible and efficient method to secure the access to a Web site implemented in PHP script language. The algorithm is based on the PHP's session mechanism. The proposed method is a general one and offers the possibility to implement a PHP based secured access to a Web site, through a portal page and using an additional

Filip Ioan; Szeidert Iosif; Vasar Cristian

30

Web services and web service security standards  

Microsoft Academic Search

This paper provides a short introduction to basic web services concepts and describes in greater detail the various specifications related to reliability, transactions and in particular security which are referred to as the Microsoft\\/IBM WS-* family of specifications. The authors were not involved in the development and specification of the family of WS-* specs described in this paper.

Christian Geuer-Pollmann; Joris Claessens

2005-01-01

31

OMash: Enabling Secure Web Mashups via Object Abstractions  

E-print Network

.6 [Operating Systems]: Security and Protection General Terms Design, Languages, Security. Keywords Web, browser, and discussion boards. The rise of AJAX (Asynchronous JavaScript and XML) style web applications has given a public API [3] so that web developers can use Google's service to create hybrid websites, such as Housing

Chen, Hao

32

Gordon and Mike's ICT Podcast: Flat World Strategies: Web 2.0 Application Security Threats  

NSDL National Science Digital Library

Gordon and Mike's ICT Podcast offers perspectives on the information and communication technologies (ICT) industries from Gordon Snyder and Mike Qaissaunee. In this podcast, Mike and Gordon discuss the vulnerabilities of Web 2.0 technologies by examining the seven threats identified by security experts at SPI Dynamics, Inc. The running time for this show is 23:26.This podcast is available for direct download in mp3 format from the Libsyn site, or click here to subscribe to the whole series in iTunes.

Qaissaunee, Michael

33

Subspace: Secure Cross-Domain Communication for Web Mashups  

E-print Network

for web mashups. Categories and Subject Descriptors K.6.5 [Management of Computing and Information Systems control, trust, web services, same origin policy 1. INTRODUCTION A mashup is a website or web applicationSubspace: Secure Cross-Domain Communication for Web Mashups Collin Jackson Stanford University

Hunt, Galen

34

IT Security: Target: The Web  

ERIC Educational Resources Information Center

In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…

Waters, John K.

2009-01-01

35

Web Analytics for Security Informatics  

E-print Network

An enormous volume of security-relevant information is present on the Web, for instance in the content produced each day by millions of bloggers worldwide, but discovering and making sense of these data is very challenging. This paper considers the problem of exploring and analyzing the Web to realize three fundamental objectives: 1.) security relevant information discovery; 2.) target situational awareness, typically by making (near) real-time inferences concerning events and activities from available observations; and 3.) predictive analysis, to include providing early warning for crises and forming predictions regarding likely outcomes of emerging issues and contemplated interventions. The proposed approach involves collecting and integrating three types of Web data, textual, relational, and temporal, to perform assessments and generate insights that would be difficult or impossible to obtain using standard methods. We demonstrate the efficacy of the framework by summarizing a number of successful real-wor...

Glass, Kristin

2013-01-01

36

web identity application sectioneleven  

E-print Network

web identity application sectioneleven 99 contents elements of webpage design......................................................................... 100-101 web development and design considerations web banners is required for all official UCSF webpages. This banner includes a required link

Derisi, Joseph

37

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon  

E-print Network

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon A DISSERTATION in Computer and Information Science #12;FOUNDATIONS OF WEB SCRIPT SECURITY COPYRIGHT 2012 Aaron Bohannon #12;Acknowledgements applying reactive noninterference to web browsers. Before I started the final phase of my thesis research

Plotkin, Joshua B.

38

Web Development Evolution: The Assimilation of Web Engineering Security  

Microsoft Academic Search

In today's e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues. Analyzing the underlying causes of these security breaches shows that a significant proportion of them are caused by straightforward design errors in systems and not by failures in security mechanisms. There is significant research into security

William Bradley Glisson; Ray Welland

2005-01-01

39

Introducing Web Application Development  

E-print Network

Introducing Web Application Development Instructor: Dr Wei Ding Development Instructor: Dr.Wei Ding Fall 2009 1CS 437/637 Database-BackedWeb Sites andWeb Services Introduction: Internet vs. World Wide Web Internet is an interconnected network of thousands ofInternet is an interconnected network

Ding, Wei

40

Security for Web-Based Tests.  

ERIC Educational Resources Information Center

The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…

Shermis, Mark D.; Averitt, Jason

41

Multi-Layered Defense against Web Application Attacks  

Microsoft Academic Search

Web application security is the hottest issue in the present scenario of e-business environment. Web application attacks can play havoc with the system within no time. More than 80% attacks are at application layer and almost 90% applications are vulnerable to these attacks. Traditional solutions in the form of Web scanners, firewall, intrusion detection system (IDS) or Web proxies are

Abdul Razzaq; Ali Hur; Nasir Haider; Farooq Ahmad

2009-01-01

42

Designing, Implementing, and Evaluating Secure Web Browsers  

ERIC Educational Resources Information Center

Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

Grier, Christopher L.

2009-01-01

43

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc  

E-print Network

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

Qian, Ning

44

Building fast and secure Web services with OKWS  

E-print Network

OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, ...

Krohn, Maxwell (Maxwell N.)

2005-01-01

45

Crowdsourced Web Augmentation: A Security Model  

Microsoft Academic Search

\\u000a Web augmentation alters the rendering of existing Web applications at the back of these applications. Changing the layout, adding\\/removing content or providing additional\\u000a hyperlinks\\/widgets are examples of Web augmentation that account for a more personalized user experience. Crowdsourced Web augmentation considers end users not only the beneficiaries but also the contributors of augmentation scripts. The fundamental\\u000a problem with so augmented

Cristóbal Arellano; Oscar Díaz; Jon Iturrioz

2010-01-01

46

Web Security: Authentication Protocols and Their Analysis  

Microsoft Academic Search

Authentication is one of the basic building blocks of computer security. It is achieved through the execution of an authentication\\u000a protocol between two or more parties. One such protocol, the Secure Socket Layer (SSL) protocol, has become the de facto standard\\u000a for Web security. This paper provides an overview of results and methods used in analyzing authentication protocols. The aim

Wu Wen; Fumio Mizoguchi

2001-01-01

47

Web Mining: Machine Learning for Web Applications.  

ERIC Educational Resources Information Center

Presents an overview of machine learning research and reviews methods used for evaluating machine learning systems. Ways that machine-learning algorithms were used in traditional information retrieval systems in the "pre-Web" era are described, and the field of Web mining and how machine learning has been used in different Web mining applications

Chen, Hsinchun; Chau, Michael

2004-01-01

48

Retrofitting Security into a Web-Based Information System  

Microsoft Academic Search

This paper reports on an incremental method that allows adding security mechanisms to an existing, but insecure system, such as a prototype or a legacy system. The incremental method is presented and as a showcase its application is demonstrated at the example of a Web-based information system.

David Bettencourt Da Cruz; Bernhard Rumpe; Guido Wimmel

2003-01-01

49

Security Policy Configuration Analysis for Web Services on Heterogeneous Platforms  

NASA Astrophysics Data System (ADS)

With the rapid development of web services, message security of web services between heterogeneous platforms is increasingly prominent. As two popular web services platforms, Apache Axis2 and Microsoft .Net, have their own security module respectively (Rampart, WSE). Due to differences in platform security mechanisms, it is difficult to build a secure web services communications between different platforms. This paper firstly introduces the Apache Axis2 and. Net platforms, and then analyzes their differences of security mechanism on these two platforms. Finally, followed by a typical secure case, a series of steps are designed and tested in order to realize secure web service invocation on heterogeneous platforms.

Hongbin, Ji; Fengyu, Zhao; Tao, Xu

50

Engineering Web Applications for Reuse  

Microsoft Academic Search

In this paper we present Web design frameworks as a conceptual approach to maximize reuse in Web applications. We first analyze the current state of the art of Web applications design, stating the need for an approach that clearly separates concerns (conceptual, navigational, interface). We briefly introduce the OOHDM approach for Web applications design. We next focus on the problem

Daniel Schwabe; Luiselena Esmeraldo; Gustavo Rossi; Fernando Lyardet

2001-01-01

51

A secure world-wide-web daemon  

Microsoft Academic Search

In this paper we begin by discussing some of the protection-related history of World-Wide-Web servers and clients, some of their betterknown vulnerabilities, and the need for a more secure server environment. We then discuss the protection goals we believe to be of import to a World-Wide-Web server, outline some of the principles we believe to be important to attaining such

Frederick B. Cohen

1996-01-01

52

Improving web site security with data flow management  

E-print Network

This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

Yip, Alexander Siumann, 1979-

2009-01-01

53

Factsheets Web Application  

SciTech Connect

The Factsheets web application was conceived out of the requirement to create, update, publish, and maintain a web site with dynamic research and development (R and D) content. Before creating the site, a requirements discovery process was done in order to accurately capture the purpose and functionality of the site. One of the high priority requirements for the site would be that no specialized training in web page authoring would be necessary. All functions of uploading, creation, and editing of factsheets needed to be accomplished by entering data directly into web form screens generated by the application. Another important requirement of the site was to allow for access to the factsheet web pages and data via the internal Sandia Restricted Network and Sandia Open Network based on the status of the input data. Important to the owners of the web site would be to allow the published factsheets to be accessible to all personnel within the department whether or not the sheets had completed the formal Review and Approval (R and A) process. Once the factsheets had gone through the formal review and approval process, they could then be published both internally and externally based on their individual publication status. An extended requirement and feature of the site would be to provide a keyword search capability to search through the factsheets. Also, since the site currently resides on both the internal and external networks, it would need to be registered with the Sandia search engines in order to allow access to the content of the site by the search engines. To date, all of the above requirements and features have been created and implemented in the Factsheet web application. These have been accomplished by the use of flat text databases, which are discussed in greater detail later in this paper.

VIGIL,FRANK; REEDER,ROXANA G.

2000-10-30

54

Web Implementation of a Security Mediator for Medical  

E-print Network

concerning patient data security and privacy. The security mediator helps the security officer enforceWeb Implementation of a Security Mediator for Medical Databases Gio Wiederhold, Michel Bilello designed a security mediator, a software entity that screens both incoming queries and outgoing results

Wiederhold, Gio

55

Dragnet? No, Internet! Campus Security on the Web.  

ERIC Educational Resources Information Center

Examines college campus security's use of an Internet Web page to better inform its students and enhance campus law enforcement. The University of Richmond security Web site is provided as an example of how an interactive security system works. It notes that this system is available free to campus law enforcement agencies able to satisfy certain…

Fickes, Michael

1998-01-01

56

Assessing and Exploiting Web Applications with the Open-Source Samurai Web Testing Framework  

Microsoft Academic Search

\\u000a The Samurai Web Testing Framework (WTF) is an open-source LiveCD based on Ubuntu and focused on web application security testing.\\u000a It includes an extensive collection of pre-installed and pre-configured top penetration testing and security analysis tools,\\u000a becoming the perfect environment for assessing and exploiting web applications. The tools categorization guides the analyst\\u000a through the web-app penetration testing methodology, from reconnaissance,

Raul Siles

57

A Security Architecture for Grid-enabling OGC Web Services  

NASA Astrophysics Data System (ADS)

In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.

Angelini, Valerio; Petronzio, Luca

2010-05-01

58

FPA Depot - Web Application  

NASA Technical Reports Server (NTRS)

Lines of code (LOC) analysis is one of the methods used to measure programmer productivity and estimate schedules of programming projects. The Launch Control System (LCS) had previously used this method to estimate the amount of work and to plan development efforts. The disadvantage of using LOC as a measure of effort is that one can only measure 30% to 35% of the total effort of software projects involves coding [8]. In the application, instead of using the LOC we are using function point for a better estimation of hours in each software to develop. Because of these disadvantages, Jamie Szafran of the System Software Branch of Control And Data Systems (NE-C3) at Kennedy Space Canter developed a web application called Function Point Analysis (FPA) Depot. The objective of this web application is that the LCS software architecture team can use the data to more accurately estimate the effort required to implement customer requirements. This paper describes the evolution of the domain model used for function point analysis as project managers continually strive to generate more accurate estimates.

Avila, Edwin M. Martinez; Muniz, Ricardo; Szafran, Jamie; Dalton, Adam

2011-01-01

59

Application Security Automation  

ERIC Educational Resources Information Center

With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

Malaika, Majid A.

2011-01-01

60

Towards a Framework for Migrating Web Applications to Web Services  

E-print Network

Towards a Framework for Migrating Web Applications to Web Services Asil A. Almonaies Manar H {asil,alalfi,cordy,dean}@cs.queensu.ca Abstract Migrating traditional legacy web applications to web services is an important step in the modernization of web-based business systems to more complex inter

Cordy, James R.

61

A Transformation-Driven Approach to the Verification of Security Policies in Web Designs  

E-print Network

A Transformation-Driven Approach to the Verification of Security Policies in Web Designs Esther to Labyrinth, a domain specific language ori- ented to the design of Web applications. The analysis is done designs, a common approach is transforming the models into semantic domains (e.g. Petri nets, process

Guerra, Esther

62

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography  

E-print Network

benchmark the Apache web server. Our results show that, under realistic workloads, an Apache web server can handle 13%–31 % more HTTPS requests per second when using ECC-160 rather than RSA-1024 reflecting short-term security levels. At security levels necessary to protect data beyond 2010, the use of ECC

unknown authors

63

Finding Bugs In Dynamic Web Applications  

E-print Network

Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact usability of web applications. Currenttools for web-page validation cannot handle the dynamically-generatedpages ...

Artzi, Shay

2008-02-06

64

Secure password-based authenticated key exchange for web services  

Microsoft Academic Search

This paper discusses an implementation of an authenticated key- exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE- specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS- Trust and WS-SecureConversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-01-01

65

A Framework for Migrating Web Applications to Web Services  

E-print Network

A Framework for Migrating Web Applications to Web Services Asil A. Almonaies, Manar H. Alalfi-automatically migrat- ing monolithic legacy web applications to service oriented architecture (SOA) by separating potentially reusable features as web services. Software design re- covery and source transformation techniques

Cordy, James R.

66

Web Implementation of a Security Mediator for Medical Databases  

E-print Network

responsible for enforcing the medical institution's policies concerning patient data security and privacyWeb Implementation of a Security Mediator for Medical Databases Gio Wiederhold, Michel Bilello a security mediator, a software entity that screens both incoming queries and outgoing results for compliance

Wiederhold, Gio

67

Web Cube: a Programming Model for Reliable Web Applications  

E-print Network

Web Cube: a Programming Model for Reliable Web Applications I.S.W.B. Prasetya, T.E.J. Vos, S UU-CS-2005-002 www.cs.uu.nl #12;Web Cube: a Programming Model for Reliable Web Applications I@cs.uu.nl, tanja@iti.upv.es, doaitse@cs.uu.nl, bela@cs.ui.ac.id Abstract Web Cube is a server side programming

Utrecht, Universiteit

68

The Fundamentals and Practical Use of Certificate-Based Security in Secure Web-Based Systems  

Microsoft Academic Search

Secure key exchange, public key cryptography, and symmetric key cryptography help solve the problem of achieving secure communication between two parties. But how do you know with whom you are communicating securely? Certificate-based security is designed to solve this prob- lem of identifying with whom you are communicating and is gaining increasingly widespread use as a way to identify web

Robin M. Snyder

2002-01-01

69

Lecture 24: Document and Web Applications  

E-print Network

Lecture 24: Document and Web Applications Sam Roweis March 31, 2004 Machine Learning on Text/Web Machine Learning Problems for Text/Web Data · Document / Web Page Classification or Detection 1. Does this document/web page contain an example of thing X? e.g. Job advertisements (FlipDog). 2. Is this document/web

Roweis, Sam

70

Distributed Web Application Development with Active Web Objects  

Microsoft Academic Search

Modern distributed web applications shouldoer high customizability, various communicationresources, exible data and documentrepresentations, persistence, metadata, mechanismsfor interaction and coordination, etc.Often these requirements are realized with adiverse set of technologies, which are orthogonalto web technology and based on overlappingconcepts, abstractions, and paradigms.In this paper we present ActiWeb as a singleframework which centers around the notionof active web...

Gustaf Neumann; Uwe Zdun

2001-01-01

71

Intelligent and Adaptive Crawling of Web Applications for Web Archiving  

E-print Network

Intelligent and Adaptive Crawling of Web Applications for Web Archiving Muhammad Faheem1 and Pierre Kong, Hong Kong firstname.lastname@telecom.paristech.fr Abstract. Web sites are dynamic in nature with content and structure changing overtime. Many pages on the Web are produced by content management systems

Senellart, Pierre

72

SCAIMO - A Case for Enabling Security in Semantic Web Service Composition  

NASA Astrophysics Data System (ADS)

Web service is a novel distributed computing paradigm, trying to address the problem of enabling interaction between heterogeneous applications distributed over the Web. A problem that has become one of the recent critical issues is automated composition of Web services. A number of approaches like AI-planning have been proposed to resolve the problem. Despite the importance of AI-planning techniques for Web service composition, previous works in that area do not address security issues, which is the focus of this paper. Based on our prior work, i.e. AIMO, we present an approach called SCAIMO to achieve security conscious composition of Semantic Web services. We test our approach on a case study and the result shows SCAIMO can provide an applicable solution.

Vahid Dastjerdi, Amir; Hassan Tabatabaei, Sayed Gholam; Kadir, Wan M. N. Wan; Ibrahim, Suhaimi; Sarafian, Elahe

73

Information SecurityInformation Security--Applications andApplications and  

E-print Network

Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

Ahmed, Farid

74

BUSINESS MODELS AND SECURE WEB LEARNING ON PUBLIC KEY INFRASTUCTURES  

Microsoft Academic Search

This paper deals with Public Key Infrastructures (PKI) deployment considerations in an enterprise medium. After a presentation of services offered by public-key cryptography, business models secured with this technology are presented. On top of these infrastructures, Web-based learning systems can be implemented and the secure communications between learners and Web-learning servers are assured. 1. SERVICES OF PUBLIC KEY CRYPTOGRAPHY After

Cezar Toader; Adrian Petrovan; Cristinel Costea

2007-01-01

75

A Policy Based Approach to Security for the Semantic Web  

Microsoft Academic Search

\\u000a Along with developing specifications for the description of meta-data and the extraction of information for the Semantic Web,\\u000a it is important to maximize security in this environment, which is fundamentally dynamic, open and devoid of many of the clues\\u000a human societies have relied on for security assessment. Our research investigates the marking up of web entities with a semantic\\u000a policy

Lalana Kagal; Timothy W. Finin; Anupam Joshi

2003-01-01

76

A Virtual Web Lab for Teaching Enterprise Web Applications Development  

E-print Network

A Virtual Web Lab for Teaching Enterprise Web Applications Development Carlos Pérez-Conde1 , Juan Departament d'Informàtica, Universitat de València (SPAIN) 2 Departament de Química-Inorgànica, Universitat de València (SPAIN) Introduction Enterprise Web applications are built by integrating distributed components

Grimaldo, Francisco

77

Integrating elliptic curve cryptography into the web's security infrastructure  

Microsoft Academic Search

RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make continued reliance on RSA more challenging over time. We offer Elliptic Curve Cryptography (ECC) as a suitable alternative and describe our integration of this technology into several key components of the Web's

Vipul Gupta; Douglas Stebila; Sheueling Chang Shantz

2004-01-01

78

Java Security: Web Browsers and Beyond  

Microsoft Academic Search

The introduction of Java applets has taken the World Wide Web by storm. Java allows web creators to embellish their content with arbitrary programs which execute in the web browser, whether for sim- ple animations or complex front-ends to other services. We examined the Java language and the Sun HotJava, Netscape Navigator, and Microsoft Internet Explorer browsers which support it,

Drew Dean; Edward W. Felten; Dan S. Wallach; Dirk Balfanz

79

Project Assessment Skills Web Application  

NASA Technical Reports Server (NTRS)

The purpose of this project is to utilize Ruby on Rails to create a web application that will replace a spreadsheet keeping track of training courses and tasks. The goal is to create a fast and easy to use web application that will allow users to track progress on training courses. This application will allow users to update and keep track of all of the training required of them. The training courses will be organized by group and by user, making readability easier. This will also allow group leads and administrators to get a sense of how everyone is progressing in training. Currently, updating and finding information from this spreadsheet is a long and tedious task. By upgrading to a web application, finding and updating information will be easier than ever as well as adding new training courses and tasks. Accessing this data will be much easier in that users just have to go to a website and log in with NDC credentials rather than request the relevant spreadsheet from the holder. In addition to Ruby on Rails, I will be using JavaScript, CSS, and jQuery to help add functionality and ease of use to my web application. This web application will include a number of features that will help update and track progress on training. For example, one feature will be to track progress of a whole group of users to be able to see how the group as a whole is progressing. Another feature will be to assign tasks to either a user or a group of users. All of these together will create a user friendly and functional web application.

Goff, Samuel J.

2013-01-01

80

Speeding up secure web transactions using elliptic curve cryptography  

E-print Network

ECC-enhanced version of OpenSSL under a variety of conditions. Our results show that an Apache web server can handle 11%-31 % more HTTPS requests per second when using ECC rather than RSA at short-term security levels. At security levels necessary to protect data beyond 2010, the use of ECC over RSA

Vipul Gupta; Douglas Stebila; Stephen Fung; Sheueling Chang; Nils Gura; Hans Eberle

2004-01-01

81

Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs  

NASA Technical Reports Server (NTRS)

This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

Ivancic, William D.

2007-01-01

82

Security Data Warehouse Application  

NASA Technical Reports Server (NTRS)

The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

2012-01-01

83

SIF: Enforcing Confidentiality and Integrity in Web Applications Stephen Chong K. Vikram Andrew C. Myers  

E-print Network

confidentiality and integrity information security policies. SIF web applications are written in Jif 3.0-flow control). The enforcement mechanisms of SIF and Jif 3.0 track the flow of information within a web in web applications, in exchange for trust in the servlet framework and the Jif 3.0 compiler--a good

Chong, Stephen

84

Precise alias analysis for static detection of web application vulnerabilities  

Microsoft Academic Search

The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual code reviews are time-consuming, error- prone and costly, the need for automated solutions has become evident. In this paper, we address the problem of vulnerable

Nenad Jovanovic; Christopher Kruegel; Engin Kirda

2006-01-01

85

Security Encryption Scheme for Communication of Web Based Control Systems  

NASA Astrophysics Data System (ADS)

A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

Robles, Rosslin John; Kim, Tai-Hoon

86

Declarative specification of Web applications exploiting Web services and workflows  

Microsoft Academic Search

This demo presents an extension of a declarative language for specifying data-intensive Web applications. We demonstrate a scenario extracted from a real-life application, the Web portal of a computer manufacturer, including interactions with third-party service providers and enabling distributors to participate in well-defined business processes. The crucial advantage of our framework is the high-level modeling of a complex Web application,

Marco Brambilla; Stefano Ceri; Sara Comai; Marco Dario; Piero Fraternali; Ioana Manolescu

2004-01-01

87

A course on web languages and web-based applications  

Microsoft Academic Search

With the growth in the popularity of the World Wide Web (WWW), there is a need to provide education and hands-on training to students in preparing materials for presentation on the Web, developing client and server-side software, and building Web-based applications. Employers seek candidates who are proficient in computer languages and tools used on the WWW. Courses on Web programming

K. Sridharan

2004-01-01

88

Secure password-based authenticated key exchange for web services  

SciTech Connect

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22

89

Resource Estimation for Web Applications  

Microsoft Academic Search

In the field of software engineering, several empirical methods have been developed to model software projects before they are undertaken to provide an estimate of required effort, development time and cost. In the case of Web applications, this process is complicated by their complexity, multitiered nature, extensive use of noncode artifacts such as multimedia and often short time-scales. In this

Paul Umbers; Gail Miles

2004-01-01

90

Automated intrusion recovery for web applications  

E-print Network

In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

2013-01-01

91

Toward Web-Based Application Management Systems  

Microsoft Academic Search

As Web technology spreads, the number, variety, and sophistication of Web-based information services is literally exploding. While some effort has been put into managing a single, centrally controlled Web site, current Web technologies offer little help for managing Web-based applications in-the-large. This is partly due to the distributed, heterogeneous, and open nature of such applications. This paper proposes a generic

Avigdor Gal; John Mylopoulos

2001-01-01

92

Schedule Estimation for Web Application Development  

E-print Network

The purpose of the project is to come up with a robust methodology for estimating hours for web application systems development. For the scope of the project, a web application system is an application which is accessed via a web browser...

Fernando, Lake

2008-05-16

93

MedlinePlus Connect: Web Application  

MedlinePLUS

MedlinePlus Connect: Web Application To use the sharing features on this page, please enable JavaScript. MedlinePlus Connect is available as a ... please see our guidelines and instructions on linking. Web Application Overview The API for the Web application ...

94

Web 2.0 Applications in China  

NASA Astrophysics Data System (ADS)

Since 2005, the term Web 2.0 has gradually become a hot topic on the Internet. Web 2.0 lets users create web contents as distinct from webmasters or web coders. Web 2.0 has come to our work, our life and even has become an indispensable part of our web-life. Its applications have already been widespread in many fields on the Internet. So far, China has about 137 million netizens [1], therefore its Web 2.0 market is so attractive that many sources of venture capital flow into the Chinese Web 2.0 market and there are also a lot of new Web 2.0 companies in China. However, the development of Web 2.0 in China is accompanied by some problems and obstacles. In this paper, we will mainly discuss Web 2.0 applications in China, with their current problems and future development trends.

Zhai, Dongsheng; Liu, Chen

95

Information flow control for secure web sites  

E-print Network

Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on ...

Krohn, Maxwell N. (Maxwell Norman)

2008-01-01

96

FUZZY KEYSTROKE BIOMETRICS ON WEB SECURITY  

Microsoft Academic Search

BioWeb has two different parts: the client side and the server side. The client part consists of DHTML pages and the browser. The browser was a common navigator (Netscape). The system simulates a website with a UserId\\/Password to control the access to it; indeed BioWeb has several features as the capability of register new users, simulate a login, and the

Marino Tapiador; Juan A. Sigüenza

97

Web Services Implementation Methodology for SOA Application  

Microsoft Academic Search

With the popularity of Web services technology and the increase trend of developing service-oriented architecture (SOA) software, there is a need for an implementation methodology for Web services. This paper addresses the SOA application development challenges, identifies gaps in agile software methodology for Web services development, and observes Web services characteristics and its best practices. The contribution of this paper

Siew Poh Lee; Lai Peng Chan; Eng Wah Lee

2006-01-01

98

Designing User-Centered Web Applications in Web Time  

Microsoft Academic Search

As designers struggle to develop Web applications “in Web time,” they are under the added pressure of delivering usability. The author describes her company's successful transformation to user-driven processes for designing e-commerce applications. She also offers strategies for introducing human factors methods into a reluctant development organization

Molly Hammar Cloyd

2001-01-01

99

SAMP: Application Messaging for Desktop and Web Applications  

NASA Astrophysics Data System (ADS)

SAMP, the Simple Application Messaging Protocol, is a technology which allows tools to communicate. It is deployed in a number of desktop astronomy applications including ds9, Aladin, TOPCAT, World Wide Telescope and numerous others, and makes it straightforward for a user to treat a selection of these tools as a loosely-integrated suite, combining the most powerful features of each. It has been widely used within Virtual Observatory contexts, but is equally suitable for non-VO use. Enabling SAMP communication from web-based content has long been desirable. An obvious use case is arranging for a click on a web page link to deliver an image, table or spectrum to a desktop viewer, but more sophisticated two-way interaction with rich internet applications would also be possible. Use from the web however presents some problems related to browser sandboxing. We explain how the SAMP Web Profile, introduced in version 1.3 of the SAMP protocol, addresses these issues, and discuss the resulting security implications.

Taylor, M. B.; Boch, T.; Fay, J.; Fitzpatrick, M.; Paioro, L.

2012-09-01

100

Improving Web Server Performance by Distributing Web Applications  

Microsoft Academic Search

\\u000a Distributed interNet Application (DNA) covers a wide range of topics. DNA is a methodology that specifies how to distribute\\u000a Internet application on various Web servers. DNA helps to generate scalable, reliable enterprise applications. It provides\\u000a load-balancing techniques to distribute load on multiple Web servers. This paper describes DNA methodology for a distributed\\u000a application, which enables better performance, availability and service

Mital Kakaiya; Sushant Goel; Hema Sharda; David Taniar

2003-01-01

101

Securing mobile commerce interactions through secure mobile web services  

Microsoft Academic Search

The provision of data communications via Public Land Mobile Networks employing the General Packet Radio Service (GPRS) technology has opened up m-commerce opportunities for businesses. However, security concerns with wireless technologies are inhibiting the adoption of m-commerce by business. We show how a sole reliance on the security provided inherently within GPRS networks is inadequate for m-commerce activity. GPRS networks

T. Moyo; B. Irwin; M. Wright

102

Efficient Authorization of Rich Presence Using Secure and Composed Web Services  

NASA Astrophysics Data System (ADS)

This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

Li, Li; Chou, Wu

103

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-print Network

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

104

XMM-Newton Mobile Web Application  

NASA Astrophysics Data System (ADS)

We present the first XMM-Newton web mobile application, coded using new web technologies such as HTML5, the Query mobile framework, and D3 JavaScript data-driven library. This new web mobile application focuses on re-formatted contents extracted directly from the XMM-Newton web, optimizing the contents for mobile devices. The main goals of this development were to reach all kind of handheld devices and operating systems, while minimizing software maintenance. The application therefore has been developed as a web mobile implementation rather than a more costly native application. New functionality will be added regularly.

Ibarra, A.; Kennedy, M.; Rodríguez, P.; Hernández, C.; Saxton, R.; Gabriel, C.

2013-10-01

105

Threat Modelling for Web Services Based Web Applications  

Microsoft Academic Search

Threat analysis of a web application can lead to a wide variety of identified threats. Some of these threats will be very\\u000a specific to the application; others will be more related to the underlying infrastructural software, such as the web or application\\u000a servers, the database, the directory server and so forth. This paper analyzes the threats that can be related

Lieven Desmet; Bart Jacobs; Frank Piessens; Wouter Joosen

106

Towards Improving the Usability and Security of Web Single Sign-On  

E-print Network

users' perceptions of web SSO and the systems' security guarantees are still poorly understood. AimedTowards Improving the Usability and Security of Web Single Sign-On Systems by San-Tsai Sun A THESIS of the usability and security of these two mainstream web SSO solutions. First, through several in-lab user studies

107

Building smarter web applications with HTML5  

Microsoft Academic Search

Web applications have seen increased usage as of late, to the point where they are more favorable than desktop applications. The rise in the prevalence of web applications can be attributed to their flexibility, which enable programmers to go beyond the limitation of conventional desktop applications.

Johan Harjono; Gloria Ng; Ding Kong; Jimmy Lo

2010-01-01

108

Reining in the web with content security policy  

Microsoft Academic Search

The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against websites using Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) for the purposes of information stealing, website defacement, malware planting, clickjacking, etc. While an ideal solution may be to develop web

Sid Stamm; Brandon Sterne; Gervase Markham

2010-01-01

109

Efficient Integration of Web Services in Ambient-aware Sensor Network Applications1  

E-print Network

, and security cameras. Emergency response, homeland security, and many other applications have a very real need platforms such as satellite imaging systems, meteorological stations, air quality stations, and security cameras. The ability to seamlessly assemble a sensor web from various sensor network architectures greatly

Koutsoukos, Xenofon D.

110

Combining World Wide Web and Wireless Security  

Microsoft Academic Search

In current electronic commerce systems, customers have an on-line inter- action with merchants via a browser on their personal computer. Also payment is done electronically via the Internet, mostly with a credit card. In parallel to this, e-services via wireless-only systems are emerg- ing. This paper identifles security and functionality weaknesses in both of these current approaches. The paper discusses

Joris Claessens; Bart Preneel; Joos Vandewalle

2001-01-01

111

An approach for reverse engineering of web-based applications  

Microsoft Academic Search

The new possibilities offered by WEB applications are pervasively and radically changing several areas. WEB applications, compared to WEB sites, offer substantially greater opportunities: a WEB application provides the WEB user with a means to modify the site status. WEB applications must cope with an extremely short development\\/evolution life cycle. Usually, they are implemented without producing any useful documentation for

G.A. Di Lucca; M. Di Penta; G. Antoniol; G. Casazza

2001-01-01

112

Security seal. [Patent application  

DOEpatents

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17

113

Development of Web Applications from Web Enhanced Conceptual Schemas  

Microsoft Academic Search

\\u000a This work presents an OO software production method that defines a systematic process for conceptual modelling of web applications.\\u000a The paper discusses a set of minimum primitives to capture the essentials of dynamic web applications and it discusses how\\u000a to introduce them in a classical model-centered OO method that provides systematic code generation. Finally, the paper presents\\u000a some ideas to

Joan Fons; Vicente Pelechano; Manoli Albert; Oscar Pastor

2003-01-01

114

MDA Transformations Applied to Web Application Development  

Microsoft Academic Search

Current Web generation techniques are mainly hard-coded for predefined architectures of Web applications. Consequently, there is a gap between Web design models and the final implementation. We solve this problem, following with our approach the Model-Driven Architecture (MDA) principles of automatic generation of software systems based on model transformations. In this context, we present a transformation process and propose a

Santiago Meliá; Andreas Kraus; Nora Koch

2005-01-01

115

Web-Based Courseware Application Usability  

Microsoft Academic Search

Courseware packages are software applications that facilitate distri- bution of information from professors to students, as well as com- munication among students in a class. Most commercial off- the- shelf courseware solutions are web-based and do not require client- side installation of additional software packages. While the web- based interfaces provide nearly ubiquitous access, they have disad- vantages. First, web

Thomas Convery; Brandon Nuttall; Bobby Bodenheimer

116

Considering Browser Interaction in Web Application Testing  

Microsoft Academic Search

As web applications evolves, their structure may become more and more complex. Thus, systematic approaches\\/methods for web application testing are needed. Existing methods take into consideration only those actions\\/events the user is prompted by the application itself, such as the selection of a hypertextual link or the submission of the data contained in a form. However, these methods do not

Giuseppe A. Di Lucca; Massimiliano Di Penta

2003-01-01

117

Capturing Trust in Social Web Applications  

Microsoft Academic Search

The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners\\u000a of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which\\u000a are frameworks for the publication of user-provided content. Traditionally, Web content could be ‘trusted’ to some extent\\u000a based on the site

John O’Donovan

118

Data mining approach to web application intrusions detection  

NASA Astrophysics Data System (ADS)

Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

Kalicki, Arkadiusz

2011-10-01

119

An Approach for Reverse Engineering of Web-Based Application  

Microsoft Academic Search

Abstract The new possibilities offered by WEB applications are pervasively and radically changing several areas WEB applications, compared to WEB sites, offer substantially greater opportunities: a WEB application provides the WEB user with a means to modify the site status WEB ap - plications represent a competitive advantage: they are criti - cal and strategically relevant resources, not only to

Giuseppe A. Di Lucca; Massimiliano Di Penta; Giuliano Antoniol; Gerardo Casazza

2001-01-01

120

Homeland Security and Defense Applications  

SciTech Connect

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06

121

Homeland Security and Defense Applications  

ScienceCinema

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09

122

Geospatial Information Security Web Service Based on Agent  

Microsoft Academic Search

With the development of remote sensing technology, the use of remote sensing images collected by space platforms is becoming more and more pervasive. There is more and more need to distribute processing of remote sensing images. At present, WebService can figure out non-security remote sensing images network processing, but due to network transmit without non-encryption at client side, which may

Jing Sun; Jin Liu; Zhengquan Xu; Zhe Wu

2010-01-01

123

Reconfigurable Hybrid Architecture for Web Applications  

Microsoft Academic Search

\\u000a This paper describes a Reconfigurable Hybrid Architecture for the developing, distribution and execution of web applications\\u000a with high computational requirements. The Architecture is a layered model based on a hybrid device (standard microprocessor\\u000a and FPGA), for which has been designed and implemented a component as a web browser plug-in. Web applications are divided\\u000a into two parts: an standard part and

David Rodríguez Lozano; Juan Manuel Sánchez-pérez; Juan Antonio Gómez Pulido

2003-01-01

124

Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance  

SciTech Connect

This paper explores techno-social predictive analytics (TPA) and related methods for Web “data mining” where users’ posts and queries are garnered from Social Web (“Web 2.0”) tools such as blogs, microblogging and social networking sites to form coherent representations of real-time health events. The paper includes a brief introduction to commonly used Social Web tools such as mashups and aggregators, and maps their exponential growth as an open architecture of participation for the masses and an emerging way to gain insight about people’s collective health status of whole populations. Several health related tool examples are described and demonstrated as practical means through which health professionals might create clear location specific pictures of epidemiological data such as flu outbreaks.

Kamel Boulos, Maged; Sanfilippo, Antonio P.; Corley, Courtney D.; Wheeler, Steve

2010-03-17

125

MedIT Solutions Web application development  

E-print Network

MedIT Solutions Web application development MedIT can create a customized web app unique to you- ports, pull metrics and much more. Virtual server hosting On a grant budget? MedIT provides vir- tual infrastructure. Virtual desktop and applications MedIT offers a complete remote office, giving you access to all

MacMillan, Andrew

126

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-print Network

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your the items as they apply to that person. 2. Show an address where you can receive the card 10 to 14 days from

Li, Mo

127

A taxonomy and business analysis for mobile web applications  

E-print Network

Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications ...

Liu, Kevin H

2009-01-01

128

Web Implementation of a Security Mediator for Medical Databases Gio Wiederhold Michel Bilello Chris Donahue  

E-print Network

institution's policies concerning patient data security and privacy. The security mediator helps the securityWeb Implementation of a Security Mediator for Medical Databases Gio Wiederhold Michel Bilello Chris, under the TIHI project, we have designed a security mediator, a software entity that screens both

Wiederhold, Gio

129

Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data  

Microsoft Academic Search

Web usage mining is the application of data mining techniques to discover usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. Web usage mining consists of three phases, namely . This paper describes each of these phases in detail. Given its application potential, Web usage mining has seen a rapid increase in

Jaideep Srivastava; Robert Cooley; Mukund Deshpande; Pang-Ning Tan

2000-01-01

130

Web Application Software for Ground Operations Planning Database (GOPDb) Management  

NASA Technical Reports Server (NTRS)

A Web application facilitates collaborative development of the ground operations planning document. This will reduce costs and development time for new programs by incorporating the data governance, access control, and revision tracking of the ground operations planning data. Ground Operations Planning requires the creation and maintenance of detailed timelines and documentation. The GOPDb Web application was created using state-of-the-art Web 2.0 technologies, and was deployed as SaaS (Software as a Service), with an emphasis on data governance and security needs. Application access is managed using two-factor authentication, with data write permissions tied to user roles and responsibilities. Multiple instances of the application can be deployed on a Web server to meet the robust needs for multiple, future programs with minimal additional cost. This innovation features high availability and scalability, with no additional software that needs to be bought or installed. For data governance and security (data quality, management, business process management, and risk management for data handling), the software uses NAMS. No local copy/cloning of data is permitted. Data change log/tracking is addressed, as well as collaboration, work flow, and process standardization. The software provides on-line documentation and detailed Web-based help. There are multiple ways that this software can be deployed on a Web server to meet ground operations planning needs for future programs. The software could be used to support commercial crew ground operations planning, as well as commercial payload/satellite ground operations planning. The application source code and database schema are owned by NASA.

Lanham, Clifton; Kallner, Shawn; Gernand, Jeffrey

2013-01-01

131

SIF: Enforcing Confidentiality and Integrity in Web Applications  

Microsoft Academic Search

SIF (Servlet Information Flow) is a novel software framework for building high-assurance web applications, using language-based information-flow control to en- force security. Explicit, end-to-end confidentiality and integrity policies can be given either as compile-time program annotations, or as run-time user requirements. Compile-time and run-time checking efficiently enforce these policies. Information flow analysis is known to be useful against SQL injection

Stephen Chong; K. Vikram; Andrew C. Myers

132

Secure Electronic Voting Over the World Wide Web Mark A. Herschberg  

E-print Network

Secure Electronic Voting Over the World Wide Web by Mark A. Herschberg Submitted to the Department Voting Over the World Wide Web by Mark A. Herschberg Submitted to the Department of Electrical........................................................................................................5 1.2 History

Goldwasser, Shafi

133

Developing Secure Web Services for Computational Portals Choonhan Youn, Marlon Pierce and Geoffrey Fox  

E-print Network

Developing Secure Web Services for Computational Portals Choonhan Youn, Marlon Pierce and Geoffrey: (812) 856-1537 Abstract Computational web portals provide uniform access to remote computational performance computing back end. These portal services may be implemented in a programming

134

Object-Oriented Web Application Development  

Microsoft Academic Search

abstraction In other words, the component model maintains the developer's view of an application, - from which the Web view is derived incrementally We will briefly describe the component model and the concepts for resource generation (for more - detail, see Gellersen et al ) Then we present a new development, the WebComposition Markup Lan - guage, that implements the

Hans-werner Gellersen; Martin Gaedke

1999-01-01

135

Modeling and evaluating credibility of web applications  

Microsoft Academic Search

The popularization of the Web has given rise to new services every day, demanding mechanisms to ensure the credibility of these services. In this work we adopt a framework for the design, implementation and evaluation of credibility models. We call a credibility model a function capable of assigning a credibility value to a transaction of a Web application, considering different

Sara Guimarães; Adriano Pereira; Arlei Silva; Wagner Meira Jr.

2011-01-01

136

VOGCLUSTERS: An Example of DAME Web Application  

NASA Astrophysics Data System (ADS)

We present the alpha release of the VOGCLUSTERS web application, specialized for data and text mining on globular clusters. It is one of the web2.0 technology based services of Data Mining &Exploration (DAME) Program, devoted to mine and explore heterogeneous information related to globular clusters data.

Castellani, M.; Brescia, M.; Mancini, E.; Pellecchia, L.; Longo, G.

2012-07-01

137

Access Control of Web- and Java-Based Applications  

NASA Technical Reports Server (NTRS)

Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

Tso, Kam S.; Pajevski, Michael J.

2013-01-01

138

Toolsets for Airborne Data Web Application  

Atmospheric Science Data Center

... aircraft data for scientific research on climate change and air quality relevant issues. Features Include Select data based ... Details:  Toolsets for Airborne Data (TAD) Web Application Category:  Instrument Specific Search, ...

2014-09-17

139

Improving a web application using design patterns: A case study  

Microsoft Academic Search

Adopting design pattern while designing web applications can promote reusability and consistency of the web application. Without the adoption of design patterns or wrong selection of them will make the development of web application more complex and hard to be maintained. Thus knowledge in design patterns is essential in selecting the most appropriate patterns in the web applications development. Unfortunately,

Phek Lan Thung; Chu Jian Ng; Swee Jing Thung; Shahida Sulaiman

2010-01-01

140

Multimedia Security System for Security and Medical Applications  

ERIC Educational Resources Information Center

This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

Zhou, Yicong

2010-01-01

141

Meeting the challenges of web application development: the web engineering approach  

Microsoft Academic Search

The Web has very rapidly become central to many applications in diverse areas. As our reliance on Web-based applications continues to increase and the Web systems supporting these applications become more complex, there is growing concern about the manner in which the Web-based systems\\/applications are created and their quality, integrity and maintainability. The development of Web-based systems has generally been

San Murugesan; Yogesh Deshpande

2002-01-01

142

Access Control of Web and Java Based Applications  

NASA Technical Reports Server (NTRS)

Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

2011-01-01

143

Geant4 application in a Web browser  

NASA Astrophysics Data System (ADS)

Geant4 is a toolkit for the simulation of the passage of particles through matter. The Geant4 visualization system supports many drivers including OpenGL[1], OpenInventor, HepRep[2], DAWN[3], VRML, RayTracer, gMocren[4] and ASCIITree, with diverse and complementary functionalities. Web applications have an increasing role in our work, and thanks to emerging frameworks such as Wt [5], building a web application on top of a C++ application without rewriting all the code can be done. Because the Geant4 toolkit's visualization and user interface modules are well decoupled from the rest of Geant4, it is straightforward to adapt these modules to render in a web application instead of a computer's native window manager. The API of the Wt framework closely matches that of Qt [6], our experience in building Qt driver will benefit for Wt driver. Porting a Geant4 application to a web application is easy, and with minimal effort, Geant4 users can replicate this process to share their own Geant4 applications in a web browser.

Garnier, Laurent; Geant4 Collaboration

2014-06-01

144

Using Web Objects for Estimating Software Development Effort for Web Applications  

Microsoft Academic Search

Web development projects are certainly different from traditional software development projects and hence require differently tailored measures for accurate effort estimation. We investigate the suitability of a newly proposed size measure for Web development projects: Web objects. Web objects have been specifically developed for sizing Web applications and used for estimating effort in a COCOMO Il-like estimation model called WEBMO.

Melanie Ruhe; D. Ross Jeffery; Isabella Wieczorek

2003-01-01

145

Image-Based Electronic Patient Records for Secured Collaborative Medical Applications  

Microsoft Academic Search

We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), image-based EPR repository server (EPR-Server), Web server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of digital signature and authentication are integrated to

Jianguo Zhang; Jianyong Sun; Yuanyuan Yang; Chenwen Liang; Yihong Yao; Jin Jin; Weihua Cai; Kun Sun; Guozhen Zhang

2005-01-01

146

A FRAMEWORK FOR COLLECTING CLIENTSIDE PARADATA IN WEB APPLICATIONS  

E-print Network

and stores clients' behavior on web applications. The framework is implemented in JavaScript, PHP, and My and JavaScript content. This type of web applications is commonly referred to by Web 2.0. The scripting language JavaScript became the de facto standard for web applications. In the past, it was mainly used

Bremen, Universität

147

Secure Coprocessors in Electronic Commerce Applications  

Microsoft Academic Search

Many researchers believe electronic wallets (secure stor- age devices that maintain account balances) are the solu- tion to electronic commerce challenges. This paper argues for a more powerful model — a secure coprocessor — that can run a small operating system, run application pro- grams, and also keep secure storage for cryptographic keys and balance information. We have built a

Bennet Yee; J. D. Tygar

1996-01-01

148

CMS conditions database web application service  

NASA Astrophysics Data System (ADS)

The web application service is part of the condition database system of the CMS experiment. The application server is built upon condition python API in the CMS offline software framework and serves applications and users not involved in the event-processing. The main client of the application server is the condition database web GUI, which currently exposes three main services: the Tag Browser, the Global Tag, the Historic Chart condition date in terms of their version (TAG) and the interval of validity (IOV). The global tag component is used by physicists to inspect the organization of the tags in a given data taking or data production, while production managers use the web service to produce such tag hierarchy. The History chart plotting service creates dynamic summary and distribution charts of the payload data in the database. Fast graphical overview of different information greatly contributes in monitoring and validating the calibration data stored in the condition database.

Dziedziniewicz, Katarzyna Maria; Giordano, Domenico; Innocente, Vincenzo; Le Bihan, Anne-Catherine; Pierro, Antonio; Xie, Zhen

2010-04-01

149

Decomposition and Abstraction of Web Applications for Web Service Extraction and Composition  

Microsoft Academic Search

There are large demands for re-engineering human- oriented Web application systems for use as machine- oriented Web application systems, which are called Web Services. This paper describes a framework named H2W, which can be used for constructing Web Service wrappers from existing, multi-paged Web applications. H2W's contribution is mainly for service extraction, rather than for the widely studied problem of

Michiaki Tatsubori; Kenichi Takahashi

2006-01-01

150

Model-Based Web Application Development  

Microsoft Academic Search

In this chapter we present our experience with the Object-Oriented Hypermedia Design Method (OOHDM), a model-based approach for developing Web applications. We first describe the main activities in OOHDM and then we illustrate the application of the method with a simple example, a CD store.

Gustavo Rossi; Daniel Schwabe

151

An Integrated Software Development Environment for Web Applications  

Microsoft Academic Search

\\u000a In recent years, the World Wide Web has become an ideal platform for developing Internet applications. World Wide Web service\\u000a and application engineering is a complex task. Many web applications at present are large-scale and involve hundreds or thousands\\u000a of web pages and sophisticated interactions with users and databases. Thus, improving the quality of web applications and\\u000a reducing development costs

Byeongdo Kang

2004-01-01

152

LISA, the next generation: from a web-based application to a fat client.  

PubMed

The LISA application, developed by the University Hospitals Leuven, permits referring physicians to consult the electronic medical records of their patients over the internet in a highly secure way. We decided to completely change the way we secured the application, discard the existing web application and build a completely new application, based on the in-house developed hospital information system, used in the University Hospitals Leuven. The result is a fat Java client, running on a Windows Terminal Server, secured by a commercial SSL-VPN solution. PMID:18953122

Pierlet, Noëlla; Aerts, Werner; Vanautgaerden, Mark; Van den Bosch, Bart; De Deurwaerder, André; Schils, Erik; Noppe, Thomas

2008-01-01

153

Border security and surveillance system with smart cameras and motes in a Sensor Web  

NASA Astrophysics Data System (ADS)

In this paper we describe a prototype surveillance system that leverages smart sensor motes, intelligent video, and Sensor Web technologies to aid in large area monitoring operations and to enhance the security of borders and critical infrastructures. Intelligent video has emerged as a promising tool amid growing concern about border security and vulnerable entry points. However, numerous barriers exist that limit the effectiveness of surveillance video in large area protection; such as the number of cameras needed to provide coverage, large volumes of data to be processed and disseminated, lack of smart sensors to detect potential threats and limited bandwidth to capture and distribute video data. We present a concept prototype that addresses these obstacles by employing a Smart Video Node in a Sensor Web framework. Smart Video Node (SVN) is an IP video camera with automated event detection capability. SVNs are cued by inexpensive sensor motes to detect the existence of humans or vehicles. Based on sensor motes' observations cameras are slewed in to observe the activity and automated video analysis detects potential threats to be disseminated as "alerts". Sensor Web framework enables quick and efficient identification of available sensors, collects data from disparate sensors, automatically tasks various sensors based on observations or events received from other sensors, and receives and disseminates alerts from multiple sensors. The prototype system is implemented by leveraging intuVision's intelligent video, Northrop Grumman's sensor motes and SensorWeb technologies. Implementation of a deployable system with Smart Video Nodes and sensor motes within the SensorWeb platform is currently underway. The final product will have many applications in commercial, government and military systems.

Guler, Sadiye; Cole, Timothy; Silverstein, Jay; Pushee, Ian; Fairgrieve, Scott

2010-04-01

154

Robust image obfuscation for privacy protection in Web 2.0 applications  

NASA Astrophysics Data System (ADS)

We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in Web 2.0 applications. It helps to protect the privacy of the users against threats caused by internet bots and web applications that extract biometric and other features from images for data-linkage purposes. The approaches described in this paper consider that images uploaded to Web 2.0 applications pass several transformations, such as scaling and JPEG compression, until the receiver downloads them. In contrast to existing approaches, our focus is on usability, therefore the primary goal is not a maximum of security but an acceptable trade-off between security and resulting image quality.

Poller, Andreas; Steinebach, Martin; Liu, Huajian

2012-03-01

155

Secure application partitioning for intellectual property protection  

E-print Network

Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application ...

O'Donnell, Charles W., S.M. Massachusetts Institute of Technology

2005-01-01

156

ReSTful OSGi Web Applications Tutorial  

NASA Technical Reports Server (NTRS)

This slide presentation accompanies a tutorial on the ReSTful (Representational State Transfer) web application. Using Open Services Gateway Initiative (OSGi), ReST uses HTTP protocol to enable developers to offer services to a diverse variety of clients: from shell scripts to sophisticated Java application suites. It also uses Eclipse for the rapid development, the Eclipse debugger, the test application, and the ease of export to production servers.

Shams, Khawaja; Norris, Jeff

2008-01-01

157

Semantic-Web Technology: Applications at NASA  

NASA Technical Reports Server (NTRS)

We provide a description of work at the National Aeronautics and Space Administration (NASA) on building system based on semantic-web concepts and technologies. NASA has been one of the early adopters of semantic-web technologies for practical applications. Indeed there are several ongoing 0 endeavors on building semantics based systems for use in diverse NASA domains ranging from collaborative scientific activity to accident and mishap investigation to enterprise search to scientific information gathering and integration to aviation safety decision support We provide a brief overview of many applications and ongoing work with the goal of informing the external community of these NASA endeavors.

Ashish, Naveen

2004-01-01

158

Serving Embedded Content via Web Applications: Model, Design and Experimentation  

E-print Network

Serving Embedded Content via Web Applications: Model, Design and Experimentation Simon Duquennoy dedicated terminals. A new trend consists in embedding Web servers in small devices, making both access of embedded Web servers, and we introduce a taxonomy of the contents possi- bly served by Web applications

Paris-Sud XI, Université de

159

Position Announcement Position: GIS Web Application Developer, W0007467  

E-print Network

Position Announcement Position: GIS Web Application Developer, W0007467 Full Time, 12-month Web Application Developer will be responsible for the design, creation, and maintenance of custom Web development with Web API's such as Flex and Silverlight, Python scripting, cartographic design, authoring

Marston, Richard A.

160

Re-engineering Legacy Web Applications into Rich Internet Applications  

Microsoft Academic Search

\\u000a There is a current trend in the industry to migrate its traditional Web applications to Rich Internet Applications (RIAs).\\u000a To face this migration, traditional Web methodologies are being extended with new RIA modeling primitives. However, this re-engineering\\u000a process is being figured out in an ad-hoc manner by introducing directly these new features in the models, crosscutting the\\u000a old functionality and

Roberto Rodríguez-Echeverría; José María Conejero; Marino Linaje Trigueros; Juan Carlos Preciado; Fernando Sánchez-Figueroa

2010-01-01

161

Designing a Taxonomy of Web Attacks  

Microsoft Academic Search

It has been discovered in recent years that the Internet attacks started by improper authorization on Web servers and Web applications. The top 10 Web vulnerabilities issued by OWASP and the top 20 security risks issued by SANS demonstrated that Web attacks is one of the most important network security problems. Therefore, with the help from Web attack taxonomy, we

Jung-Ying Lai; Jain-Shing Wu; Shih-Jen Chen; Chia-Huan Wu; Chung-Huang Yang

2008-01-01

162

Designing a Taxonomy of Web Attacks  

Microsoft Academic Search

It has been discovered in recent years that the Internet attacks started by improper authorization on Web servers and Web applications. The top 10 Web vulnerabilities is- sued by OWASP and the top 20 security risks issued by SANS demonstrated that Web attacks is one of the most im- portant network security problems. Therefore, with the help from Web attack

Jung-Ying Lai; Jain-Shing Wu; Shih-Jen Chen; Chia-Huan Wu; Chung-Huang Yang

2009-01-01

163

Reverse engineering Web applications: the WARE approach  

Microsoft Academic Search

The rapid, progressive diffusion of Web applications in several productive contexts of our modern society is laying the foundations of a renewed scenario of software development, where one of the emerging problems is that of defining and validating cost-effective approaches for maintaining and evolving these software systems.Due to several factors, the solution to this problem is not straightforward. The heterogeneous

Giuseppe Antonio Di Lucca; Anna Rita Fasolino; Porfirio Tramontana

2004-01-01

164

Secure coprocessing applications and research issues  

SciTech Connect

The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

Smith, S.W.

1996-08-01

165

Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications  

E-print Network

Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications David W a MVC-oriented web form develop- ment called "Webformer" that we develop to simplify and streamline web form development with Ajax. We introduce a scripting language called Web Form Application Language (Web

Cheung, David Wai-lok

166

WARE: A Tool for the Reverse Engineering of Web Applications  

Microsoft Academic Search

The development of Web sites and applications is increasing dramatically to satisfy the market requests. The software industry is facing the new demand under the pressure of a very short time-to-market and an extremely high competition. As a result, Web sites and applications are usually developed without a disciplined process: Web applications are directly coded and no, or poor, documentation

Giuseppe A. Di Lucca; Anna Rita Fasolino; F. Pace; Porfirio Tramontana; Ugo De Carlini

2002-01-01

167

Virtual real-time inspection of nuclear material via VRML and secure web pages  

SciTech Connect

Sandia National Laboratories` Straight Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight Line`s efforts is to create a system to securely disseminate this data on the Internet`s World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight Line secure 3-D web page. A discussion of the ``pros and cons`` of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at the following address: http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended.

Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J.

1997-04-01

168

Certificate for secure web The Department of computer Science and Artificial Intelligence  

E-print Network

About us Certificate for secure web The Department of computer Science and Artificial Intelligence of Artificial Intelligence, Computer Graphics, Computational Geometry or Coding and Cryptology, among others of the Computation and Artificial Intelligence #12;

Escolano, Francisco

169

Providing Scheduling Applications as Secure Internet Services  

Microsoft Academic Search

This paper describes SchedSP, a proposed architecture for providing scheduling applications as services over the Internet in a secure manner. This architecture is based on secure XML messaging over the HTTP protocol and utilizes a distributed Grid-based organization of computational resources for the execution of the scheduling solutions. Along with the prototype of the system, three case studies are presented.

Goulas George; Barkayannis Vassilios; Housos Efthymios

170

Web Design Frameworks: An Approach to Improve Reuse in Web Applications  

Microsoft Academic Search

In this paper we introduce Web design frameworks as a conceptual approach to maximize reuse in Web applications. We first discuss the need for building abstract and reusable navigational design structures, exemplifying with different kinds of Web Information Systems. Then, we briefly review the state of the art of object-orient ed application frameworks and present the rationale for a slightly

Daniel Schwabe; Gustavo Rossi; Luiselena Esmeraldo; Fernando Lyardet

2001-01-01

171

Secure centralised mobile and web-based control system using GPRS with J2ME  

Microsoft Academic Search

This paper demonstrates a secure centralized mobile and web-based control system using the Java 2 Micro Edition (J2ME). In this system, clients can use their mobile\\/web browser to access a remote site via a centralized Web server using the GPRS\\/HTTP protocol. The centralized server acts as a switch for conducting the tasks required on a specific device within a given

Ali AI-Qayedi; R. El-Khazati; Ahmed Zahro; Salim Pd-Shamsi

2003-01-01

172

OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne) Yao Vinod Ganapathy  

E-print Network

, photos that others took in the area, and so on. There are two main types of architectures for mashup apOMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne,danfeng,vinodg}@cs.rutgers.edu Abstract Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous

Ganapathy, Vinod

173

OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne) Yao Vinod Ganapathy  

E-print Network

OMOS: A Framework for Secure Communication in Mashup Applications Saman Zarandioon Danfeng (Daphne,danfeng,vinodg}@cs.rutgers.edu Abstract Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous experience for end-users. As mashups evolve from portals designed to offer convenient access to infor- mation

Lu, Chang

174

Secure voice for mobile satellite applications  

NASA Technical Reports Server (NTRS)

The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.

Vaisnys, Arvydas; Berner, Jeff

1990-01-01

175

A study of Android application security  

E-print Network

security by studying 1,100 popular free Android applications. We introduce the ded decompiler, which recovers Android application source code directly from its installation image. We design and execute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered

William Enck; Damien Octeau; Patrick Mcdaniel; Swarat Chaudhuri

2011-01-01

176

Method of creating web services from web applications  

Microsoft Academic Search

Web 2.0 is becoming popular among people who are interested in creating or providing more useful services on the Internet. Mashup is one of the most important methods in Web 2.0, which creates services by combining components on the Internet, such as Web services. Mashup enables many people to create various services easily and use services created by many other

Yusuke Nakano; Yoji Yamato; Michiharu Takemoto; Hiroshi Sunaga

2007-01-01

177

Tracing for web 3.0: trace compilation for the next generation web applications  

Microsoft Academic Search

Today's web applications are pushing the limits of modern web browsers. The emergence of the browser as the platform of choice for rich client-side applications has shifted the use of in-browser JavaScript from small scripting programs to large computationally intensive application logic. For many web applications, JavaScript performance has become one of the bottlenecks preventing the development of even more

Mason Chang; Edwin W. Smith; Rick Reitmaier; Michael Bebenita; Andreas Gal; Christian Wimmer; Brendan Eich; Michael Franz

2009-01-01

178

Web-Based Resources and Applications: Quality and Influence  

ERIC Educational Resources Information Center

This paper evaluates the quality of two major types of Web resources for K-12 education --information for research, and interactive applications for teaching and learning. It discusses an evaluation on the quality of 1,025 pieces of Web information (articles, research reports, news, and statistics) and 900 Web applications (tutorials, drills,…

Liu, Leping; Johnson, D. Lamont

2005-01-01

179

IBM Software IBM Security AppScan: Application  

E-print Network

IBM Software Security June 2012 IBM Security AppScan: Application security and risk management. #12;3IBM Software The IBM Security AppScan portfolio includes solutions specifi- c Identify, prioritize, track and remediate critical security vulnerabilities #12;2 IBM Security App

180

Oriented Engineering Application for Voltage Security Analysis of Power Systems  

Microsoft Academic Search

This paper deals with oriented engineering application of voltage security analysis of large-scale power systems, including engineering criterion of voltage security, principal objective, and systematic procedure of voltage security assessment. A systematic approach to voltage security assessment is presented in this paper. Example of Yunnan grid voltage security analysis using systematic voltage security analysis method is presented

Zhou Xia; Li Bi-jun; Li Wen-yun; Wu Chen; Xu Tai-shan; Ren Xian-cheng

2006-01-01

181

Highlights Lotus Web Content Management Better integration with enterprise applications  

E-print Network

in the United States, other countries or both. Other company, product and service names may be trademarks security framework in the market · Rapid time-to-value and faster deployments. Lotus Web Content Management. We will provide a one no charge day of consulting to assess your environment for a Lotus Web Content

182

Seaweed : a Web application for designing economic games  

E-print Network

Seaweed is a web application for experimental economists with no programming background to design two-player symmetric games in a visual-oriented interface. Games are automatically published to the web where players can ...

Chilton, Lydia B

2009-01-01

183

Web-Enabled Scientific Services & Applications (Calculators)  

NSDL National Science Digital Library

Anyone without access to a statistical software package may find this Web site to be a valuable tool. A wide variety of free online utilities are offered, including data and equation plotting, regression analysis, and scientific forecasting. The applications' interfaces are very straightforward, and many options are available for users to input their data and customize the desired output. No explanation of the applications' functions and settings is included. This is not necessarily a problem, however, since it is expected that users will know what kind of statistical analyses they want to perform on their data beforehand.

184

A Service-Oriented Framework for Hybrid Immersive Web Applications  

Microsoft Academic Search

Immersive Web (IW for short) applications such as Second Life and SimCity are increasingly popular among individual users and companies. However, it is difficult to build a hybrid Immersive Web application, because of the different architectures used for building such IW applications. In this paper, we propose a service-oriented framework to support the mashup of heterogeneous IW applications for hybrid

Lijun Mei; Yimin Wang; Qicheng Li; Jian Wang; Ziyu Zhu

2011-01-01

185

Dynamically accelerating client-side web applications through decoupled execution  

Microsoft Academic Search

The emergence and wide adoption of web applications have moved the client-side component, often written in JavaScript, to the forefront of computing on the web. Web application developers try to move more computation to the client side to avoid unnecessary network traffic and make the applications more responsive. Therefore, JavaScript applications are becoming larger and more computation intensive. Trace-based just-in-time

Mojtaba Mehrara; Scott A. Mahlke

2011-01-01

186

Implementing a secure client/server application  

SciTech Connect

There is an increasing rise in attacks and security breaches on computer systems. Particularly vulnerable are systems that exchange user names and passwords directly across a network without encryption. These kinds of systems include many commercial-off-the-shelf client/server applications. A secure technique for authenticating computer users and transmitting passwords through the use of a trusted {open_quotes}broker{close_quotes} and public/private keys is described in this paper.

Kissinger, B.A.

1994-08-01

187

WIRM: An Open Source Toolkit for Building Biomedical Web Applications  

PubMed Central

This article describes an innovative software toolkit that allows the creation of web applications that facilitate the acquisition, integration, and dissemination of multimedia biomedical data over the web, thereby reducing the cost of knowledge sharing. There is a lack of high-level web application development tools suitable for use by researchers, clinicians, and educators who are not skilled programmers. Our Web Interfacing Repository Manager (WIRM) is a software toolkit that reduces the complexity of building custom biomedical web applications. WIRM’s visual modeling tools enable domain experts to describe the structure of their knowledge, from which WIRM automatically generates full-featured, customizable content management systems. PMID:12386108

Jakobovits, Rex M.; Rosse, Cornelius; Brinkley, James F.

2002-01-01

188

Applications for cyber security - System and application monitoring  

SciTech Connect

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01

189

Developing Provable Secure M-Commerce Applications  

Microsoft Academic Search

\\u000a We present a modeling framework and a verification technique for m-commerce applications. Our approach supports the development\\u000a of secure communication protocols for such applications as well as the refinement of the abstract protocol descriptions into\\u000a executable Java code without any gap. The technique is explained using an interesting m-commerce application, an electronic\\u000a ticketing system for cinema tickets. The verification has

Holger Grandy; Dominik Haneberg; Wolfgang Reif; Kurt Stenzel

2006-01-01

190

AnnotateGenomicRegions: a web application  

PubMed Central

Background Modern genomic technologies produce large amounts of data that can be mapped to specific regions in the genome. Among the first steps in interpreting the results is annotation of genomic regions with known features such as genes, promoters, CpG islands etc. Several tools have been published to perform this task. However, using these tools often requires a significant amount of bioinformatics skills and/or downloading and installing dedicated software. Results Here we present AnnotateGenomicRegions, a web application that accepts genomic regions as input and outputs a selection of overlapping and/or neighboring genome annotations. Supported organisms include human (hg18, hg19), mouse (mm8, mm9, mm10), zebrafish (danRer7), and Saccharomyces cerevisiae (sacCer2, sacCer3). AnnotateGenomicRegions is accessible online on a public server or can be installed locally. Some frequently used annotations and genomes are embedded in the application while custom annotations may be added by the user. Conclusions The increasing spread of genomic technologies generates the need for a simple-to-use annotation tool for genomic regions that can be used by biologists and bioinformaticians alike. AnnotateGenomicRegions meets this demand. AnnotateGenomicRegions is an open-source web application that can be installed on any personal computer or institute server. AnnotateGenomicRegions is available at: http://cru.genomics.iit.it/AnnotateGenomicRegions. PMID:24564446

2014-01-01

191

Piazza: data management infrastructure for semantic web applications  

Microsoft Academic Search

The Semantic Web envisions a World Wide Web in which data is described with rich semantics and applications can pose complex queries. To this point, researchers have defined new languages for specifying meanings for concepts and developed techniques for reasoning about them, using RDF as the data model. To flourish, the Semantic Web needs to be able to accommodate the

Alon Y. Halevy; Zachary G. Ives; Peter Mork; Igor Tatarinov

2003-01-01

192

A personal agent application for the semantic web Subhash Kumar  

E-print Network

A personal agent application for the semantic web Subhash Kumar , Anugeetha Kunjithapatham, Mithun University of Maryland Baltimore County Baltimore MD 21250 USA Abstract The Semantic Web is a vision agents and in particular personal assistants that can better function and thrive on the Semantic Web than

Finin, Tim

193

3 Ontology-based Information Visualization: Towards Semantic Web Applications  

E-print Network

3 Ontology-based Information Visualization: Towards Semantic Web Applications Christiaan Fluit, Marta Sabou and Frank van Harmelen 3.1 Introduction The Semantic Web is an extension of the current yet unheard of. Rather than being merely a vision, the Semantic Web has significant backing from

van Harmelen, Frank

194

Relational Markov Models and their Application to Adaptive Web Navigation  

E-print Network

architecture for personalizing web sites. We present experiments on an e-commerce and an academic web site is a state and each hyperlink is a possible transition. Classes of pages for an e-commerce site includeRelational Markov Models and their Application to Adaptive Web Navigation Corin R. Anderson Dept

Anderson, Richard

195

APFEL Web: a web-based application for the graphical visualization of parton distribution functions  

E-print Network

We present APFEL Web, a web-based application designed to provide a flexible user-friendly tool for the graphical visualization of parton distribution functions (PDFs). In this note we describe the technical design of the APFEL Web application, motivating the choices and the framework used for the development of this project. We document the basic usage of APFEL Web and show how it can be used to provide useful input for a variety of collider phenomenological studies. Finally we provide some examples showing the output generated by the application.

Stefano Carrazza; Alfio Ferrara; Daniele Palazzo; Juan Rojo

2015-02-26

196

Designing software architectures to facilitate accessible Web applications  

Microsoft Academic Search

The Web application is increasingly a platform of choice for complex business software and online services. However, it remains a challenge to ensure that the Web application is easy, efficient, and effective for people with disabilities. Accessibility requires that users with disabilities, including those who are blind, have low vision, or have mobility impairments, are able to use the applications

David Hoffman; Eric Grivel; Lisa Battle

2005-01-01

197

Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application  

ERIC Educational Resources Information Center

Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

2012-01-01

198

Security Models and Requirements for Healthcare Application Clouds  

E-print Network

an EHR security reference model for managing security issues in healthcare clouds, which highlights three computing. B. Security and Privacy Issues in Healthcare Research on the various security issues surroundingSecurity Models and Requirements for Healthcare Application Clouds Rui Zhang 1,2 and Ling Liu 1 1

Liu, Ling

199

Web Based Training (WEB BT) TES employees can get free training on applications within  

E-print Network

Web Based Training (WEB BT) TES employees can get free training on applications within office applications and more. Each tutorial can last up to 4 hours. TES schedules training time, in the TES Office, for temporary employees. Since space is limited, please be sure you can meet the following criteria prior

Tsien, Roger Y.

200

MEMS and MOEMS for national security applications  

NASA Astrophysics Data System (ADS)

Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

Scott, Marion W.

2003-01-01

201

Power laser application for security glass production  

Microsoft Academic Search

Modern glass application needs to move from traditional tempering with only average controlled fragmentation of security glass to computerized controlled fragmentation by developing engineered stress profiles in glass article. The new treatment methods of soda-lime float glass using irradiation by power Nd:YAG laser which is moved by robot will be discussed. The transparency of glass for laser wavelength is one

Vladimir Abashkin; Elena Achimova

2009-01-01

202

Virtual Browser: a Web-Level Sandbox to Secure Third-party JavaScript without Sacrificing Functionality  

E-print Network

Virtual Browser: a Web-Level Sandbox to Secure Third-party JavaScript without Sacrificing@u.northwestern.edu, ychen@northwestern.edu ABSTRACT Third-party JavaScript offers much more diversity to Web and its, all the existing works in this area can secure only a subset of third-party JavaScript. At the same

Kuzmanovic, Aleksandar

203

Automated Functional Testing based on the Navigation of Web Applications  

E-print Network

Web applications are becoming more and more complex. Testing such applications is an intricate hard and time-consuming activity. Therefore, testing is often poorly performed or skipped by practitioners. Test automation can help to avoid this situation. Hence, this paper presents a novel approach to perform automated software testing for web applications based on its navigation. On the one hand, web navigation is the process of traversing a web application using a browser. On the other hand, functional requirements are actions that an application must do. Therefore, the evaluation of the correct navigation of web applications results in the assessment of the specified functional requirements. The proposed method to perform the automation is done in four levels: test case generation, test data derivation, test case execution, and test case reporting. This method is driven by three kinds of inputs: i) UML models; ii) Selenium scripts; iii) XML files. We have implemented our approach in an open-source testing fra...

García, Boni; 10.4204/EPTCS.61.4

2011-01-01

204

Building an Online Course Application with Java Web Service  

Microsoft Academic Search

This case study called online course application with Java Web Services. It demonstrates the procedures to build a Java Web Service in an AXIS-Tomcat three-tier J2EE environment and the advantages of using Java Web Services. With automated build scripts, it also demonstrates the power of XML based scripts that can help us to build and develop a J2EE application easily.

Xuan Lai

205

Secure Computation for Biometric Data Security - Application to Speaker Verification  

Microsoft Academic Search

The goal of this research is to develop provable secure computation techniques for two biometric security tasks in complex distributed systems involving multiple parties; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed. We then discuss the secure computation techniques for retrieval and authentication

Bon K. Sy

2009-01-01

206

Building Trust Through Secure Web Sites. The Systems Librarian  

ERIC Educational Resources Information Center

Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…

Breeding, Marshall

2005-01-01

207

KnittingFactory: An Infrastructure for Distributed Web Applications  

E-print Network

perspective for Web applications, some problems are still unsolved. Among these are the question of how JavaKnittingFactory: An Infrastructure for Distributed Web Applications TR 1997­748 A. Baratloo, M Sciences New York University November 13, 1997 Abstract While Java and applets have created a new

208

KnittingFactory: An Infrastructure for Distributed Web Applications  

E-print Network

perspective for Web applications, some problems are still unsolved. Among these are the question of how JavaKnittingFactory: An Infrastructure for Distributed Web Applications TR 1997--748 A. Baratloo, M Sciences New York University November 13, 1997 Abstract While Java and applets have created a new

209

O'SOAP -A Web Services Framework for DDDAS Applications  

E-print Network

O'SOAP - A Web Services Framework for DDDAS Applications Keshav Pingali1 and Paul Stodghill1 services development are ill-suited for DDDAS applications. We describe O'SOAP, a new framework for web-physics simula- tion developed using O'SOAP and show that O'SOAP is able to deliver excellent performance

Stodghill, Paul

210

Comprehending Web Applications by a Clustering Based Approach  

Microsoft Academic Search

The number and complexity of Web applications are increasing dramatically to satisfy market needs, and the need of effective approaches for comprehending them is growing accordingly. Recently, reverse engineering methods and tools have been proposed to support the comprehension of a Web application; the information recovered by these tools is usually rendered in graphical representations. However, the graphical representations become

Giuseppe A. Di Lucca; Anna Rita Fasolino; F. Pace; Porfirio Tramontana; Ugo De Carlini

2002-01-01

211

Identifying Cross Site Scripting Vulnerabilities in Web Applications  

Microsoft Academic Search

Cross site scripting (XSS) is a vulnerability of a Web application that is essentially caused by the failure of the application to check up on user input before returning it to the client's Web browser. Without an adequate validation, user input may include malicious code that may be sent to other clients and unexpectedly executed by their browsers, thus causing

Giuseppe A. Di Lucca; Anna Rita Fasolino; M. Mastoianni; Porfirio Tramontana

2004-01-01

212

Re-engineering legacy Web applicationsinto Rich Internet Applications  

Microsoft Academic Search

There is a current trend in the industry to migrate its traditional Web applications to Rich Internet Applications (RIAs). To face this migration, traditional Web methodologies are being extended with new RIA modeling primitives. However, this re-engineering process is being figured out in an ad-hoc manner by introducing directly these new features in the models, crosscutting the old functionality and

Roberto Rodr'iguez-Echeverr'ia; Jose M. Conejero; Marino Linaje; Juan Preciado; Fernando S'anchez-Figueroa

2010-01-01

213

Realistic Load Testing of Web Applications Dirk Draheim  

E-print Network

current tools for load testing support the creation of simple test cases consisting of a fixed sequenceRealistic Load Testing of Web Applications Dirk Draheim Institute of Computer Science Freie approach for performing load testing of web applications by simulating realistic user behaviour

Grundy, John

214

Photonic sensor applications in transportation security  

NASA Astrophysics Data System (ADS)

There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.

Krohn, David A.

2007-09-01

215

Improving target acquisition in Web applications with link prediction  

E-print Network

Web application users spend considerable time clicking on hyperlinks and buttons to complete frequent tasks. Individual application developers can optimize their interfaces to improve typical usage; however, no single task ...

Hanna, Roger B

2007-01-01

216

SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking  

E-print Network

. Instead, users log in to a web site using a smartphone app and then transfer the entire session, including authentication is vulnerable to malware on the client's computer and that users logging in from untrusted many elegant proposals have tried to im- prove user authentication by using a smartphone as a security

Boneh, Dan

217

Where Did All the Data Go? Internet Security for Web-based Assessments.  

ERIC Educational Resources Information Center

Outlines a series of security steps that might be taken by researchers or organizations that are contemplating Web-based tests and performance assessments. Focuses on what can be done to avoid the loss, compromising, or modification of data collected by or stored through the Internet. (SLD)

Shermis, Mark D.; Averitt, Jason

2002-01-01

218

Exploiting the Gap between Human and Machine Abilities in Handwriting Recognition for Web Security  

E-print Network

Exploiting the Gap between Human and Machine Abilities in Handwriting Recognition for Web Security Govindaraju (chair) Peter Scott William Rapaport Abstract Automated recognition of unconstrained handwriting continues to be a challenging research task. In contrast to the traditional role of handwriting recognition

Govindaraju, Venu

219

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography  

Microsoft Academic Search

Elliptic Curve Cryptography (ECC) is emerging as an attractive alternative to traditional public-key cryptosys- tems (RSA, DSA, DH). ECC offers equivalent security with smaller key sizes resulting in faster computations, lower power consumption, as well as memory and bandwidth sav- ings. While these characteristics make ECC especially ap- pealing for mobile devices, they can also alleviate the com- putational burden

Vipul Gupta; Douglas Stebila; Stephen Fung; Sheueling Chang Shantz; Nils Gura; Hans Eberle

2004-01-01

220

Demonstration of the Web-based Interspecies Correlation Estimation (Web-ICE) modeling application  

EPA Science Inventory

The Web-based Interspecies Correlation Estimation (Web-ICE) modeling application is available to the risk assessment community through a user-friendly internet platform (http://epa.gov/ceampubl/fchain/webice/). ICE models are log-linear least square regressions that predict acute...

221

Managing the Evolution of Web-Based Applications with WebSCM  

Microsoft Academic Search

In traditional software, engineering tools, software configuration management (SCM) is the dominant approach to manage the evolution of a software system. However, the evolution of Web-based applications presents special challenges that have not been well addressed by existing SCM systems. They often treat hyperlinked Web documents as a set of text files in a file .system and disregard crucial structures

Tien Nhut Nguyen; Ethan V. Munson; Cheng Thao

2005-01-01

222

From Web Sites to Web Applications: New Issues for Conceptual Modeling  

Microsoft Academic Search

E-commerce, web-based booking systems, and on-line auction sys- tems are only a few examples that demonstrate how WWW sites are evolving from hypermedia information repositories to hypermedia distributed applica- tions, hereafter web applications. They blend navigation and browsing capabili- ties, common features of hypermedia, with \\

Luciano Baresi; Franca Garzotto; Paolo Paolini

2000-01-01

223

A Web of Things Application Architecture -Integrating the Real-World into the Web  

E-print Network

for a Common Internet of Things Application Architecture Application development with smart things: Requires of Internet of Things applications and bring it closer to non-specialists?» 15.08.2011 4Dominique Guinard [Mot Development in the Internet of Things [flickr.com/photos/docman] #12;Web of Things Application Architecture 15

224

Mobile web applications: bringing mobile apps and web together  

Microsoft Academic Search

The popularity of mobile applications is very high and still growing rapidly. These applications allow their users to stay connected with a large number of service providers in seamless fashion, both for leisure and productivity. But service prThe popularity of mobile applications is very high and still growing rapidly. These applications allow their users to stay connected with a large

Marie-Claire Forgue; Dominique Hazaël-Massieux

2012-01-01

225

Implementing an Online Writable Web Page System and Its Applications  

NASA Astrophysics Data System (ADS)

WWW has developed rapidly, and it is becoming easy to make personal web sites. In general, we create and edit web pages by using a HTML authoring software or writing HTML source codes in a text editor. Then, we need to upload them to a web server. When we make and build our own web pages by the existing tools, it takes a lot of time and effort to complete the necessary tasks. In this paper, we propose a home page authoring support system in which we directly edit and make web pages on a web browser. Current experimental results demonstrate that our system can effectively support novices to create their web pages. Also, we show two real-world applications that effectively utilize our system.

Nishi, Kentaro; Shintani, Toramatsu; Matsuo, Tokuro; Tashiro, Noriharu; Ito, Takayuki

226

Creating Web-Based Scientific Applications Using Java Servlets  

NASA Technical Reports Server (NTRS)

There are many advantages to developing web-based scientific applications. Any number of people can access the application concurrently. The application can be accessed from a remote location. The application becomes essentially platform-independent because it can be run from any machine that has internet access and can run a web browser. Maintenance and upgrades to the application are simplified since only one copy of the application exists in a centralized location. This paper details the creation of web-based applications using Java servlets. Java is a powerful, versatile programming language that is well suited to developing web-based programs. A Java servlet provides the interface between the central server and the remote client machines. The servlet accepts input data from the client, runs the application on the server, and sends the output back to the client machine. The type of servlet that supports the HTTP protocol will be discussed in depth. Among the topics the paper will discuss are how to write an http servlet, how the servlet can run applications written in Java and other languages, and how to set up a Java web server. The entire process will be demonstrated by building a web-based application to compute stagnation point heat transfer.

Palmer, Grant; Arnold, James O. (Technical Monitor)

2001-01-01

227

Creating Mashups by Direct Manipulation of Existing Web Applications  

Microsoft Academic Search

\\u000a We present an environment to enable people without programming knowledge to create mashups composed of Web components selected\\u000a directly from existing Web applications. The authoring environment allows the creation of communication among components originally\\u000a belonging to different applications. We report on some example application, the underlying architecture of the environment,\\u000a and a first user test.

Giuseppe Ghiani; Fabio Paternò; Lucio Spano

228

Web Application Design Using Server-Side JavaScript  

SciTech Connect

This document describes the application design philosophy for the Comprehensive Nuclear Test Ban Treaty Research & Development Web Site. This design incorporates object-oriented techniques to produce a flexible and maintainable system of applications that support the web site. These techniques will be discussed at length along with the issues they address. The overall structure of the applications and their relationships with one another will also be described. The current problems and future design changes will be discussed as well.

Hampton, J.; Simons, R.

1999-02-01

229

Detecting Concurrency Errors in Client-side JavaScript Web Applications  

E-print Network

Detecting Concurrency Errors in Client-side JavaScript Web Applications Shin Hong, Yongbae Park in client-side web applications written in JavaScript. WAVE generates various sequences of operations-world web applications. I. INTRODUCTION Web technologies including web browsers, JavaScript, and client

230

Compoweb: a component-oriented web architecture  

Microsoft Academic Search

In this paper, client-site Web mashups are studied from component-oriented perspective, and CompoWeb, a component- oriented Web architecture, is proposed. In CompoWeb, a Web application is decomposed into Web components called gadgets. A gadget is an abstraction of functional or logical Web component. It is isolated from other gadgets for security and reliability. Contract-based channels are the only way to

Rui Guo; Bin B. Zhu; Min Feng; Aimin Pan; Bosheng Zhou

2008-01-01

231

Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web: international.uga.edu Email: issis@uga.edu  

E-print Network

Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web and return, you will keep the same number. For additional information you may visit the Social Security with your new Social Security information. #12;

Hall, Daniel

232

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2012 CFR

...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

2012-04-01

233

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2014 CFR

...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

2014-04-01

234

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2013 CFR

...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

2013-04-01

235

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2011 CFR

...false Application for security deposit determination; information to be submitted; other... Insurance Carrier Security Deposit Requirements...203 Application for security deposit determination; information to be submitted;...

2011-04-01

236

Semantically Rich Application-Centric Security in Android  

Microsoft Academic Search

Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smart- phone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to

Machigar Ongtang; Stephen E. Mclaughlin; William Enck; Patrick Drew Mcdaniel

2009-01-01

237

Web Applications Design and Maintenance Using Symbolic Model Checking  

Microsoft Academic Search

We present an approach to automatic checking of the correctness of Web applications structure during their lifecycle. The approach adopts the well-established symbolic model checking technique and the associated tool SMV. A formalism allows the designer to describe the model of a Web-based system. Computation Tree Logic (CTL) is adopted as language to define the properties to be verified. The

Eugenio Di Sciascio; Francesco M. Donini; Marina Mongiello; Giacomo Piscitelli

2003-01-01

238

Ajax and Firefox: New Web Applications and Browsers  

ERIC Educational Resources Information Center

Alternative browsers are gaining significant market share, and both Apple and Microsoft are releasing OS upgrades which portend some interesting changes in Web development. Of particular interest for language learning professionals may be new developments in the area of Web browser based applications, particularly using an approach dubbed "Ajax."…

Godwin-Jones, Bob

2005-01-01

239

DEVELOPING GIS VISUALIZATION WEB SERVICES FOR GEOPHYSICAL APPLICATIONS  

E-print Network

DEVELOPING GIS VISUALIZATION WEB SERVICES FOR GEOPHYSICAL APPLICATIONS A. Sayar a,b. *, M. Pierce Commission II, WG II/2 KEY WORDS: GIS, Geophysics, Visualization, Internet/Web, Interoperability, Networks Information System (GIS) community. In this paper we will describe our group's efforts to implement GIS

240

Application of Mobile Agents in Web-Based Learning Environment.  

ERIC Educational Resources Information Center

Web-based learning environments are strongly driven by the information revolution and the Internet, but they have a number of common deficiencies, such as slow access, no adaptivity to the individual student, limitation by bandwidth, and more. This paper outlines the benefits of mobile agents technology, and describes its application in Web-based…

Hong Hong, Kinshuk; He, Xiaoqin; Patel, Ashok; Jesshope, Chris

241

A Top-Down Methodology for Building Corporate Web Applications.  

ERIC Educational Resources Information Center

Explains that a corporate Web application is a corporate information system that uses World Wide Web technology to provide access to a variety of corporate information resources for internal and external users in geographically distributed locations. Top-down development is explained, and design requirements are discussed. (Author/LRW)

Artz, John M.

1996-01-01

242

Towards the Definition of a Maintainability Model for Web Applications  

Microsoft Academic Search

The growing diffusion of Web-based services in many and different business domains has triggered the need for new Web applications (WAs). The pressing market demand imposes very short time for the development of new WAs, and frequent modifications for existing ones. Well-defined software processes and methodologies are rarely adopted both in the development and maintenance phases. As a consequence, WAs'

Giuseppe Antonio Di Lucca; Anna Rita Fasolino; Porfirio Tramontana; Corrado Aaron Visaggio

2004-01-01

243

Power laser application for security glass production  

NASA Astrophysics Data System (ADS)

Modern glass application needs to move from traditional tempering with only average controlled fragmentation of security glass to computerized controlled fragmentation by developing engineered stress profiles in glass article. The new treatment methods of soda-lime float glass using irradiation by power Nd:YAG laser which is moved by robot will be discussed. The transparency of glass for laser wavelength is one of the problems of glass treatment by laser. Noncontact stress control by light scattering will be shown. The two main objectives of this work will be discussed: 1. Glass treatment by power laser beam directed to secure glass production; 2. Control methods of residual stress into float glasses treated by laser.

Abashkin, Vladimir; Achimova, Elena

2010-05-01

244

User assigned security policy framework for m-commerce applications  

Microsoft Academic Search

M-Commerce is the ability to perform commercial transactions using mobile phones or other wireless devices on the move. It is a major application domain for mobile devices where applications require a high level of security. Generally, security policies are enforced by either Server Operating System or application authority for the specific user about its behavior to access the applications after

M. Aramudhan

2008-01-01

245

Web Applications: A Proposal to Improve Response Time and Its Application to MOODLE  

Microsoft Academic Search

This paper covers some of the most advanced optimization techniques for web servers and web applications applied to a Modular\\u000a Object Oriented Distance Learning Environment based on PHP 5 and Apache 2.

David Horat; Alexis Quesada-arencibia

2009-01-01

246

Web Application Programmer Fort Collins, Colorado  

E-print Network

a legacy of science-based decisions that sustain our resources for future generations. To learn more about activities. RESPONSIBILITIES The CEMML Geographic Information Systems (GIS) Lab is developing interactive web-based with code documentation and user documentation is desired. Experience with server-side PHP in web

247

Overview of .NET Framework Technologies for Building Web Applications and Services  

E-print Network

Overview of .NET Framework Technologies for Building Web Applications and Services ...for Java description of how to develop Web applications and services by using the .NET Framework. Instead ASP.NET MVC ...................................4 Web Services.....................................5

Hunt, Galen

248

Restricted access processor - An application of computer security technology  

NASA Technical Reports Server (NTRS)

This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

Mcmahon, E. M.

1985-01-01

249

Intrusion recovery for database-backed web applications  

E-print Network

Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

Chandra, Ramesh

250

An Object Oriented Approach to Web-Based Application Design  

Microsoft Academic Search

In this paper we discuss the use of an object-oriented approach for web-based applications design, based on a method named Object Oriented Hypermedia Design Method (OOHDM). We first motivate our work discussing the problems encountered while designing large scale, dynamic web-based applications, which combine complex navigation patterns with sophisticated computational behavior. We argue that a method providing systematic guidance to

Daniel Schwabe; Gustavo Rossi

251

Community-Oriented Models and Applications for the Social Web  

E-print Network

COMMUNITY-ORIENTED MODELS AND APPLICATIONS FOR THE SOCIAL WEB A Dissertation by SAID MASOUD ALI KASHOOB Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR... OF PHILOSOPHY May 2011 Major Subject: Computer Engineering COMMUNITY-ORIENTED MODELS AND APPLICATIONS FOR THE SOCIAL WEB A Dissertation by SAID MASOUD ALI KASHOOB Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment...

Kashoob, Said Masoud Ali

2012-07-16

252

Development of a Web-based financial application System  

NASA Astrophysics Data System (ADS)

The paper describes a technique to develop a web based financial system, following latest technology and business needs. In the development of web based application, the user friendliness and technology both are very important. It is used ASP .NET MVC 4 platform and SQL 2008 server for development of web based financial system. It shows the technique for the entry system and report monitoring of the application is user friendly. This paper also highlights the critical situations of development, which will help to develop the quality product.

Hasan, M. R.; Ibrahimy, M. I.; Motakabber, S. M. A.; Ferdaus, M. M.; Khan, M. N. H.; Mostafa, M. G.

2013-12-01

253

COEUS: “semantic web in a box” for biomedical applications  

PubMed Central

Background As the “omics” revolution unfolds, the growth in data quantity and diversity is bringing about the need for pioneering bioinformatics software, capable of significantly improving the research workflow. To cope with these computer science demands, biomedical software engineers are adopting emerging semantic web technologies that better suit the life sciences domain. The latter’s complex relationships are easily mapped into semantic web graphs, enabling a superior understanding of collected knowledge. Despite increased awareness of semantic web technologies in bioinformatics, their use is still limited. Results COEUS is a new semantic web framework, aiming at a streamlined application development cycle and following a “semantic web in a box” approach. The framework provides a single package including advanced data integration and triplification tools, base ontologies, a web-oriented engine and a flexible exploration API. Resources can be integrated from heterogeneous sources, including CSV and XML files or SQL and SPARQL query results, and mapped directly to one or more ontologies. Advanced interoperability features include REST services, a SPARQL endpoint and LinkedData publication. These enable the creation of multiple applications for web, desktop or mobile environments, and empower a new knowledge federation layer. Conclusions The platform, targeted at biomedical application developers, provides a complete skeleton ready for rapid application deployment, enhancing the creation of new semantic information systems. COEUS is available as open source at http://bioinformatics.ua.pt/coeus/. PMID:23244467

2012-01-01

254

Secure Web-based Ground System User Interfaces over the Open Internet  

NASA Technical Reports Server (NTRS)

A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

Langston, James H.; Murray, Henry L.; Hunt, Gary R.

1998-01-01

255

NEWT: A RESTful service for building High Performance Computing web applications  

Microsoft Academic Search

The NERSC Web Toolkit (NEWT) brings High Performance Computing (HPC) to the web through easy to write web applications. Our work seeks to make HPC resources more accessible and useful to scientists who are more comfortable with the web than they are with command line interfaces. The effort required to get a fully functioning web application is decreasing, thanks to

Shreyas Cholia; David Skinner; Joshua Boverhof

2010-01-01

256

Semantic Web Application Areas , C. Bussler2  

E-print Network

potential". Tim Berners-Lee, Director of the World Wide Web Consortium, referred to the future that extends far beyond current capabilities ([Berners-Lee et al., 2001], [Fensel & Musen, 2001]). The explicit

Menczer, Filippo

257

Cloud-enabled Web Applications for Environmental Modelling  

NASA Astrophysics Data System (ADS)

In order to integrate natural and social science, especially in the light of current environmental legislation, efficient management and decision making requires environmental modelling to be easily accessible, portable and flexible. Deploying models as web applications is a feasible solution to some of the above issues. However migrating desktop-based modelling platforms to web based applications is not trivial. The framework in which the models are deployed should comply with worldwide accepted web standards to allow interoperability and ease exchange of information with external sources. Also the chosen models should guarantee a certain degree of flexibility to adapt the modelling exercise to different purposes. In this study we propose an innovative approach to web-modelling, developed as part of the NERC's Environmental Virtual Observatory pilot (EVOp) project for the UK. The proposed approach combines the use of Google Maps APIs to explore available data and the PyWPS implementation of the Open Geospatial Consortium Web Processing Service standard (OGC-WPS) to deploy models implemented in programming languages such as R and Python. As proof-of-concept, a web application was implemented, on the EVOp portal, to assist local communities with local flooding in the Eden catchment in Cumbria (UK). The application simulates the impact of land-use scenarios using the hydrological model Topmodel (Beven and Kirkby, 1979) implemented as a web service using the aforementioned approach. Current developments include the implementation of web applications for diffuse pollution, which adopts the Export Coefficient Model (Jones, 1996), and national flooding which utilises the hydrological model ensemble FUSE (Clark et al., 2008). Topmodel and FUSE are already exposed as stateless OGC-compliant web services. In the future we also aim to produce tools to help manage drought impacts and ecosystem services. The authors would like to thank the valuable contributions of the whole EVOp team.

Vitolo, C.; Buytaert, W.; El-khatib, Y.; Gemmell, A. L.; Reaney, S. M.; Beven, K.

2012-12-01

258

Abstracting Business Level UML Diagrams from Web Applications  

Microsoft Academic Search

In this paper, a reverse engineering approach for reconstructing UML diagrams at business level of the application domain of a Web application is presented. In particular, the approach allows the reconstruction of the UML class diagram providing an object-oriented conceptual model of the application domain, sequence diagrams modeling the interactions among the identified business objects and use case diagrams modeling

Giuseppe Antonio Di Lucca; Anna Rita Fasolino; Porfirio Tramontana; Ugo De Carlini

2003-01-01

259

Integrated of Learning Management Systems and Web Applications using Web Services  

Microsoft Academic Search

Modern o-the-shelf learning management systems are mostly based on the Web paradigm. If external learning resources have to be integrated into a course, it stands to reason that Web protocols can be applied as well. But collaboration can be di cult when courses need to access a complex legacy application. This article suggests a exible and easy-to-use approach for a

K. Friesen; N. Mazloumi

2004-01-01

260

Passive terahertz imaging for security application  

NASA Astrophysics Data System (ADS)

The passive detection is safe for passengers and operators as no radiation. Therefore, passive terahertz (THz) imaging can be applied to human body security check. Imaging in the THz band offers the unique property of being able to identify object through a range of materials. Therefore passive THz imaging is meaningful for security applications. This attribute has always been of interest to both the civil and military marks with applications. We took advantage of a single THz detector and a trihedral scanning mirror to propose another passive THz beam scanning imaging method. This method overcame the deficiencies of the serious decline in image quality due to the movement of the focused mirror. We exploited a THz scanning mirror with a trihedral scanning mirror and an ellipsoidal mirror to streamline the structure of the system and increase the scanning speed. Then the passive THz beam scanning imaging system was developed based on this method. The parameters were set as follows: the best imaging distance was 1.7m, the image height was 2m, the image width was 1m, the minimum imaging time of per frame was 8s, and the minimum resolution was 4cm. We imaged humans with different objects hidden under their clothes, such as fruit knife, belt buckle, mobile phone, screwdriver, bus cards, keys and other items. All the tested stuffs could be detected and recognized from the image.

Guo, Lan-tao; Deng, Chao; Zhao, Yuan-meng; Zhang, Cun-lin

2013-08-01

261

Video performance for high security applications.  

SciTech Connect

The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

Connell, Jack C.; Norman, Bradley C.

2010-06-01

262

A security evaluation of a novel resilient web serving architecture: Lessons learned through industry\\/academia collaboration  

Microsoft Academic Search

We have previously developed a virtualization-based web serving architecture and a prototype to enhance web service resilience under cyber attack. The proposed system utilizes replicated virtual servers managed by a closed-loop feedback controller without humans in the loop. We have replicated the prototype at the Raytheon Company, which conducted a thorough penetration test and security examination. In this paper, we

Yih Huang; Anup K. Ghosh; Tom Bracewell; Brian Mastropietro

2010-01-01

263

Management of Network Security Applications Philip C. Hyland  

E-print Network

with the Simple Network Management Protocol (SNMP). Security applications are assessed for value of management via, privacy, performance, and reliability are growing. The rapid deployment of new secu- rity technology needs that counter security risks with controls and pro- tective measures. Security policy has a direct impact

Sandhu, Ravi

264

Radiation Detection for Homeland Security Applications  

NASA Astrophysics Data System (ADS)

In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

Ely, James

2008-05-01

265

Interactive, Secure Web-enabled Aircraft Engine Simulation Using XML Databinding Integration  

NASA Technical Reports Server (NTRS)

This paper discusses the detailed design of an XML databinding framework for aircraft engine simulation. The framework provides an object interface to access and use engine data. while at the same time preserving the meaning of the original data. The Language independent representation of engine component data enables users to move around XML data using HTTP through disparate networks. The application of this framework is demonstrated via a web-based turbofan propulsion system simulation using the World Wide Web (WWW). A Java Servlet based web component architecture is used for rendering XML engine data into HTML format and dealing with input events from the user, which allows users to interact with simulation data from a web browser. The simulation data can also be saved to a local disk for archiving or to restart the simulation at a later time.

Lin, Risheng; Afjeh, Abdollah A.

2003-01-01

266

A Combined Runtime Environment and Web-Based Development Environment for Web Application Engineering  

Microsoft Academic Search

\\u000a In the last 5 years, server side application server technology became very popular. The two most popular, .NET and J2EE have\\u000a a large mindshare in the commercial world. Application servers have raised the productivity of server side web developers.\\u000a In this paper we give a short overview of the history of application servers, and try to answer the question: what

Martijn Van Berkum; Sjaak Brinkkemper; Arthur Meyer

2004-01-01

267

Web services-oriented architectures for mobile SOLAP applications  

Microsoft Academic Search

With the growing popularity of mobile computing and the empowerment of mobile devices by high end-users and decision-makers, the development of architectures based on web services for the deployment of mobile Spatial OLAP (SOLAP) applications is being perceived as a powerful solution. This paper deals with geospatial (web) Services-Oriented Architectures (SOA) for mobile processing of geo-decisional information. The paper first

Thierry Badard; Yvan Bédard; Frederic Hubert; Eveline Bernier; Etienne Dube

2008-01-01

268

An Object-Oriented Approach to Automate Web Applications Development  

Microsoft Academic Search

This paper presents the Object-Oriented Web-Solutions Modeling approach (OOWS), which provides mechanisms to deal with the\\u000a development of hypermedia information systems and e-commerce applications in web environments. It is proposed as an extension\\u000a of an object-oriented method for automatic code generation based on conceptual models (OO-Method). The main contribution of\\u000a this work is the introduction of a navigational model that

Oscar Pastor; Silvia Mara Abrahão; Joan Fons

2001-01-01

269

Students as Designers of Semantic Web Applications  

ERIC Educational Resources Information Center

This paper draws upon the experience of an interdisciplinary research group in engaging undergraduate university students in the design and development of semantic web technologies. A flexible approach to participatory design challenged conventional distinctions between "designer" and "user" and allowed students to play a role in developing…

Tracy, Fran; Jordan, Katy

2012-01-01

270

Realizing Mobile Web Services for Dynamic Applications  

E-print Network

such mobile web services based on the standard protocol stack is often inappropriate for resource-restricted mo- bile devices in dynamic networks. On the other hand, using specialized alternative protocols service consumers and providers by allowing to integrate multiple protocols depending

Hamburg.Universität

271

A widget library for creating policy-aware semantic Web applications  

E-print Network

In order to truly reap the benefits of the Semantic Web, there must be adequate tools for writing Web applications that aggregate, view, and edit the widely varying data the Semantic Web makes available. As a step toward ...

Hollenbach, James Dylan

2010-01-01

272

Aspect-Oriented Development of PHP-Based Web Applications  

Microsoft Academic Search

Web applications, which are sometimes developed incrementally and iteratively, may result in program codes that are poorly organized. The notion of aspect can theoretically be introduced for better modularization, but trials occasionally fail because homogeneous aspects alone are not adequate. The approach taken here is to introduce feature analysis and to radically use heterogeneous aspects to implement identified application features.

Shin NAKAJIMA; Keiji HOKAMURA; Naoyasu UBAYASHI

2010-01-01

273

Spidergl: a Graphics Library for 3d Web Applications  

NASA Astrophysics Data System (ADS)

The recent introduction of the WebGL API for leveraging the power of 3D graphics accelerators within Web browsers opens the possibility to develop advanced graphics applications without the need for an ad-hoc plug-in. There are several contexts in which this new technology can be exploited to enhance user experience and data fruition, like e-commerce applications, games and, in particular, Cultural Heritage. In fact, it is now possible to use the Web platform to present a virtual reconstruction hypothesis of ancient pasts, to show detailed 3D models of artefacts of interests to a wide public, and to create virtual museums. We introduce SpiderGL, a JavaScript library for developing 3D graphics Web applications. SpiderGL provides data structures and algorithms to ease the use of WebGL, to define and manipulate shapes, to import 3D models in various formats, and to handle asynchronous data loading. We show the potential of this novel library with a number of demo applications and give details about its future uses in the context of Cultural Heritage applications.

Di Benedetto, M.; Corsini, M.; Scopigno, R.

2011-09-01

274

INSTITUTE FOR CYBER SECURITY Application-Centric Security Models  

E-print Network

Develops into a NIST/ANSI Standard (2004) Usage Control (UCON) Model (2004) Attribute-Based Access for Cyber Security (ICS) Founded 2007 Dark Screen Exercises and Training National Collegiate Cyber Defense research Role-Based Access Control (RBAC) Model (1996) Catalyzes dominance of RBAC in commercial systems

Sandhu, Ravi

275

Semantically Rich Application-Centric Security in Android  

E-print Network

paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as

Machigar Ongtang; Stephen Mclaughlin; William Enck; Patrick Mcdaniel

2009-01-01

276

Security for XML messaging services - a component-based approach  

Microsoft Academic Search

The objective of this paper is to throw light on the application of component technology in deploying security models to protect web transactions. The proposed component-based security model is an alternative methodology for conventional methods that are vendor dependent. This model uses Extensible Markup Language (XML) format to represent web transactions, because of the multi-platform nature of modern web applications.

K. Komathy; V. Ramachandran; P. Vivekanandan

2003-01-01

277

Network accessible security Web-based camera server system using index search algorithm  

Microsoft Academic Search

Existing analog monitoring camera systems can save and retrieve data only in a limited space within a short distance, and they have many constraints preventing their development in various application systems. However, on the back of the development of network and computer technologies, a monitoring camera system can be controlled from a remote location by a Web browser without space

Mike Myung-Ok Lee; Chil-Woo Lee; Young-Cheol Kim

2001-01-01

278

Remote recordable security Web-based camera server system using index search algorithm  

Microsoft Academic Search

As an existing analog monitoring camera system could save and retrieve data only in a limited space within a short distance, it had many constraints in developing into various application systems. However, on the back of the development of network and computer technologies, a camera monitoring system can be controlled from a remote location by a Web browser without space

Mike Myung-Ok Lee; Chil-Woo Lee

2001-01-01

279

Scoring recognizability of faces for security applications  

NASA Astrophysics Data System (ADS)

In security applications the human face plays a fundamental role, however we have to assume non-collaborative subjects. A face can be partially visible or occluded due to common-use accessories such as sunglasses, hats, scarves and so on. Also the posture of the head influence the face recognizability. Given a video sequence in input, the proposed system is able to establish if a face is depicted in a frame, and to determine its degree of recognizability in terms of clearly visible facial features. The system implements features filtering scheme combined with a skin-based face detection to improve its the robustness to false positives and cartoon-like faces. Moreover the system takes into account the recognizability trend over a customizable sliding time window to allow a high level analysis of the subject behaviour. The recognizability criteria can be tuned for each specific application. We evaluate our system both in qualitative and quantitative terms, using a data set of manually annotated videos. Experimental results confirm the effectiveness of the proposed system.

Bianco, Simone; Ciocca, Gianluigi; Guarnera, Giuseppe Claudio; Scaggiante, Andrea; Schettini, Raimondo

2014-03-01

280

Acoustic cueing for surveillance and security applications  

NASA Astrophysics Data System (ADS)

Acoustic sensing systems are used to detect, localize, track and classify sources of military interest in real time with negligible false alarm rates. Automated acoustic systems are able to cue response systems and devices such as cameras for source identification. Two defense applications are demonstrated: one involves remote land-based surveillance where an array of unattended passive acoustic ground sensors automatically cues a day/night camera to observe the passage of ground vehicles, the landing of air vehicles on an isolated air strip, and the transit of motor-powered watercraft in estuarine waters. The video imagery is compressed and relayed via satellite to a central monitoring facility for input to the decision and intelligence processes. The other application is for in-harbor force protection and port infrastructure security where a high-frequency high-resolution monostatic active sonar automatically detects, localizes and tracks fast inshore surface watercraft in real time. A cavitating propeller forms a bubble wake that lasts several minutes and is highly reflective of the incident sonar energy. The wake, which traces the trajectory of the watercraft, is clearly delineated on the sonar display. The active sonar reliably estimates the instantaneous position of the moving source at each point along its path of travel. The sonar can be used to pan an imaging device to aid identification of the moving source or to vector autonomous response craft for intercept purposes.

Ferguson, Brian G.; Lo, Kam W.

2006-05-01

281

Object Capabilities and Isolation of Untrusted Web Applications  

Microsoft Academic Search

A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing approach for isolating untrusted content: if separate applications are provided disjoint capabilities, a sound object-capability framework should prevent untrusted applications from interfering with each other, without preventing interaction with the user or the hosting page. In

Sergio Maffeis; John C. Mitchell; Ankur Taly

2010-01-01

282

Automating regression testing using web-based application similarities  

Microsoft Academic Search

Web-based applications are one of the most widely used types of software, and have become the backbone of many e-commerce\\u000a and communications businesses. These applications are often mission-critical for many organizations, motivating their precise\\u000a validation. Although regression testing has been widely used to gain confidence in the reliability of software by providing\\u000a information about the quality of an application, it

Kinga Dobolyi; Elizabeth Soechting; Westley Weimer

2011-01-01

283

Creating Commercial Web 2.0 Applications with Autodesk MapGuide Studio and DM Solutions  

E-print Network

Guide Open Source and the web development tools in Autodesk MapGuide Studio and DM Solutions Group's Fusion'll learn how to use the web development tool in Autodesk MapGuide Studio to develop and deploy web applications and DM Solutions Group's Fusion application development framework to develop interactive web

Ahmad, Sajjad

284

Web application for detailed real-time database transaction monitoring for CMS condition data  

NASA Astrophysics Data System (ADS)

In the upcoming LHC era, database have become an essential part for the experiments collecting data from LHC, in order to safely store, and consistently retrieve, a wide amount of data, which are produced by different sources. In the CMS experiment at CERN, all this information is stored in ORACLE databases, allocated in several servers, both inside and outside the CERN network. In this scenario, the task of monitoring different databases is a crucial database administration issue, since different information may be required depending on different users' tasks such as data transfer, inspection, planning and security issues. We present here a web application based on Python web framework and Python modules for data mining purposes. To customize the GUI we record traces of user interactions that are used to build use case models. In addition the application detects errors in database transactions (for example identify any mistake made by user, application failure, unexpected network shutdown or Structured Query Language (SQL) statement error) and provides warning messages from the different users' perspectives. Finally, in order to fullfill the requirements of the CMS experiment community, and to meet the new development in many Web client tools, our application was further developed, and new features were deployed.

de Gruttola, Michele; Di Guida, Salvatore; Innocente, Vincenzo; Pierro, Antonio

2012-12-01

285

EMBEDDEDSYSTEMS Medinet is a Web-based  

E-print Network

of the necessary requirements for telemedicine appli- cations. More security is required for patient data than ON THE WORLD WIDE WEB The first Web-based telemedicine applications have demonstrated that the Web offers- works. Today's telemedicine applications have two main network requirements: they must enable

Abrardo, Andrea

286

Filtergraph: An interactive web application for visualization of astronomy datasets  

NASA Astrophysics Data System (ADS)

Filtergraph is a web application being developed and maintained by the Vanderbilt Initiative in Data-intensive Astrophysics (VIDA) to flexibly and rapidly visualize a large variety of astronomy datasets of various formats and sizes. The user loads a flat-file dataset into Filtergraph which automatically generates an interactive data portal that can be easily shared with others. From this portal, the user can immediately generate scatter plots of up to five dimensions as well as histograms and tables based on the dataset. Key features of the portal include intuitive controls with auto-completed variable names, the ability to filter the data in real time through user-specified criteria, the ability to select data by dragging on the screen, and the ability to perform arithmetic operations on the data in real time. To enable seamless data visualization and exploration, changes are quickly rendered on screen and visualizations can be exported as high quality graphics files. The application is optimized for speed in the context of large datasets: for instance, a plot generated from a stellar database of 3.1 million entries renders in less than 2 s on a standard web server platform. This web application has been created using the Web2py web framework based on the Python programming language. Filtergraph is free to use at http://filtergraph.vanderbilt.edu/.

Burger, Dan; Stassun, Keivan G.; Pepper, Joshua; Siverd, Robert J.; Paegert, Martin; De Lee, Nathan M.; Robinson, William H.

2013-08-01

287

SIGMA WEB INTERFACE FOR REACTOR DATA APPLICATIONS  

SciTech Connect

We present Sigma Web interface which provides user-friendly access for online analysis and plotting of the evaluated and experimental nuclear reaction data stored in the ENDF-6 and EXFOR formats. The interface includes advanced browsing and search capabilities, interactive plots of cross sections, angular distributions and spectra, nubars, comparisons between evaluated and experimental data, computations for cross section data sets, pre-calculated integral quantities, neutron cross section uncertainties plots and visualization of covariance matrices. Sigma is publicly available at the National Nuclear Data Center website at http://www.nndc.bnl.gov/sigma.

Pritychenko,B.; Sonzogni, A.A.

2010-05-09

288

A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web  

E-print Network

1 A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web Henry M;2 A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web Abstract This paper introduces a measurement ontology for applications to semantic Web applications, specifically for emerging

Dalkilic, Mehmet

289

Framework for Supporting Web-Based Collaborative Applications  

NASA Astrophysics Data System (ADS)

The article proposes an intelligent framework for supporting Web-based applications. The framework focuses on innovative use of existing resources and technologies in the form of services and takes the leverage of theoretical foundation of services science and the research from services computing. The main focus of the framework is to deliver benefits to users with various roles such as service requesters, service providers, and business owners to maximize their productivity when engaging with each other via the Web. The article opens up with research motivations and questions, analyses the existing state of research in the field, and describes the approach in implementing the proposed framework. Finally, an e-health application is discussed to evaluate the effectiveness of the framework where participants such as general practitioners (GPs), patients, and health-care workers collaborate via the Web.

Dai, Wei

290

Recent applications of thermal imagers for security assessment  

SciTech Connect

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01

291

SUPPORTING MOBILE GIS APPLICATIONS BY GEOSPATIAL WEB SERVICES  

Microsoft Academic Search

Spatial data infrastructures (SDI) providing geospatial web services as well as mobile GIS software become more and more popular. Fields like disaster management require the use of SDIs as well as of mobile applications. However, the scarce resources of mobile devices in respect of memory size, computing power, display size and communication bandwidth make an integration difficult and obstruct many

Thomas Brinkhoff

292

A component based methodology for Web application development  

Microsoft Academic Search

Today's enterprises increasingly rely on the Web to support their operations, global business alliances, and integration of their business processes with those of their suppliers, partners, and customers. In order to stay competitive, businesses, must also respond to changing business and competitive environments in near real-time. This requires that the architecture and design of business systems and applications should allow

Seung C. Lee; Ashraf I. Shirani

2004-01-01

293

Web-based application development: a software engineering approach  

Microsoft Academic Search

In contrast to the construction of centralised software systems which relies on a well established approach, there is a lack of a proven methodology that guides software engineers in building web-based applications. The focus is still on technology rather than analysis and design issues. However, just as the focus in software engineering shifted from programming to process thirty years ago,

Said Hadjerrouit

2001-01-01

294

The Adversarial Route Analysis Tool: A Web Application  

SciTech Connect

The Adversarial Route Analysis Tool is a type of Google maps for adversaries. It's a web-based Geospatial application similar to Google Maps. It helps the U.S. government plan operations that predict where an adversary might be. It's easily accessible and maintainble and it's simple to use without much training.

Casson, William H. Jr. [Los Alamos National Laboratory

2012-08-02

295

Aspect Oriented Navigation Modeling for Web Applications based on UML  

Microsoft Academic Search

Navigation modeling is one of the critical activities during Web application development. It is not enough to consider only the navigation modeling based on the elements of the problem domain: it is also necessary to take into account the description of the navigation associated with tasks (i.e. the navigation needed to obtain or provide the inputs for the operations of

Hernan Casalanguida; Juan Eduardo Duran

2009-01-01

296

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

SciTech Connect

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01

297

Application of Radial Function Neural Network in Network Security  

Microsoft Academic Search

With the widespread application of large and complicated network, network safety has become an important issue. In this paper, a security operation center (SOC) concept based on multi-sensor data fusion technology is presented from the viewpoint of the network security. A structure of a SOC system based on radial basis function neural (RBFN) network is proposed, and the detailed method

Yi Niu; Yi Chun Peng

2008-01-01

298

Creating HTML5 Offline Web Applications  

Microsoft Academic Search

\\u000a In this chapter, we will explore what you can do with offline HTML5 applications. HTML5 applications do not necessarily require\\u000a constant access to the network, and loading cached resources can now be more flexibly controlled by developers.

Peter Lubbers; Brian Albers; Frank Salim

299

An Object Oriented Approach to Web-Based Applications Design  

Microsoft Academic Search

In this paper we discuss the use of an object-oriented approach forweb-based applications design, based on a method named Object OrientedHypermedia Design Method (OOHDM).We first motivate our work discussing the problems encounteredwhile designing large scale, dynamic web-based applications, which combinecomplex navigation patterns with sophisticated computational behavior. Weargue that a method providing systematic guidance to design is needed. Next,we introduce OOHDM,

Daniel Schwabe; Gustavo Rossi

1998-01-01

300

Web-Based Application for Electric Circuit Analysis  

Microsoft Academic Search

This paper presents web-based application for analysis of electric and electronic circuit. The application is based on PHP scripts and use Spice and Maple with PraCAn package as a computation engine. Continuous-time linear and nonlinear circuits as well as periodically switched linear (PSL) circuits can be analyzed. Results can be obtained in symbolic form for case of linear circuits. Description

J. Bicak

2009-01-01

301

Design and Implementation of a PHP-based Web Server for the Tele-Lab IT Security  

Microsoft Academic Search

The Tele-Lab IT Security project aims at specifying and implementing a web-based, intelligent tutoring system that allows computer science students, sys- tem administrators, and end users to get familiar with the basics of IT security. It provides a powerful, real-life working environment in which users can develop and practice solutions for problems of their every-day work with only little support

Michael Schmitt II; Christoph Meinel

2003-01-01

302

A Semantic Sensor Web for Environmental Decision Support Applications  

PubMed Central

Sensing devices are increasingly being deployed to monitor the physical world around us. One class of application for which sensor data is pertinent is environmental decision support systems, e.g., flood emergency response. For these applications, the sensor readings need to be put in context by integrating them with other sources of data about the surrounding environment. Traditional systems for predicting and detecting floods rely on methods that need significant human resources. In this paper we describe a semantic sensor web architecture for integrating multiple heterogeneous datasets, including live and historic sensor data, databases, and map layers. The architecture provides mechanisms for discovering datasets, defining integrated views over them, continuously receiving data in real-time, and visualising on screen and interacting with the data. Our approach makes extensive use of web service standards for querying and accessing data, and semantic technologies to discover and integrate datasets. We demonstrate the use of our semantic sensor web architecture in the context of a flood response planning web application that uses data from sensor networks monitoring the sea-state around the coast of England. PMID:22164110

Gray, Alasdair J. G.; Sadler, Jason; Kit, Oles; Kyzirakos, Kostis; Karpathiotakis, Manos; Calbimonte, Jean-Paul; Page, Kevin; García-Castro, Raúl; Frazer, Alex; Galpin, Ixent; Fernandes, Alvaro A. A.; Paton, Norman W.; Corcho, Oscar; Koubarakis, Manolis; De Roure, David; Martinez, Kirk; Gómez-Pérez, Asunción

2011-01-01

303

Master Thesis Migration Methodologies for Web Applications  

E-print Network

..................................................................................................... IV Abstract between IVY Presentation and JavaServer Faces......................23 3.1 Overview of IVY Presentation.1.2 Architecture and Concepts of Portal Application Framework ................30 3.2 Overview of JavaServe Faces

304

Web-based Exercise #4: GIS Applications.  

NSDL National Science Digital Library

Justin Shepard, San Diego State University Geography Department Summary Introduce various GIS applications and usefulness in different specialty areas. The strength is that it provides an overview of GIS ...

Justin Shepard

305

SLA-Driven Dynamic Resource Management for Multi-tier Web Applications in a Cloud  

Microsoft Academic Search

Current service-level agreements (SLAs) offered by cloud providers do not make guarantees about response time of Web applications hosted on the cloud. Satisfying a maximum average response time guarantee for Web applications is difficult due to unpredictable traffic patterns. The complex nature of multi-tier Web applications increases the difficulty of identifying bottlenecks and resolving them automatically. It may be possible

Waheed Iqbal; Matthew N. Dailey; David Carrera

2010-01-01

306

Rigorous and Automatic Testing of Web Applications Xiaoping Jia and Hongming Liu  

E-print Network

Rigorous and Automatic Testing of Web Applications Xiaoping Jia and Hongming Liu School of Computer, jordan}@cs.depaul.edu ABSTRACT As web applications become more and more prevalent, the quality assurance of web applications has become more and more important. Due to the complexity of the underlying

Jia, Xiaoping

307

AppsPlayground: Automatic Security Analysis of Smartphone Applications  

E-print Network

AppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi, Yan Chen information without informing userwithout informing user · Malware Number increasing consistently­ Number;Kernellevel MonitoringKernel level Monitoring · Useful for malware detectionUseful for malware detection

Chen, Yan

308

Grammar and Model Extraction for Security Applications using  

E-print Network

Grammar and Model Extraction for Security Applications using Dynamic Program Binary Analysis of California, Berkeley Prof. David Andersen . . . . . . . . . . . . Carnegie Mellon University Prof. Vern-time behavior of the program, without the approximations that static analysis requires. In particular, we

Caballero, Juan

309

78 FR 59981 - Proposed Revision to Physical Security-Standard Design Certification and Operating Reactors  

Federal Register 2010, 2011, 2012, 2013, 2014

...Physical Security--Standard Design Certification and Operating...Physical Security--Standard Design Certification and Operating...physical security reviews of design certification applications...subject): Federal Rulemaking Web site: Go to...

2013-09-30

310

Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves  

Microsoft Academic Search

Cross-site scripting defenses often focus on HTML doc- uments, neglecting attacks involving the browser's content- sniffing algorithm, which can treat non-HTML content as HTML. Web applications, such as the one that manages this conference, must defend themselves against these attacks or risk authors uploading malicious papers that automatically submit stellar self-reviews. In this paper, we formulate content-sniffing XSS attacks and

Adam Barth; Juan Caballero; Dawn Song

2009-01-01

311

SPA - a secure Amulet core for smartcard applications  

Microsoft Academic Search

SPA is a synthesised, self-timed, ARM-compatible processor core designed for use in security-sensitive applications. It was incorporated in an experimental smartcard chip which is being used to evaluate the applicability of self-timed logic in secure devices. The system-on-chip was synthesised using the Balsa synthesis system with only a small amount of hand design employed to boost the throughput of the

Luis A. Plana; P. A. Riocreux; W. J. Bainbridge; Andrew Bardsley; Steve Temple; Jim D. Garside; Z. C. Yu

2003-01-01

312

Application of WebGIS in CATV basic network  

NASA Astrophysics Data System (ADS)

This paper analyzes the necessity of the application of WebGIS in CATV basic network. There was almost no research in using WebGIS to manage CATV basic network data in China. This paper briefly introduces how to construct an integrated transaction management system of CATV basic network based on WebGIS, and it forms a database of pivotal points, lines and buildings. CATV basic network based on WebGIS has very great superiority to traditional GIS, anybody can visit the system in anyplace by wired or wireless connection. Therefore it can satisfy the managers who want to query information about network, equipment and customers or response on. In this way the routine network and equipment maintenance becomes easily and fleetly. But WebGIS also has bottle-necks such as vector graphic editing. The editing of vector graphic and attribute play important roles in GIS, especially in CATV basic network management, because equipment, cable and fiber-optic change frequently. This paper develops Zhejiang Jiangshan broadcasting and TV station geographic information system on the basis of ArcIMS platform, and making use of the capability of reading and writing spatial data of ArcSDE to solve vector graphic editing problem.

Li, Zhao; Liu, Nan; Liu, Renyi; Bao, Weizheng

2006-10-01

313

Specification and Verification of Web Applications in Rewriting Logic  

NASA Astrophysics Data System (ADS)

This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through a communicating protocol abstracting HTTP. The proposed framework includes a scripting language that is powerful enough to model the dynamics of complex Web applications by encompassing the main features of the most popular Web scripting languages (e.g. PHP, ASP, Java Servlets). We also provide a detailed characterization of browser actions (e.g. forward/backward navigation, page refresh, and new window/tab openings) via rewrite rules, and show how our models can be naturally model-checked by using the Linear Temporal Logic of Rewriting (LTLR), which is a Linear Temporal Logic specifically designed for model-checking rewrite theories. Our formalization is particularly suitable for verification purposes, since it allows one to perform in-depth analyses of many subtle aspects related to Web interaction. Finally, the framework has been completely implemented in Maude, and we report on some successful experiments that we conducted by using the Maude LTLR model-checker.

Alpuente, María; Ballis, Demis; Romero, Daniel

314

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2011 CFR

... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

2011-04-01

315

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2012 CFR

... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

2012-04-01

316

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2010 CFR

... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

2010-04-01

317

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2014 CFR

... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

2014-04-01

318

17 CFR 242.609 - Registration of securities information processors: form of application and amendments.  

Code of Federal Regulations, 2013 CFR

... false Registration of securities information processors: form of application...609 Registration of securities information processors: form of application...for the registration of a securities information processor shall be...

2013-04-01

319

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2011 CFR

...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

2011-04-01

320

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2014 CFR

...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

2014-04-01

321

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2012 CFR

...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

2012-04-01

322

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2013 CFR

...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

2013-04-01

323

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2012 CFR

...How do I file an application for Social Security benefits? 404.611 Section...611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...How do I file an application for Social Security benefits? (a) General...

2012-04-01

324

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2014 CFR

...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

2014-04-01

325

20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.  

Code of Federal Regulations, 2013 CFR

...Applications and other forms used in Social Security Administration programs. 422...501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION...Applications and other forms used in Social Security Administration programs....

2013-04-01

326

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2010 CFR

...703.203 Application for security deposit determination; information...unsecured obligations and the security deposit required. The application...seeking an exemption from the security deposit requirements based...the Branch and posted on the Internet at...

2010-04-01

327

A web compliance engineering framework to support the development of accessible rich internet applications  

Microsoft Academic Search

Web Compliance Engineering is a new field within Web En- gineering that deals with the increasing complexity of In- ternet applications, the wide variety of mobile devices, the richer user interfaces coming out of Web 2.0 and the qual- ity assurance processes for non-uniform policy environments worldwide. Considering these issues from the perspective of Web accessibility, the borders of its

Carlos A. Velasco; Dimitar Denev; Dirk Stegemann; Yehya Mohamad

2008-01-01

328

Neutron Detection Alternatives to 3He for National Security Applications  

SciTech Connect

One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

2010-11-21

329

Accessing multimedia content from mobile applications using semantic web technologies  

NASA Astrophysics Data System (ADS)

We describe the ideas and results of an applied research project that aims at leveraging the expressive power of semantic web technologies as a server-side backend for mobile applications that provide access to location and multimedia data and allow for a rich user experience in mobile scenarios, ranging from city and museum guides to multimedia enhancements of any kind of narrative content, including e-book applications. In particular, we will outline a reusable software architecture for both server-side functionality and native mobile platforms that is aimed at significantly decreasing the effort required for developing particular applications of that kind.

Kreutel, Jörn; Gerlach, Andrea; Klekamp, Stefanie; Schulz, Kristin

2014-02-01

330

Deflation-Secure Web Metering As a result of recent changes in the policy governing Internet content distribution, such  

E-print Network

Deflation-Secure Web Metering Abstract As a result of recent changes in the policy governing metering protocols only protect against inflation of audience size. We introduce the first protocols for audience metering that protect against deflation attempts by content distributors. The protocols trade

Johnson, Rob

331

LSE for you: secure interaction with personalised information for students and staff delivered via the world wide web  

Microsoft Academic Search

LSE for You (LFY) is a web portal through which staff and students have secure and personalised access to centrally held data. It has been developed in-house at LSE through inter-departmental collaboration. There were three principal aims for the project: to meet increasing technological expectation of customers; to increase efficiency in data entry, transfer and manipulation, and to improve the

Katherine Forbes-Pitt

2002-01-01

332

Design of a framework for multi-user\\/application oriented WebGIS services  

Microsoft Academic Search

In this paper, a framework is presented to provide a new mode for WebGIS services. This framework consists of three layers: User layer, Application layer and WebGIS service layer. User Layer supports users to access WebGIS services via different network environment; application layer represents WebGIS applications constructed by different organizations or companies, which integrate GIS services to solve some domain-oriented

Luo Yingwei; Wang Xiaolin; Xu Zhuoqun

2001-01-01

333

BIOSMILE web search: a web application for annotating biomedical entities and relations.  

PubMed

BIOSMILE web search (BWS), a web-based NCBI-PubMed search application, which can analyze articles for selected biomedical verbs and give users relational information, such as subject, object, location, manner, time, etc. After receiving keyword query input, BWS retrieves matching PubMed abstracts and lists them along with snippets by order of relevancy to protein-protein interaction. Users can then select articles for further analysis, and BWS will find and mark up biomedical relations in the text. The analysis results can be viewed in the abstract text or in table form. To date, BWS has been field tested by over 30 biologists and questionnaires have shown that subjects are highly satisfied with its capabilities and usability. BWS is accessible free of charge at http://bioservices.cse.yzu.edu.tw/BWS. PMID:18515840

Dai, Hong-Jie; Huang, Chi-Hsin; Lin, Ryan T K; Tsai, Richard Tzong-Han; Hsu, Wen-Lian

2008-07-01

334

DOHA: scalable real-time web applications through adaptive concurrent execution  

Microsoft Academic Search

Browsers have become mature execution platforms enabling web applications to rival their desktop counterparts. An important class of such applications is interactive multimedia: games, animations, and interactive visualizations. Unlike many early web applications, these applications are latency sensitive and processing (CPU and graphics) intensive. When demands exceed available resources, application quality (e.g., frame rate) diminishes because it is hard to

Aiman Erbad; Norman C. Hutchinson; Charles Krasic

2012-01-01

335

An Architecture of Dynamically Adaptive PHP-based Web Applications  

Microsoft Academic Search

Self-adaptive systems, changing their functional behavior at runtime, provide desired a level of flexibility. Although various runtime frameworks have been studied, they tend to rely on a particular architecture. It is inadequate to study the characteristics of self-adaptive systems. This paper presents an abstract, declarative framework for them and relates it to an adaptive PHP-based Web application architecture, which takes

Shin Nakajima

2011-01-01

336

A Construction Kit for Modeling the Security of M-commerce Applications  

Microsoft Academic Search

In this article we present a method to avoid security prob- lems in modern m-commerce applications. The security problems that we are addressing are breaches of security due to erroneous cryptographic protocols. We describe a specication technique that gives way to a for- mal, and thereby rigorous, treatment of the security protocols used in such applications. Security of communication is

Dominik Haneberg; Wolfgang Reif; Kurt Stenzel

2004-01-01

337

Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP  

Microsoft Academic Search

A Web-based IDE that allows users to easily manage Model and Controller components of a CakePHP web application was developed. With this IDE, users are able to manage the model and controller components without having to write very much PHP code. They are able to create new model components without having to worry about creating the database tables for the

Sugiharto Widjaja

2010-01-01

338

A Mashup Tool for Cross-Domain Web Applications Using HTML5 Technologies  

Microsoft Academic Search

\\u000a Many web applications that do not take reusability and interoperability into account are being published today. However, there\\u000a are demands that developers provide the ability to collaborate among different web applications. In e-Science, an application\\u000a uses the results of other application as input data. In this paper, we introduce a mashup tool which can easily create a mashup\\u000a web application

Akiyoshi Matono; Akihito Nakamura; Isao Kojima

2011-01-01

339

WEBnm@: a web application for normal mode analyses of proteins  

PubMed Central

Background Normal mode analysis (NMA) has become the method of choice to investigate the slowest motions in macromolecular systems. NMA is especially useful for large biomolecular assemblies, such as transmembrane channels or virus capsids. NMA relies on the hypothesis that the vibrational normal modes having the lowest frequencies (also named soft modes) describe the largest movements in a protein and are the ones that are functionally relevant. Results We developed a web-based server to perform normal modes calculations and different types of analyses. Starting from a structure file provided by the user in the PDB format, the server calculates the normal modes and subsequently offers the user a series of automated calculations; normalized squared atomic displacements, vector field representation and animation of the first six vibrational modes. Each analysis is performed independently from the others and results can be visualized using only a web browser. No additional plug-in or software is required. For users who would like to analyze the results with their favorite software, raw results can also be downloaded. The application is available on . We present here the underlying theory, the application architecture and an illustration of its features using a large transmembrane protein as an example. Conclusion We built an efficient and modular web application for normal mode analysis of proteins. Non specialists can easily and rapidly evaluate the degree of flexibility of multi-domain protein assemblies and characterize the large amplitude movements of their domains. PMID:15762993

Hollup, Siv Midtun; Salensminde, Gisle; Reuter, Nathalie

2005-01-01

340

Imagen: Runtime Migration of Browser Sessions for JavaScript Web Applications  

E-print Network

@ece.ubc.ca ABSTRACT Due to the increasing complexity of web applications and emerging HTML5 standards, a large amountScript, session migration, HTML5, JSON, DOM 1. INTRODUCTION The World Wide Web was originally designed around. With the evolution of web technologies, browsers, and HTML5 [5] a great deal of application state is being offloaded

Mesbah, Ali

341

A Framework with Tools for Designing Web-based Geographic Applications  

E-print Network

A Framework with Tools for Designing Web-based Geographic Applications The Nhan Luong, Sébastien models. In order to create Web-based geographic applica- tions and overcome these design problems, we. In this paper, we propose a framework for designing Web- based geographic applications. This framework

Paris-Sud XI, Université de

342

A Visual Architectural Approach to Maintaining Web Applications Ahmed E. Hassan and Richard C. Holt  

E-print Network

A Visual Architectural Approach to Maintaining Web Applications Ahmed E. Hassan and Richard C. Holt aeehassa@plg.uwaterloo.ca September 4, 2002 #12;Abstract Web applications are complex software systems which contain a rich structure with many relations between their components. Web developers are faced

Holt, Richard C.

343

Extracting RESTful Services from Web Applications Bipin Upadhyaya, Foutse Khomh, Ying Zou  

E-print Network

Extracting RESTful Services from Web Applications Bipin Upadhyaya, Foutse Khomh, Ying Zou.upadhyaya, foutse.khomh, ying.zou}@queensu.ca Abstract-- The Web contains large amount of information and services primarily intended for human users. A Web application offers high user experience and responsiveness. A user

Zou, Ying

344

Model2Roo: Web Application Development based on the Eclipse Modeling Framework  

E-print Network

Model2Roo: Web Application Development based on the Eclipse Modeling Framework and Spring Roo Juan complexity in web application development is con- tinually increasing, due to technical challenges, like new the development of web systems, by focusing on different levels of modeling abstractions that encapsulate both

Paris-Sud XI, Université de

345

IRS-III: A Broker for Semantic Web Services Based Applications  

Microsoft Academic Search

In this paper we describe IRS-III which takes a semantic broker based approach to creating applications from Semantic Web Services by medi- ating between a service requester and one or more service providers. Business organisations can view Semantic Web Services as the basic mechanism for in- tegrating data and processes across applications on the Web. This paper extends previous publications

Liliana Cabral; John Domingue; Stefania Galizia; Alessio Gugliotta; Vlad Tanasescu; Carlos Pedrinaci; Barry Norton

2006-01-01

346

Teleradiology network system using the web medical image conference system with a new information security solution  

NASA Astrophysics Data System (ADS)

We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme and the tokenization as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of automatic backup. With automatic backup technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged due to the large area disaster like the great earthquake of Japan, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. Moreover, by using tokenization, the history information of dividing the confidential medical information into two or more tallies is prevented from lying scattered by replacing the history information with another character string (Make it to powerlessness). As a result, information is available only to those who have rightful access it and the sender of a message and the message itself are verified at the receiving point. We propose a new information transmission method and a new information storage method with a new information security solution.

Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiro; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

2012-02-01

347

AppsPlayground: Automatic Security Analysis of Smartphone Applications  

E-print Network

, malware, privacy leakage 1. INTRODUCTION Mobile devices such as smartphones have gained great popularityAppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi, Yan Chen@northwestern.edu, enck@cs.ncsu.edu ABSTRACT Today's smartphone application markets host an ever in- creasing number

Chen, Yan

348

Security and privacy in RFID and applications in telemedicine  

Microsoft Academic Search

Radio frequency identification systems have many applications in manufacturing, supply chain management, inventory control, and telemedicine. In an RFID system, products and objects are given RFID tags to identify themselves. However, security and privacy issues pose significant challenges on these systems. In this article we first briefly introduce RFID systems. Then two RFID applications in telemedicine are proposed: studying supply

Yang Xiao; Xuemin Shen; BO Sun; Lin Cai

2006-01-01

349

Collaborative Knowledge Discovery & Marshalling for Intelligence & Security Applications  

SciTech Connect

This paper discusses the Knowledge Encapsulation Framework, a flexible, extensible evidence-marshalling environment built upon a natural language processing pipeline and exposed to users via an open-source semantic wiki. We focus our discussion on applications of the framework to intelligence and security applications, specifically, an instantiation of the KEF environment for researching illicit trafficking in nuclear materials.

Cowell, Andrew J.; Jensen, Russell S.; Gregory, Michelle L.; Ellis, Peter C.; Fligg, Alan K.; McGrath, Liam R.; O'Hara, Kelly A.; Bell, Eric B.

2010-05-24

350

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2013 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2013-04-01

351

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2014 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2014-04-01

352

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2011 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2011-04-01

353

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2010 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2010-04-01

354

17 CFR 240.15Ca2-1 - Application for registration as a government securities broker or government securities dealer.  

Code of Federal Regulations, 2012 CFR

... false Application for registration as a government securities broker or government securities dealer. 240.15Ca2-1 Section...Securities Exchange Act of 1934 Registration of Government Securities Brokers and Government...

2012-04-01

355

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission  

E-print Network

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission Presentation Title: National security and climate change Presenters: Larry J. Paxton, Principal

Miami, University of

356

Testing Web-based applications: The state of the art and future trends  

Microsoft Academic Search

Software testing is a difficult task and testing Web-based applications may be even more difficult, due to the peculiarities of such applications. In the last years, several problems in the field of Web-based applications testing have been addressed by research work, and several methods and techniques have been defined and used to test Web-based applications effectively. This paper will present

Giuseppe A. Di Lucca; Anna Rita Fasolino

2006-01-01

357

Using the PL/SQL Cartridge of the Oracle Application Server to Deploy Web Applications  

SciTech Connect

Deploying business applications on the internal Web is a priority at Oak Ridge National Laboratory (Lockheed Martin Energy Research) and Lockheed Martin Energy Systems, Inc. as with most corporations. Three separate applications chose the Oracle Application Server (OAS), using the PL/SQL cartridge as a Web deployment method. This method was chosen primarily because the data was already stored in Oracle tables and developers knew HJSQL or at least SQL. The Database Support group had the responsibility of installing, testing, and determining standard methods for interfacing with the PL/SQL cartridge of the OAS. Note that the term Web Application Server was used for version 3, but in this discussion, OAS will be used for both version 3 and version 4.

Begovich, C.L.

1999-06-14

358

78 FR 72132 - RBS Securities Inc. and Citizens Investment Advisors; Notice of Application and Temporary Order  

Federal Register 2010, 2011, 2012, 2013, 2014

...Applicants' Representations 1. RBS Securities, a Delaware corporation, is registered as a broker-dealer under the Securities Exchange...RBS Securities Inc., Case Number 1:13-cv-01643-WWE (D. Conn. Nov. 25,...

2013-12-02

359

HIVToolbox, an Integrated Web Application for Investigating HIV  

PubMed Central

Many bioinformatic databases and applications focus on a limited domain of knowledge federating links to information in other databases. This segregated data structure likely limits our ability to investigate and understand complex biological systems. To facilitate research, therefore, we have built HIVToolbox, which integrates much of the knowledge about HIV proteins and allows virologists and structural biologists to access sequence, structure, and functional relationships in an intuitive web application. HIV-1 integrase protein was used as a case study to show the utility of this application. We show how data integration facilitates identification of new questions and hypotheses much more rapid and convenient than current approaches using isolated repositories. Several new hypotheses for integrase were created as an example, and we experimentally confirmed a predicted CK2 phosphorylation site. Weblink: [http://hivtoolbox.bio-toolkit.com] PMID:21647445

Luo, Yang; Villahoz Baleta, Angel; Zobrist, Stephanie; Rathnayake, Viraj; Russo, Jacqueline C.; Vyas, Jay; Muesing, Mark A.; Schiller, Martin R.

2011-01-01

360

Muon Fluence Measurements for Homeland Security Applications  

SciTech Connect

This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

2010-08-10

361

Application of web-GIS approach for climate change study  

NASA Astrophysics Data System (ADS)

Georeferenced datasets are currently actively used in numerous applications including modeling, interpretation and forecast of climatic and ecosystem changes for various spatial and temporal scales. Due to inherent heterogeneity of environmental datasets as well as their huge size which might constitute up to tens terabytes for a single dataset at present studies in the area of climate and environmental change require a special software support. A dedicated web-GIS information-computational system for analysis of georeferenced climatological and meteorological data has been created. It is based on OGC standards and involves many modern solutions such as object-oriented programming model, modular composition, and JavaScript libraries based on GeoExt library, ExtJS Framework and OpenLayers software. The main advantage of the system lies in a possibility to perform mathematical and statistical data analysis, graphical visualization of results with GIS-functionality, and to prepare binary output files with just only a modern graphical web-browser installed on a common desktop computer connected to Internet. Several geophysical datasets represented by two editions of NCEP/NCAR Reanalysis, JMA/CRIEPI JRA-25 Reanalysis, ECMWF ERA-40 Reanalysis, ECMWF ERA Interim Reanalysis, MRI/JMA APHRODITE's Water Resources Project Reanalysis, DWD Global Precipitation Climatology Centre's data, GMAO Modern Era-Retrospective analysis for Research and Applications, meteorological observational data for the territory of the former USSR for the 20th century, results of modeling by global and regional climatological models, and others are available for processing by the system. And this list is extending. Also a functionality to run WRF and "Planet simulator" models was implemented in the system. Due to many preset parameters and limited time and spatial ranges set in the system these models have low computational power requirements and could be used in educational workflow for better understanding of basic climatological and meteorological processes. The Web-GIS information-computational system for geophysical data analysis provides specialists involved into multidisciplinary research projects with reliable and practical instruments for complex analysis of climate and ecosystems changes on global and regional scales. Using it even unskilled user without specific knowledge can perform computational processing and visualization of large meteorological, climatological and satellite monitoring datasets through unified web-interface in a common graphical web-browser. This work is partially supported by the Ministry of education and science of the Russian Federation (contract #8345), SB RAS project VIII.80.2.1, RFBR grant #11-05-01190a, and integrated project SB RAS #131.

Okladnikov, Igor; Gordov, Evgeny; Titov, Alexander; Bogomolov, Vasily; Martynova, Yuliya; Shulgina, Tamara

2013-04-01

362

GCOOS Web Applications for Recreational Boaters and Fishermen  

NASA Astrophysics Data System (ADS)

Spatial and temporal information on the ecology of marine species and encompassing oceanographic environment is vital to the development of effective strategies for marine resource management and biodiversity conservation. Assembling data and generating products is a time-consuming and often laborious part of the workflow required of fisheries specialists, resource managers, marine scientists and other stakeholder groups for effective fishery management and marine spatial planning. Workflow costs for all groups can be significantly reduced through the use of interoperable networked data systems. The Gulf of Mexico Coastal Ocean Observing System Regional Association (GCOOS-RA) is one of 11 RAs comprising the non-Federal part of the U.S. Integrated Ocean Observing System (IOOS). The RAs serve the region’s needs for data and information: by working with data providers to offer their data in standardized ways following IOOS guidance, by gathering stakeholders’ needs and requirements, and by producing basic products or facilitating product-generation by others to meet those needs. The GCOOS Data Portal aggregates regional near real-time data and serves these data through standardized service interfaces suitable for automated machine access or in formats suitable for human consumption. The related Products Portal generates products in graphical displays for humans and in standard formats for importing into common software packages. Web map applications are created using ArcGIS server RESTful service, publicly available Open Geospatial Consortium (OGC) Web Map Service (WMS) layers, and Web Coverage Service (WCS). Use of standardize interfaces allows us to construct seamless workflows that carry data from sensors through to products in an automated fashion. As a demonstration of the power of interoperable standards-based systems we have developed tailored product web pages for recreational boaters and fishermen. This is a part of an ongoing project to provide an interactive tool for decision support in the Gulf of Mexico.

Kobara, S.; Howard, M. K.; Simoniello, C.; Jochens, A. E.; Gulf Of Mexico Coastal Ocean Observing System Regional Association (Gcoos-Ra)

2010-12-01

363

End-User Visual Design of Web-Based Interactive Applications Making Use of Geographical Information  

E-print Network

End-User Visual Design of Web-Based Interactive Applications Making Use of Geographical Information (called WIND - Web INteraction Design) that focuses on both designers' creativity and model executability Environment providing designers with visual functionality. Keywords: Interaction Design, Semantic Web

Paris-Sud XI, Université de

364

Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domain Applications  

E-print Network

Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domain Applications Amelie is published online (http://sensormeasurement.appspot.com/). Keywords--Semantic Web of Things; Internet of Things; Machine-to-Machine (M2M); Semantic Web technologies; Do- main Ontologies; Linked Open Rules

Gesbert, David

365

On the Use of Social Networks in Web Services: Application to the Discovery Stage  

Microsoft Academic Search

This chapter discusses the use of social networks in Web services with focus on the discovery stage that characterizes the life cycle of these Web services. Other stages in this life cycle include description, publication, invocation, and composition. Web services are software applications that end users or other peers can invoke and compose to satisfy different needs such as hotel

Zakaria Maamar; Leandro Krug Wives; Khouloud Boukadi

2010-01-01

366

Offline web application and quiz synchronization for e-learning activity for mobile browser  

Microsoft Academic Search

Rapid growing of internet applications and users has led the improvement of mobile web browser technology and standards such as HTML5. Recently, HTML5 is turning to be a de facto standard after some of its features has been implemented in major mobile web browsers. Moodle as a web based Learning Management System (LMS) has been popular in academic environment for

Royyana M. Ijtihadie; Yoshifumi Chisaki; Tsuyoshi Usagawa; H. B. Cahyo; Achmad Affandi

2010-01-01

367

Secure web-based access to radiology: forms and databases for fast queries  

NASA Astrophysics Data System (ADS)

Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

McColl, Roderick W.; Lane, Thomas J.

2002-05-01

368

The Effect of Web-Based Project Applications on Students' Attitudes towards Chemistry  

ERIC Educational Resources Information Center

Students perform intensive web-based applications during their education. One of these is project-based application. In this study, the effect of web based project applications on students' attitudes towards chemistry has been investigated. 42 students attending Hacettepe University, Faculty of Education, and Department of Chemistry Education have…

Morgil, Inci; Gungor Seyhan, Hatice; Ural Alsan, Evrim; Temel, Senar

2008-01-01

369

Spring Framework for Rapid Open Source J2EE Web Application Development: A Case Study  

Microsoft Academic Search

In the highly competitive arena of Web application development, it is important to develop the application as accurately, economically, and efficiently as possible. One way to increase productivity is to decrease complexity. This has been an underlying theme in a movement to change the way programmers approach developing Java 2 Platform, Enterprise Edition (J2EE) Web applications. The focus of the

John Arthur; Shiva Azadegan

2005-01-01

370

Network-Based Learning and Assessment Applications on the Semantic Web  

ERIC Educational Resources Information Center

Today's Web applications are already "aware" of the network of computers and data on the Internet, in the sense that they perceive, remember, and represent knowledge external to themselves. However, Web applications are generally not able to respond to the meaning and context of the information in their memories. As a result, most applications are…

Gibson, David

2005-01-01

371

A Generic Toolkit for Converting Web Applications Into High-Interaction Honeypots  

Microsoft Academic Search

In this paper, we present the design and implementation of a generic toolkit for turning arbitrary PHP web applications into high interaction honeypots in an automated fashion. We demonstrate the wide applicability of this approach by applying it to four popular existing web applications. Moreover, we show the eectiveness of our system by using it to analyze 70 actual attacks

Michael Muter; Felix Freiling; Thorsten Holz; Jeanna Matthews

372

Engineering and hosting adaptive freshness-sensitive web applications on data centers  

Microsoft Academic Search

Wide-area database replication technologies and the availability of content delivery networks allow Web applications to be hosted and served from powerful data centers. This form of application support requires a complete Web application suite to be distributed along with the database replicas. A major advantage of this approach is that dynamic content is served from locations closer to users, leading

Wen-Syan Li; Oliver Po; Wang-Pin Hsiung; K. Selçuk Candan; Divyakant Agrawal

2003-01-01

373

A Web-Based Application Devel opment Course for the Computing Curricula 2001\\/NC3 Track  

Microsoft Academic Search

With the growing use of Web te chnologies in various critical applications, it is important f or a Computer Science student, w hether undergraduate or graduat e, to gain experience in develo ping multi-tier Web-based applic ations. These applications prov ide access to data and service from a remote server, which may in turn access databases distri buted across the

T. Andrew Yang; Ralph F. Grove

2002-01-01

374

Modeling and Testing Web-based Applications Ye Wu and Jeff Offutt  

E-print Network

and maintaining web applications will be essential, not only to the internet industry, but to American industry,ofut}@ise.gmu.edu Abstract The Internet is quietly becoming the body of the business world, with web applications to business, education, and even our personal lives. Thus malfunctions of the internet or in applications

Offutt, Jeff

375

Terahertz receivers development for astronomy and security applications  

Microsoft Academic Search

Various applications in astronomy and security need highly sensitive heterodyne receiver with a quantum cascade laser or a gas laser as local oscillator and a quasioptically coupled hot-electron bolometer mixer. Here we report on the development and characterization of the receiver components for frequencies up to 2.5 THz.

H. Richter; S. Pavlov; A. Semenov; H.-W. Hubers; K. Ill'in; M. Siegel; R. Kohler; L. Mahler; A. Tredicucci; H. E. Beere; D. A. Ritchie

2007-01-01

376

AT&T Consulting Application Security Code-Level Review  

E-print Network

applications can be described as the engine that runs all of your IT business processes. It is also (PCI-DSS). For organizations relying on outsourced developers, successful completion of a security tests to isolate specific weaknesses. Our processes can uncover whether a combination of vulnerabilities

Fisher, Kathleen

377

Elaine Gelman Nurse Practitioner Scholarship Application Name Social Security # Date  

E-print Network

Elaine Gelman Nurse Practitioner Scholarship Application Name Social Security # Date: Address Home Practitioner Scholarship was established in 2002 and will recognize a nurse practitioner student who presidency of the New York State Coalition of Nurse Practitioners. New York State's NP's would not have

Portman, Douglas

378

Mobile RFID Applications and Security Konidala M. Divyan, Kwangjo Kim  

E-print Network

Mobile RFID Applications and Security Challenges Konidala M. Divyan, Kwangjo Kim InformationDong, Daejeon 305732, Republic of Korea {divyan, kkj}@icu.ac.kr Abstract. With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers

Kim, Kwangjo

379

Design of Secure and Application-Oriented VANETs  

Microsoft Academic Search

Vehicular ad hoc networks (VANETs) are important components of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to encourage VANET deployment and adoption. Security is one of the

Yi Qian; Nader Moayeri

2008-01-01

380

Finding Security Vulnerabilities in Java Applications with Static Analysis  

E-print Network

and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu Abstract in the statically analyzed code. Results of our static analysis are presented to the user for assessment from hacker attacks. However, the current state of application security leaves much to be desired

Livshits, Ben

381

Transform 5250 Green Screens into Web Applications by Using IBM Rational Host Access Transformation Services  

E-print Network

Services for Multiplatforms Create 5250 to Web transformations using HATS in IBM Rational Developer............................................................................................................ 5 The HATS perspective....................................................................................................................................6 Build and test a basic HATS application

382

A PORTAL FRAMEWORK ARCHITECTURE FOR BUILDING HEALTHCARE WEB-BASED APPLICATIONS  

E-print Network

, Context Management, PHR, EHR, Care Disease Management, Personalization. Abstract: Portals are Web portal applications integrating EHR, PHR, care and disease management functionalities. 1 INTRODUCTION

Andry, François

383

Research and Application of Data Security for Mobile Devices  

Microsoft Academic Search

\\u000a Mobile devices have been increasingly become important tools for the information system application in agriculture, but the\\u000a safe problem that follow also results in risks of economy lose. Considering above problems and combining the application of\\u000a an agriculture chain logistics management system, a series of jobs have been done. This paper presents a data security solution\\u000a which encrypts the configuration

Xiandi Zhang; Feng Yang; Zhongqiang Liu; Zhenzhi Wang; Kaiyi Wang

2010-01-01

384

Meta4: a web application for sharing and annotating metagenomic gene predictions using web services.  

PubMed

Whole-genome shotgun metagenomics experiments produce DNA sequence data from entire ecosystems, and provide a huge amount of novel information. Gene discovery projects require up-to-date information about sequence homology and domain structure for millions of predicted proteins to be presented in a simple, easy-to-use system. There is a lack of simple, open, flexible tools that allow the rapid sharing of metagenomics datasets with collaborators in a format they can easily interrogate. We present Meta4, a flexible and extensible web application that can be used to share and annotate metagenomic gene predictions. Proteins and predicted domains are stored in a simple relational database, with a dynamic front-end which displays the results in an internet browser. Web services are used to provide up-to-date information about the proteins from homology searches against public databases. Information about Meta4 can be found on the project website, code is available on Github, a cloud image is available, and an example implementation can be seen at. PMID:24046776

Richardson, Emily J; Escalettes, Franck; Fotheringham, Ian; Wallace, Robert J; Watson, Mick

2013-01-01

385

Model-Driven Design of Web Applications with Client-Side Adaptation  

Microsoft Academic Search

In this paper, we integrate WebML, a high-level model and technol- ogy for building server-side Web applications, with UML-Guide, a UML-based system that generates client-side guides for the adaptation of Web applicatio ns. The combination of the two systems is shown at work on an e-learning scenario: WebML is the basis of the specification of a generic e-learning system, colle

Stefano Ceri; Peter Dolog; Maristella Matera; Wolfgang Nejdl

2004-01-01

386

Web Services as a Graph and Its Application for Service Discovery  

Microsoft Academic Search

Web services are a new breed of Web applications. As the services published on Internet expand exponentially, finding them becomes more and more time-consuming. UDDI v2 has added a new feature, publisherAssersion, to express the relation between business entities in a UDDI repository center just like a hyperlink between Web pages. Thus, a Web service graph could be generated. This

Jianxun Liu; Lian Chao

2006-01-01

387

Integrating Sensor Webs with Modeling and Data-assimilation Applications: An SOA Implementation  

Microsoft Academic Search

A sensor web framework is implemented to enable two-way interactions between sensors and traditional modeling\\/data-assimilation applications for the land information sensor web (LISW). A service-oriented architecture (SOA) is adopted and implemented with representational state transfer (REST)-style web services. The web services are built upon a message-oriented middleware with a publish\\/subscribe model. Prototype sensor observation service (SOS) and sensor planning service

Yudong Tian; P. R. Houser; S. V. Kumar

2008-01-01

388

X-ray imaging for security applications  

NASA Astrophysics Data System (ADS)

The X-ray screening of luggage by aviation security personnel may be badly hindered by the lack of visual cues to depth in an image that has been produced by transmitted radiation. Two-dimensional "shadowgraphs" with "organic" and "metallic" objects encoded using two different colors (usually orange and blue) are still in common use. In the context of luggage screening there are no reliable cues to depth present in individual shadowgraph X-ray images. Therefore, the screener is required to convert the 'zero depth resolution' shadowgraph into a three-dimensional mental picture to be able to interpret the relative spatial relationship of the objects under inspection. Consequently, additional cognitive processing is required e.g. integration, inference and memory. However, these processes can lead to serious misinterpretations of the actual physical structure being examined. This paper describes the development of a stereoscopic imaging technique enabling the screener to utilise binocular stereopsis and kinetic depth to enhance their interpretation of the actual nature of the objects under examination. Further work has led to the development of a technique to combine parallax data (to calculate the thickness of a target material) with the results of a basis material subtraction technique to approximate the target's effective atomic number and density. This has been achieved in preliminary experiments with a novel spatially interleaved dual-energy sensor which reduces the number of scintillation elements required by 50% in comparison to conventional sensor configurations.

Evans, J. Paul

2004-01-01

389

Haystack: A Platform for Authoring End User Semantic Web Applications  

Microsoft Academic Search

The Semantic Web promises to open innumerable opportunities for automation and information retrieval by standardizing the protocols for meta- data exchange. However, just as the success of the World Wide Web can be at- tributed to the ease of use and ubiquity of Web browsers, we believe that the unfolding of the Semantic Web vision depends on users getting powerful

Dennis Quan; David Huynh; David R. Karger

2003-01-01

390

RDFa Ontology-Based Architecture for String-Based Web Attacks: Testing and Evaluation  

Microsoft Academic Search

\\u000a String input is an issue for web application security. The problem is that developers often trust string input without checking\\u000a for validity. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation\\u000a can tend to break the security upon web applications. In this chapter, security vulnerabilities such as SQL injection has\\u000a been described and

Shadi Aljawarneh; Faisal Alkhateeb

391

StreamStats: A Water Resources Web Application  

USGS Publications Warehouse

Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (the flow that is exceeded, on average, once in 100 years and has a 1-percent chance of being exceeded in any year, sometimes referred to as the 100-year flood) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; water-use appropriations and permitting; wastewater and industrial discharge permitting; hydropower facility design and regulation; and the setting of minimum required streamflows to protect freshwater ecosystems. In addition, researchers, planners, regulators, and others often need to know the physical and climatic characteristics of the drainage basins (basin characteristics) and the influence of human activities, such as dams and water withdrawals, on streamflow upstream from locations of interest to understand the mechanisms that control water availability and quality at those locations. Knowledge of the streamflow network and downstream human activities also is necessary to adequately determine whether an upstream activity, such as a water withdrawal, can be allowed without adversely affecting downstream activities. Streamflow statistics could be needed at any location along a stream. Most often, streamflow statistics are needed at ungaged sites, where no streamflow data are available to compute the statistics. At U.S. Geological Survey (USGS) streamflow data-collection stations, which include streamgaging stations, partial-record stations, and miscellaneous-measurement stations, streamflow statistics can be computed from available data for the stations. Streamflow data are collected continuously at streamgaging stations. Streamflow measurements are collected systematically over a period of years at partial-record stations to estimate peak-flow or low-flow statistics. Streamflow measurements usually are collected at miscellaneous-measurement stations for specific hydrologic studies with various objectives. StreamStats is a Web-based Geographic Information System (GIS) application (fig. 1) that was created by the USGS, in cooperation with Environmental Systems Research Institute, Inc. (ESRI)1, to provide users with access to an assortment of analytical tools that are useful for water-resources planning and management. StreamStats functionality is based on ESRI's ArcHydro Data Model and Tools, described on the Web at http://support.esri.com/index.cfm?fa=downloads.dataModels.filteredGateway&dmid=15. StreamStats allows users to easily obtain streamflow statistics, basin characteristics, and descriptive information for USGS data-collection stations and user-selected ungaged sites. It also allows users to identify stream reaches that are upstream and downstream from user-selected sites, and to identify and obtain information for locations along the streams where activities that may affect streamflow conditions are occurring. This functionality can be accessed through a map-based user interface that appears in the user's Web browser (fig. 1), or individual functions can be requested remotely as Web services by other Web or desktop computer applications. StreamStats can perform these analyses much faster than historically used manual techniques. StreamStats was designed so that each state would be implemented as a separate application, with a reliance on local partnerships to fund the individual applications, and a goal of eventual full national implementation. Idaho became the first state to implement StreamStats in 2003. By mid-2008, 14 states had applications available to the public, and 18 other states were in various stages of implementation.

Ries, Kernell G., III; Guthrie, John G.; Rea, Alan H.; Steeves, Peter A.; Stewart, David W.

2008-01-01

392

Nanomaterials and their application to defense and homeland security  

NASA Astrophysics Data System (ADS)

A critical issue to homeland security and defense is the development of broad range collectors and detectors of weapons of mass destruction. Nanoscience and nanotechnology are increasingly important in the area of such separation and detection. This article presents an overview of the research at the Forensic Science Center at Lawrence Livermore National Laboratory to develop nanostructured materials for applications to forensics and homeland security. Among the many types of nanomaterials reviewed are silica-based materials, molecular imprinted polymers, and silicon platforms. The main aim of the article is to optimize these new classes of materials for the collection concentration and detection of chemical weapons or other related compounds.

Reynolds, John G.; Hart, Bradley R.

2004-01-01

393

WEB SECURITY ISSUES: HOW HAS RESEARCH ADDRESSED THE GROWING NUMBER OF THREATS?  

Microsoft Academic Search

The Internet has drastically changed how organizations do business. The World Wide Web (WWW or Web) is becoming increasingly important in doing business, selling to customers, managing relationships with vendors and partners, etc. In fact, many organizations have only a Web presence and do not have a physical location. This increase in reliance on the Internet has opened organizations to

Randy Brown

394

Web Robots and Web Mining  

NSDL National Science Digital Library

Manually indexing the World Wide Web is obviously an impossible task, and it is even a daunting challenge for automated techniques. Web content mining is a general term used to describe these techniques, which are intended for information categorization and filtering. Web robots serve a variety of purposes, including indexing; and they can be useful or, in some cases, harmful. Web usage mining, on the other hand, is used to determine how a Web site's structure and organization effect the way users navigate the site.The Web Robots Pages (1) is an excellent starting place to learn about these automated programs. Several hundred robots are documented in a database, and a selection of papers considers proper ethics and guidelines for using robots, among other things. An article on Web mining and its subclasses is given on DM Review (2). It describes the basics of Web analysis and outlines many benefits Web mining can offer. A course homepage on Web data mining from DePaul University (3) offers a broad selection of reading material on the subject. Mostly consisting of research papers and journal articles, the documents range from general applications to specific theories and case studies. Two computer scientists from Polytechnic University propose a robust, distributed Web crawler (another term for Web robot), intended for large-scale network interaction (4). The twelve page paper begins with the motivation for the project, and continues with a full description of the system architecture and implementation. The November 2002 issue of Computer magazine featured an article on Data Mining for Web Intelligence (5). It points out that today's Internet is lacking in many key aspects, and that Web mining will play an important role in the development of improved search engines and automatic document classification. A short poster presentation from the 2002 International World Wide Web Conference (6) introduces GeniMiner, a Web search strategy based on a genetic algorithm. GeniMiner operates on the premise of finding a nearly optimal solution in order to minimize manual analysis of the search results. KDnuggets (7) is a free, biweekly newsletter on data and Web mining. In recent issues, special attention has been given to the Total Information Awareness project, which is investigating ways of mining the Web and email for possible information about terrorist activity. Web robots are occasionally used for malicious purposes, namely to automatically register for free email or participate in online polls. A technology that was developed to counter these robots involved using a blurred or distorted word to gain access, which could easily be read by a human but would be impossible for a robot to read. In a press release from the University of California at Berkeley (8), researchers have discovered a way to allow Web robots to crack this security system. The article describes how it was accomplished and provides motivation for more advanced security measures.

Leske, Cavin.

2003-01-01

395

Noble Gas Excimer Detectors for Security and Safeguards Applications  

NASA Astrophysics Data System (ADS)

Noble gas excimer detectors are a technology that is common in particle physics research and less common in applications for security and international safeguards. These detectors offer the capability to detect gammas with an energy resolution similar to NaI and to detect neutrons with good energy resolution as well. Depending on the noble gas selected and whether or not it is in a gaseous or liquid state, the sensitivity to gammas and neutrons can be tuned according to the needs of the application. All of this flexibility can be available at a significant cost saving over alternative technologies. This paper will review this detector technology and its applicability to security and safeguards.

Hynes, Michael V.; Chandra, Rico; Davatz, Giovanna; Lanza, Richard

2011-12-01

396

Hilda: A High-Level Language for Data-Driven Web Applications Fan Yang Jayavel Shanmugasundaram Mirek Riedewald Johannes Gehrke  

E-print Network

for databases, Java objects for application logic, hyperlinks for website structure, and form variables for web: Website specification tools such as WebML [7] and Strudel [16] rep- resent a data-driven web siteHilda: A High-Level Language for Data-Driven Web Applications Fan Yang Jayavel Shanmugasundaram

397

A Streamflow Statistics (StreamStats) Web Application for Ohio  

USGS Publications Warehouse

A StreamStats Web application was developed for Ohio that implements equations for estimating a variety of streamflow statistics including the 2-, 5-, 10-, 25-, 50-, 100-, and 500-year peak streamflows, mean annual streamflow, mean monthly streamflows, harmonic mean streamflow, and 25th-, 50th-, and 75th-percentile streamflows. StreamStats is a Web-based geographic information system application designed to facilitate the estimation of streamflow statistics at ungaged locations on streams. StreamStats can also serve precomputed streamflow statistics determined from streamflow-gaging station data. The basic structure, use, and limitations of StreamStats are described in this report. To facilitate the level of automation required for Ohio's StreamStats application, the technique used by Koltun (2003)1 for computing main-channel slope was replaced with a new computationally robust technique. The new channel-slope characteristic, referred to as SL10-85, differed from the National Hydrography Data based channel slope values (SL) reported by Koltun (2003)1 by an average of -28.3 percent, with the median change being -13.2 percent. In spite of the differences, the two slope measures are strongly correlated. The change in channel slope values resulting from the change in computational method necessitated revision of the full-model equations for flood-peak discharges originally presented by Koltun (2003)1. Average standard errors of prediction for the revised full-model equations presented in this report increased by a small amount over those reported by Koltun (2003)1, with increases ranging from 0.7 to 0.9 percent. Mean percentage changes in the revised regression and weighted flood-frequency estimates relative to regression and weighted estimates reported by Koltun (2003)1 were small, ranging from -0.72 to -0.25 percent and -0.22 to 0.07 percent, respectively.

Koltun, G.F.; Kula, Stephanie P.; Puskas, Barry M.

2006-01-01

398

A study of memory management for web-based applications on multicore processors  

Microsoft Academic Search

More and more server workloads are becoming Web-based. In these Web-based workloads, most of the memory objects are used only during one transaction. We study the effect of the memory management approaches on the performance of such Web-based applications on two modern multicore processors. In particular, using six PHP applications, we compare a general-purpose allocator (the default allocator of the

Hiroshi Inoue; Hideaki Komatsu; Toshio Nakatani

2009-01-01

399

A study of memory management for web-based applications on multicore processors  

Microsoft Academic Search

More and more server workloads are becoming Web-based. In these Web-based workloads, most of the memory objects are used only during one transaction. We study the effect of the memory management approaches on the performance of such Web-based applications on two modern multicore processors. In particular, using six PHP applications, we compare a general-purpose alloca- tor (the default allocator of

Hiroshi Inoue; Hideaki Komatsu; Toshio Nakatani

2009-01-01

400

Transforming the web into a real application platform: new technologies, emerging trends and missing pieces  

Microsoft Academic Search

The World Wide Web has evolved from a simple document browsing and distribution environment into a rich software platform in which desktop-style applications are increasingly becoming first class citizens. The document-oriented origins of the Web are still evident in many areas, though, and traditionally it has been difficult to compose truly interactive web applications without using plug-in components or browser

Matti Anttonen; Arto Salminen; Tommi Mikkonen; Antero Taivalsaari

2011-01-01

401

Modeling of Evolution to Secure Application System: from Requirements Model to Software Architecture  

Microsoft Academic Search

This paper describes an approach to modeling the evolution of an application system to a secure application system in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security services are encapsulated in connectors in the software architecture, separately from the components providing functional services. In

Michael Shin

2006-01-01

402

Security Architecture for Open Collaborative Environment  

Microsoft Academic Search

The paper presents proposed Security Architecture for Open Col- laborative Environment (OCE) being developed in the framework of the Col- laboratory.nl (CNL) project with the intent to build a flexible, customer-driven security infrastructure for open collaborative applications. The architecture is based on extended use of emerging Web Services and Grid security technolo- gies combined with concepts from the generic Authentication

Yuri Demchenko; Leon Gommans; Cees De Laat; Bas Van Oudenaarde; Andrew Tokmakoff; Martin Snijders; René Van Buuren

2005-01-01

403

Advancements in web-database applications for rabies surveillance  

PubMed Central

Background Protection of public health from rabies is informed by the analysis of surveillance data from human and animal populations. In Canada, public health, agricultural and wildlife agencies at the provincial and federal level are responsible for rabies disease control, and this has led to multiple agency-specific data repositories. Aggregation of agency-specific data into one database application would enable more comprehensive data analyses and effective communication among participating agencies. In Québec, RageDB was developed to house surveillance data for the raccoon rabies variant, representing the next generation in web-based database applications that provide a key resource for the protection of public health. Results RageDB incorporates data from, and grants access to, all agencies responsible for the surveillance of raccoon rabies in Québec. Technological advancements of RageDB to rabies surveillance databases include 1) automatic integration of multi-agency data and diagnostic results on a daily basis; 2) a web-based data editing interface that enables authorized users to add, edit and extract data; and 3) an interactive dashboard to help visualize data simply and efficiently, in table, chart, and cartographic formats. Furthermore, RageDB stores data from citizens who voluntarily report sightings of rabies suspect animals. We also discuss how sightings data can indicate public perception to the risk of racoon rabies and thus aid in directing the allocation of disease control resources for protecting public health. Conclusions RageDB provides an example in the evolution of spatio-temporal database applications for the storage, analysis and communication of disease surveillance data. The database was fast and inexpensive to develop by using open-source technologies, simple and efficient design strategies, and shared web hosting. The database increases communication among agencies collaborating to protect human health from raccoon rabies. Furthermore, health agencies have real-time access to a wide assortment of data documenting new developments in the raccoon rabies epidemic and this enables a more timely and appropriate response. PMID:21810215

2011-01-01

404

Application distribution model and related security attacks in VANET  

NASA Astrophysics Data System (ADS)

In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

2013-03-01

405

Practical Pocket PC Application w/Biometric Security  

NASA Technical Reports Server (NTRS)

I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.

Logan, Julian

2004-01-01

406

From tangled webs to network integrity: computer security in hospital management. Part II.  

PubMed

This article is the second of two on the subject of computer security in hospital management in the first part, the authors dramatized the need for not only information security awareness but also the need for implementation of security measures to protect valuable information. This second article provides an overview of the components of a good computer security plan, contains a brief explanation of some of the new network security technology available today, and gives the reader several sources that can provide further information on information security. PMID:10301534

Ravella, J A; Gravel, J L

1987-02-01

407

Potential National Security Applications of Nuclear Resonance Fluorescence Methods  

SciTech Connect

The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

2009-06-09

408

Deploying an ASP.NET Web Application to a Hosting Provider  

E-print Network

#12;Deploying an ASP.NET Web Application to a Hosting Provider using Visual Studio Tom Dykstra Summary: This series of tutorials shows you how to make an ASP.NET web application available over-By-Step Applies to: ASP.NET 4.0 and earlier, Visual Studio 2010 Source: ASP.NET site (link to source content) E

Hunt, Galen

409

Hidden Challenges on Web Application Design Eric Freeman Katia Passos Cerise Wuthrich Catherine Stringfellow  

E-print Network

at the application design stage may introduce critical errors in the behavior of a system. In this paper, a discussion on how web caching may affect the application is presented, as well as basic ideas on how will not have enough information to judge if a web cache is involved. To verify the possibility of caching

Stringfellow, Catherine V.

410

DEVELOPMENT, EVALUATION, AND APPLICATION OF A FOOD WEB BIOACCUMULATION MODEL FOR PCBS  

E-print Network

DEVELOPMENT, EVALUATION, AND APPLICATION OF A FOOD WEB BIOACCUMULATION MODEL FOR PCBS IN THE STRAIT Management Title of Research Project: Development, Evaluation, and Application of a Food Web Bioaccumulation of Georgia, I developed, parameterized, and tested a mechanistic bioaccumulation model for polychlorinated

411

End-Users' Mental Models of Concepts Critical to Web Application Development  

Microsoft Academic Search

We report an empirical study of nonprogrammers' mental models regarding particular concerns in Web application development such as input validation, database lookup, and overview-detail relationships. The goal of the study was to understand how nonprogrammers think about the data and logic underlying a Web application. In continuing work, we are using this understanding as a basis for the design of

Jochen Rode; Mary Beth Rosson; Manuel A. Pérez-quiñones

2004-01-01

412

WEB APPLICATION FOR TIMETABLE PLANNING IN THE HIGHER TECHNICAL COLLEGE OF INDUSTRIAL AND TELECOMMUNICATIONS ENGINEERING  

Microsoft Academic Search

The aim of this paper is to show a Web application developed in the University of Cantabria which allows for timetable management in an Engineering school with the peculiarity of having been developed using Informix Web datablade. First, the proposed Informix architecture to manage complex data is described; next, our project as application case is showed and finally, the experience

Marta E. Zorrilla Pantaleón; Eduardo Mora Monte; José Luis Crespo Fidalgo

413

On demand synchronization and load distribution for database grid-based Web applications  

E-print Network

the issues in the context of data center synchronization for such load and precision critical Web synchronization of data centers to maintain the load and application precision requirements. A prototype has been center synchronization and query routing for load and precision critical Web applications. The complexity

Kantarcioglu, Murat

414

JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications  

E-print Network

JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications Paruj {livshits,zorn}@microsoft.com Abstract JavaScript is widely used in web-based applications and is increasingly popular with developers. So-called browser wars in recent years have focused on JavaScript

Livshits, Ben

415

A Framework for Automated Testing of JavaScript Web Applications  

E-print Network

A Framework for Automated Testing of JavaScript Web Applications Shay Artzi IBM Research artzi practice in testing JavaScript web applications requires man- ual construction of test cases, which is difficult and tedious. We present a framework for feedback-directed automated test genera- tion for JavaScript

Møller, Anders

416

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2010 CFR

...2010-07-01 2010-07-01 false Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards § 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent...

2010-07-01

417

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2012 CFR

...2012-07-01 2012-07-01 false Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards § 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2012-07-01

418

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2014 CFR

...2014-07-01 2014-07-01 false Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards § 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2014-07-01

419

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2013 CFR

...2013-07-01 2012-07-01 true Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards § 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2013-07-01

420

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2011 CFR

...2011-07-01 2011-07-01 false Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards § 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2011-07-01

421

Developing a Web-based GIS Application for Earthquake Mapping   

E-print Network

The fast technical progress of web-based GIS has enabled visualising complex geographical phenomena for the interested public. This research paper analyses the development of a global earthquake web map which allows the visualisation of significant...

Boermel, Christian

2012-11-29

422

An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture  

E-print Network

; Semantic Web; OWL; Inter- net of Things; ETSI Machine to Machine (M2M); Semantic Web of Things; 2G/GSM; 3G@polytech.unice.fr Abstract--Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture or designers to choose security mechanisms fitting their needs to secure Internet of Things (IoT) applications

Boyer, Edmond

423

Numerically Efficient Water Quality Modeling and Security Applications  

E-print Network

NUMERICALLY EFFICIENT WATER QUALITY MODELING AND SECURITY APPLICATIONS A Dissertation by ANGELICA VANESSA MANN Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree... of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Carl D. Laird Committee Members, Sergiy I. Butenko Juergen Hahn Katy C. Kao Department Head, Muhammad N. Karim May 2013 Major Subject: Chemical Engineering Copyright 2013 Angelica Vanessa Mann...

Mann, Angelica

2013-02-04

424

A framework for effective commercial Web application development  

Microsoft Academic Search

The World Wide Web (WWW) or the Web has been recognized as a powerful new information exchange channel in recent years. Today, an ever-increasing number of businesses have set up Web sites to publicize their products and services. However, careful planning and preparation is needed to achieve the intended purpose of this new information exchange channel. This paper proposes a

Ming-te Lu; Wing-lok Yeung

1998-01-01

425

An Empirical Study of Software Maintenance of a Web-Based Java Application  

Microsoft Academic Search

This paper presents empirical study detailing software maintenance for Web-based Java applications to aid in understanding and predicting the software maintenance category and effort. The specific application described is a Java Web-based administrative application in the e-Government arena. The application is based on the design of an open source model-view-controller framework. The domain factors, which also provide contextual references, are

Min-gu Lee; Theresa L. Jefferson

2005-01-01

426

Supporting Case-Based Learning in Information Security with Web-Based Technology  

ERIC Educational Resources Information Center

Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security

He, Wu; Yuan, Xiaohong; Yang, Li

2013-01-01

427

Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research  

Microsoft Academic Search

\\u000a Trajectory similarity of moving objects resembles path similarity of user click-streams in web usage mining. By analyzing\\u000a the URL path of each user, we are able to determine paths that are very similar and therefore effective caching strategies\\u000a can be applied. In recent years, World Wide Web has been increasingly used by terrorists to spread their ideologies and web\\u000a mining

Sajimon Abraham; P. Sojan Lal

428

Keeping the Web in Web 2.0 An HCI Approach to Designing Web  

E-print Network

Keeping the Web in Web 2.0 An HCI Approach to Designing Web Applications CHI 2007 Course Notes.....................................................................................................................................1 1. Web Application UI versus Desktop Application UI..............................................................................................................................2 3. Examples of State Management in Web Applications

Tomkins, Andrew

429

Towards Validation of Session Management in Web Applications based on Graph Transformation  

Microsoft Academic Search

\\u000a One of the challenges faced by Web developers is how to create a coherent application out of a series of independent Web pages.\\u000a This problem is a particular concern in Web development because HTTP as underlying protocol is stateless. Each browser request\\u000a to a Web server is independent, and the server retains no memory of a browser’s past requests. To overcome this limitation,\\u000a application developers

Anilda Qemali; Gabriele Taentzer

2003-01-01

430

The research of network database security technology based on web service  

NASA Astrophysics Data System (ADS)

Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

2013-03-01

431

A Case Study in Web 2.0 Application Development  

NASA Astrophysics Data System (ADS)

Recent web technologies focusing on languages, frameworks, and tools are discussed, using the Robert C. Byrd Green Bank Telescopes (GBT) new Dynamic Scheduling System as the primary example. Within that example, we use a popular Python web framework, Django, to build the extensive web services for our users. We also use a second complimentary server, written in Haskell, to incorporate the core scheduling algorithms. We provide a desktop-quality experience across all the popular browsers for our users with the Google Web Toolkit and judicious use of JQuery in Django templates. Single sign-on and authentication throughout all NRAO web services is accomplished via the Central Authentication Service protocol, or CAS.

Marganian, P.; Clark, M.; Shelton, A.; McCarty, M.; Sessoms, E.

2010-12-01

432

WEBSCAT: A web application for the analysis of electromagnetic scattering from small particles  

NASA Astrophysics Data System (ADS)

Development of an online web application to simulate and display plane wave scattering from small particles is presented. In particular, the computation of angular variation of the scattering properties (scattering matrix elements, scattering coefficients, single scattering albedo etc.) of particulate matter by using the Mie theory and the T-matrix method was incorporated in the application. Comparison of the results generated by using the web application with other reported benchmark results has shown that the web application is accurate and reliable for electromagnetic scattering computations.

Gogoi, Ankur; Rajkhowa, Pritom; P. Saikia, Gunjan; Ahmed, Gazi A.; Choudhury, Amarjyoti

2014-10-01

433

An ethernet/IP security review with intrusion detection applications  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01

434

The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking  

NASA Astrophysics Data System (ADS)

Communication is a fundamental function of life, and it exists in almost all living things: from single-cell bacteria to human beings. Communication, together with competition and cooperation,arethree fundamental processes in nature. Computer scientists are familiar with the study of competition or 'struggle for life' through Darwin's evolutionary theory, or even evolutionary computing. They may be equally familiar with the study of cooperation or altruism through the Prisoner's Dilemma (PD) game. However, they are likely to be less familiar with the theory of animal communication. The objective of this article is three-fold: (i) To suggest that the study of animal communication, especially the honesty (reliability) of animal communication, in which some significant advances in behavioral biology have been achieved in the last three decades, should be on the verge to spawn important cross-disciplinary research similar to that generated by the study of cooperation with the PD game. One of the far-reaching advances in the field is marked by the publication of "The Handicap Principle: a Missing Piece of Darwin's Puzzle" by Zahavi (1997). The 'Handicap' principle [34][35], which states that communication signals must be costly in some proper way to be reliable (honest), is best elucidated with evolutionary games, e.g., Sir Philip Sidney (SPS) game [23]. Accordingly, we suggest that the Handicap principle may serve as a fundamental paradigm for trust research in computer science. (ii) To suggest to computer scientists that their expertise in modeling computer networks may help behavioral biologists in their study of the reliability of animal communication networks. This is largely due to the historical reason that, until the last decade, animal communication was studied with the dyadic paradigm (sender-receiver) rather than with the network paradigm. (iii) To pose several open questions, the answers to which may bear some refreshing insights to trust research in computer science, especially secure and resilient computing, the semantic web, and social networking. One important thread unifying the three aspects is the evolutionary game theory modeling or its extensions with survival analysis and agreement algorithms [19][20], which offer powerful game models for describing time-, space-, and covariate-dependent frailty (uncertainty and vulnerability) and deception (honesty).

Ma, Zhanshan (Sam); Krings, Axel W.; Hung, Chih-Cheng

435

Evaluation of a metal shear web selectively reinforced with filamentary composites for space shuttle application  

NASA Technical Reports Server (NTRS)

A final program summary is reported for test and evaluation activities that were conducted for space shuttle web selection. Large scale advanced composite shear web components were tested and analyzed to evaluate application of advanced composite shear web construction to a space shuttle orbiter thrust structure. The shear web design concept consisted of a titanium-clad + or - 45 deg boron/epoxy web laminate stiffened with vertical boron-epoxy reinforced aluminum stiffeners and logitudinal aluminum stiffening. The design concept was evaluated to be efficient and practical for the application that was studied. Because of the effects of buckling deflections, a requirement is identified for shear buckling resistant design to maximize the efficiency of highly-loaded advanced composite shear webs.

Laakso, J. H.; Straayer, J. W.

1974-01-01

436

17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...  

Code of Federal Regulations, 2014 CFR

...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

2014-04-01

437

17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...  

Code of Federal Regulations, 2010 CFR

...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

2010-04-01

438

17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...  

Code of Federal Regulations, 2012 CFR

...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

2012-04-01

439

17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...  

Code of Federal Regulations, 2013 CFR

...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

2013-04-01

440

17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...  

Code of Federal Regulations, 2011 CFR

...application for registration as a securities information processor or to amend such...Registration of, and Reporting by Securities Information Processors § 249.1001...application for registration as a securities information processor or to amend...

2011-04-01

441

Social Security Number (SSN) Application Instructions For International Students, Scholars and Visitors  

E-print Network

5/2013 Social Security Number (SSN) Application Instructions For International Students, Scholars and Visitors A Social Security Number (SSN) is a unique, 9-digit identification number issued by the US Social International applicants apply in person at the nearest Social Security office NO EARLIER THAN 10 days after

Gordon, Geoffrey J.

442

A Construction Kit for Modeling the Security of M-Commerce Applications  

E-print Network

A Construction Kit for Modeling the Security of M-Commerce Applications Dominik Haneberg, Wolfgang}@informatik.uni-augsburg.de Abstract. In this article we present a method to avoid security prob- lems in modern m-commerce is important in modern m-commerce applications. As parts of the specification of the security protocols, we

Reif, Wolfgang

443

LispWeb: A Specialized HTTP Server for Distributed AI Applications  

Microsoft Academic Search

We describe the design and the implementation of LispWeb, a specialized HTTP server, written in Common Lisp, able to deliver Distributed Artificial Intelligence (DAI) applications over the World Wide Web (WWW). In addition to implementing the standard HTTP protocol, the LispWeb server offers a library of high-level Lisp functions to dynamically generate HTML pages, a facility for creating Graphical User

Alberto Riva; Marco Ramoni

1996-01-01

444

Efficient Integration of Web Services in Ambient-aware Sensor Network Applications  

Microsoft Academic Search

Sensor webs are heterogeneous collections of sensor devices that collect information and interact with the environ- ment. They consist of wireless sensor networks that are ensembles of small, smart, and cheap sensing and computing devices that permeate the environment as well as high-bandwidth rich sensors such as satellite imaging systems, meteorological stations, air quality stations, and security cameras. Emergency response,

Isaac Amundson; Manish Kushwaha; Xenofon D. Koutsoukos; Sandeep Neema; Janos Sztipanovits

2006-01-01

445

Security Applications of Diodes with Unique Current-Voltage Characteristics  

NASA Astrophysics Data System (ADS)

Diodes are among the most simple and inexpensive electric components. In this paper, we investigate how random diodes with irregular I(U) curves can be employed for crypto and security purposes. We show that such diodes can be used to build Strong Physical Unclonable Functions (PUFs), Certificates of Authenticity (COAs), and Physically Obfuscated Keys (POKs), making them a broadly usable security tool. We detail how such diodes can be produced by an efficient and inexpensive method known as ALILE process. Furthermore, we present measurement data from real systems and discuss prototypical implementations. This includes the generation of helper data as well as efficient signature generation by elliptic curves and 2D barcode generation for the application of the diodes as COAs.

Rührmair, Ulrich; Jaeger, Christian; Hilgers, Christian; Algasinger, Michael; Csaba, György; Stutzmann, Martin

446

3D NormalModes Shockwave; A Web Application for Interactive Visualization and Three Dimensional Perc  

NSDL National Science Digital Library

3D Normal Modes is a Web application for interactive visualization and three-dimensional perception of the normal modes of molecular vibration, suitable for undergraduate students in chemistry. The application uses the Macromedia Shockwave plug-in and has been designed and developed especially for the Web. It has a simple graphical user interface and requires a download of only 120 KB, allowing it to be used even with low bandwidth Internet connections. Its performance is comparable to a desktop application.

447

Intelligent Facial Recognition Systems: Technology advancements for security applications  

SciTech Connect

Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

Beer, C.L.

1993-07-01

448

Online Geodynamics: interactive web-applications for graduate students in Earth Sciences  

NASA Astrophysics Data System (ADS)

In teaching geosciences classes it is essential to provide students with the possibility of having hands-on experiences, even if sometimes they happen to be only in the virtual world. In the portal created for the Computational Geodynamics Laboratory (http://www.geociencias.unam.mx/geodinamica), we present web-based applications, which will help students to manipulate and visualize not only data but also to understand concepts like mantle convection, plate reconstruction or plate deformation. The "Toolbox" option provides a set of state of the art applications (WebMap, WebPlates, WebFlexure, WebGravity, and WebConvec), in which logged-in users can run on-line various programs, without previous knowledge of advanced programming. WebPlates is used in Plate Tectonics classes, helping students to identify and familiarize themselves with various tectonic plates, different tectonic limits, hotspots, etc. WebFlexure is used to study the mechanical behavior of oceanic plates at trenches. WebConvec comes with four cases, analyzing the thermal and thermo-chemical convection in different conditions. In this way the students can be aware of how variation of various physical parameters can affect the modeling results. The "Models" section presents a collection of dynamic numerical models created in the Computational Geodynamics Laboratory. In this section, the logged-in user can visualize convection and deformation models, tectonic plate reconstructions, or geophysical field data, like geoid, gravity, etc. All these applications are actively used in the Geodynamics classes.

Manea, M.; Manea, V. C.

2009-04-01

449

Situating CoWeb: a scholarship of application  

Microsoft Academic Search

Since 1998, we have been developing and researching CoWeb, a version of Wiki designed to support collaborative learning. In\\u000a this article, we summarize our results of situating CoWeb across the academic landscape of Georgia Tech. In architecture,\\u000a CoWeb enabled faculty to serve more students in a design-based course. In English composition, a comparison study demonstrated\\u000a significant learning benefits without incurring

Jochen Rick; Mark Guzdial

2006-01-01

450

FAFSA on the Web Toolkit.  

ERIC Educational Resources Information Center

The online version of the Free Application for Federal Student Aid (FAFSA) allows students to apply for federal financial aid using the Internet. In many cases, FAFSA on the Web may be used to apply for financial aid from other sources, such as states or schools. Data are secured, so sending an application through the Internet is as safe as…

Office of Student Financial Assistance (ED), Washington, DC.

451

World Wide WebWWWDeep Web Web Deep Web  

E-print Network

Deep Web Web World Wide WebWWWDeep Web Web Deep Web Deep Web Deep Web Deep Web Deep Web 1 World Wide Web [1] Web 200,000TB Web Web Web Internet Web Web Web "" Surface Web Deep Web Surface Web 21.3% Surface Web Deep Web [2] Deep Web Web Crawler Deep Web 1 Web

452

Network and data security design for telemedicine applications.  

PubMed

The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided. PMID:9304559

Makris, L; Argiriou, N; Strintzis, M G

1997-01-01

453

Highly-Interactive and User-Friendly Web Application for People with Diabetes  

E-print Network

Highly-Interactive and User-Friendly Web Application for People with Diabetes Francois Andry, Larry. One Waters Park Drive ­ Suite 280 San Mateo, CA 94403, USA Abstract ­ LifeSensor Diabetes is a module that is coupled with a web-based personal health record (PHR) for patients with type 2 diabetes. In this paper we

Andry, François

454

Applications of Graph Probing to Web Document Analysis Daniel Lopresti and Gordon Wilfong  

E-print Network

treats graph probing as an on­ line process; both the query graph and the database graph are available­computation of a compact, efficient probe set for databases of graph­ structured documents in general, and Web pages codedApplications of Graph Probing to Web Document Analysis Daniel Lopresti and Gordon Wilfong Bell Labs

Wilfong, Gordon

455

Gender Divide and Acceptance of Collaborative Web 2.0 Applications for Learning in Higher Education  

ERIC Educational Resources Information Center

Situated in the gender digital divide framework, this survey study investigated the role of computer anxiety in influencing female college students' perceptions toward Web 2.0 applications for learning. Based on 432 college students' "Web 2.0 for learning" perception ratings collected by relevant categories of "Unified Theory of Acceptance and Use…

Huang, Wen-Hao David; Hood, Denice Ward; Yoo, Sun Joo

2013-01-01

456

A secure Web-based medical digital library architecture based on TTPs.  

PubMed

In this paper, a secure medical digital library architecture is presented, that is based on the CORBA specifications for distributed systems. Special attention is given to the distinguished nature of medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. PMID:11187625

Papadakis, I; Chrissikopoulos, V; Polemi, D

2000-01-01

457

Agent Approaches to Enforce Role-Based Security in Distributed and Web-Based Computing  

Microsoft Academic Search

In the a ge of information technology, organizations of all types are seeking to effectively utilize a nd d isseminate information, by designing and d eveloping dependable a nd secure distributed computing environments that allow existing and future systems to inter-operate. While many existing access control approaches (mandatory, discretionary, and role-based) can be leveraged for the support of security in

S. A. Demurjian; Y. He; T. C. Ting; M. Saba

458

Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues  

ERIC Educational Resources Information Center

This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

2007-01-01

459

Form SS-5 (08-2011) ef (08-2011) Destroy Prior Editions Application for a Social Security Card  

E-print Network

Form SS-5 (08-2011) ef (08-2011) Destroy Prior Editions Application for a Social Security Card Page 1 SOCIAL SECURITY ADMINISTRATION Applying for a Social Security Card is free! USE THIS APPLICATION TO: Apply for an original Social Security card Apply for a replacement Social Security card Change

Shapiro, Benjamin

460

Appropriate Educational Applications of the World Wide Web Today.  

ERIC Educational Resources Information Center

Arguments relevant to higher education institutions and their faculty are discussed for delaying versus going ahead with development of Web pages and their related technologies. A model is outlined for logical progression of educational Web development in four phases: experimentation, template development, reexamination and redevelopment, and…

Malm, Loren D.; Malone, Bobby G.; Nay, Fred W.; Oliver, Brad E.; Saunders, Nancy G.; Thompson, Jay C., Jr.

1998-01-01

461

Data Mining for Web-Enabled Electronic Business Applications  

Microsoft Academic Search

Web-enabled electronic business is generating massive amounts of data on customer purchases, browsing patterns, usage times, and preferences at an increasing rate. Data mining techniques can be applied to all the data being collected for obtaining useful information. This chapter attempts to present issues associated with data mining for Web-enabled electronic- business.

Richi Nayak

462

Mapping Web-Based Applications Failures to Faults  

Microsoft Academic Search

In a world where software system is a daily need, system dependability has been a focus of interest. Nowadays, Web-based systems are more and more used and there is a lack of works about software fault representativeness for this platform. This work presents a field data study to analyze software faults found in real Java Web-based software during system test

Regina Moraes; Bruno T. de Abreu; Eliane Martins

2009-01-01

463

Web Service Based Data Management for Grid Applications  

E-print Network

services replace closed, centralized systems increasingly. Distributed collaborative systems represent systems, web services replace closed, centralized systems increasingly. Due to the fact that web services that realizes the described virtual data pool for files by using a replica catalog described above that provides

Andrzejak, Artur

464

Photonics applications and web engineering: WILGA May 2013  

NASA Astrophysics Data System (ADS)

Traditional WILGA Symposia are held two times a year since 1998. Each year the WILGA May edition gathers around 300 young researchers active in advanced photonics and electronics systems. The paper, as each year, presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the SPIE-IEEE Wilga 2013 Symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics codesign, optoelectronic and electronic systems for astronomy and high energy physics experiments, CMS, ITER, JET - Joint European Torus, BRITE nanosatellite, and pi-of-the sky experiments development. The symposium is an annual summary in the development of numerable Ph.D. theses carried out in this and neighboring countries in the area of advanced electronic and photonic systems. It is also a great occasion for SPIE, IEEE, OSA and PSP students and young researchers to meet together in a large group spanning the whole country with guests from this part of Europe. A digest of Wilga references is presented [1-225].

Romaniuk, Ryszard S.

2013-10-01

465

On the Use of Social Networks in Web Services: Application to the Discovery Stage  

NASA Astrophysics Data System (ADS)

This chapter discusses the use of social networks in Web services with focus on the discovery stage that characterizes the life cycle of these Web services. Other stages in this life cycle include description, publication, invocation, and composition. Web services are software applications that end users or other peers can invoke and compose to satisfy different needs such as hotel booking and car rental. Discovering the relevant Web services is, and continues to be, a major challenge due to the dynamic nature of these Web services. Indeed, Web services appear/disappear or suspend/resume operations without prior notice. Traditional discovery techniques are based on registries such as Universal Description, Discovery and Integration (UDDI) and Electronic Business using eXtensible Markup Language (ebXML). Unfortunately, despite the different improvements that these techniques have been subject to, they still suffer from various limitations that could slow down the acceptance trend of Web services by the IT community. Social networks seem to offer solutions to some of these limitations but raise, at the same time, some issues that are discussed in this chapter. The contributions of this chapter are three: social network definition in the particular context of Web services; mechanisms that support Web services build, use, and maintain their respective social networks; and social networks adoption to discover Web services.

Maamar, Zakaria; Wives, Leandro Krug; Boukadi, Khouloud

466

Use of a Web-based process model to implement security and data protection as an integral component of clinical information management.  

PubMed Central

Delivery of health care at Scott and White, a large integrated health care delivery system, is supported by an Electronic Medical Record (EMR) system repository of six million SGML-based documents. Control of document access is currently based on standard commercial security and confidentiality methodologies. Given the planned release in Fall 1999 of new federal security and confidentiality requirements, we have developed a web-based security process model that "wraps" existing EMR documents with HTML-compliant security attributes. Resulting logical documents are filtered regarding user queries by mapping the security attributes of the data to specific user role characteristics. A key virtue of our approach is that source EMR data do not undergo alteration by the imposition of the security process. It also places no additional work load or query pressure on the existing EMR system. PMID:10566490

Myers, D. L.; Culp, K. S.; Miller, R. S.

1999-01-01

467

Dependently Typed Web Client Applications FRP in Agda in HTML5  

E-print Network

Dependently Typed Web Client Applications FRP in Agda in HTML5 Alan Jeffrey Alcatel-Lucent Bell developed a compiler back end, foreign function inter- face, and library bindings for FRP, and for HTML5 [15

Jeffrey, Alan

468

C# - Connecting a Mobile Application to Oracle Server via Web Services  

E-print Network

This article is focused on mobile development using Visual Studio 2005, web services and their connection to Oracle server, willing to help programmers to realize simple and useful mobile applications.

Ilea, Daniela

2009-01-01

469

A Web application to improve emotional awareness in high-functioning autistics  

E-print Network

The web application built here is based on the idea of presenting scenarios to users, using text, and having the users choose likely emotions that match the scenarios. Taken for granted by most neurotypical people, ...

Sonuyi, Temitope O

2006-01-01

470

Coverage Criteria for Testing Web Applications Sreedevi Sampath, Emily Gibson, Sara Sprenkle, Lori Pollock  

E-print Network

Coverage Criteria for Testing Web Applications Sreedevi Sampath, Emily Gibson, Sara Sprenkle, Lori the content is fixed, or dynamic, CGI PHP ASP JSP Java Servlets MySQL PostGre SQL MS Access Data Files name

Pollock, Lori L.

471

Considering Browser Interaction in Web Application Testing1 Giuseppe A. Di Lucca, Massimiliano Di Penta  

E-print Network

Considering Browser Interaction in Web Application Testing1 Giuseppe A. Di Lucca, Massimiliano Di testing of WAs was discussed in [2]. Di Lucca et al. [3] proposed a black and a white box testing approach

Di Penta, Massimiliano

472

Recent trends in print portals and Web2Print applications  

NASA Astrophysics Data System (ADS)

For quite some time now, the printing business has been under heavy pressure because of overcapacity, dropping prices and the delocalization of the production to low income countries. To survive in this competitive world, printers have to invest in tools that, on one hand, reduce the production costs and, on the other hand, create additional value for their customers (print buyers). The creation of customer portals on top of prepress production systems allowing print buyers to upload their content, approve the uploaded pages based on soft proofs (rendered by the underlying production system) and further follow-up the generation of the printed material, has been illustrative in this respect. These developments resulted in both automation for the printer and added value for the print buyer. Many traditional customer portals assume that the printed products have been identified before they are presented to the print buyer in the portal environment. The products are, in this case, typically entered by the printing organization in a so-called MISi system after the official purchase order has been received from the print buyer. Afterwards, the MIS system then submits the product to the customer portal. Some portals, however, also support the initiation of printed products by the print buyer directly. This workflow creates additional flexibility but also makes things much more complex. We here have to distinguish between special products that are defined ad-hoc by the print buyer and standardized products that are typically selected out of catalogs. Special products are most of the time defined once and the level of detail required in terms of production parameters is quite high. Systems that support such products typically have a built-in estimation module, or, at least, a direct connection to an MIS system that calculates the prices and adds a specific mark-up to calculate a quote. Often, the markup is added by an account manager on a customer by customer basis; in this case, the ordering process is, of course, not fully automated. Standardized products, on the other hand, are easily identified and the cost charged to the print buyer can be retrieved from predefined price lists. Typically, higher volumes will result in more attractive prices. An additional advantage of this type of products is that they are often defined such that they can be produced in bulk using conventional printing techniques. If one wants to automate the ganging, a connection must be established between the on-line ordering and the production planning system. (For digital printing, there typically is no need to gang products since they can be produced more effectively separately.) Many of the on-line print solutions support additional features also available in general purpose e-commerce sites. We here think of the availability of virtual shopping baskets, the connectivity with payment gateways and the support of special facilities for interfacing with courier services (bar codes, connectivity to courier web sites for tracking shipments etc.). Supporting these features also assumes an intimate link with the print production system. Another development that goes beyond the on-line ordering of printed material and the submission of full pages and/or documents, is the interactive, on-line definition of the content itself. Typical applications in this respect are, e.g., the creation of business cards, leaflets, letter heads etc. On a more professional level, we also see that more and more publishing organizations start using on-line publishing platforms to organize their work. These professional platforms can also be connected directly to printing portals and thus enable extra automation. In this paper, we will discuss for each of the different applications presented above (traditional Print Portals, Web2Print applications and professional, on-line publishing platforms) how they interact with prepress and print production systems and how they contribute to the improvement of the overall operations of a printing organization.

Tuijn, Chris

2009-01-01

473

A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications  

NASA Astrophysics Data System (ADS)

Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

474

Security applications of a remote electric-field sensor technology  

NASA Astrophysics Data System (ADS)

A new generation of electric field sensors developed at the University of Sussex is enabling an alternative to contact voltage and non-contact magnetic field measurements. We have demonstrated the capability of this technology in a number of areas including ECG through clothing, remote off-body ECG, through wall movement sensing and electric field imaging. Clearly, there are many applications for a generic sensor technology with this capability, including long term vital sign monitoring. The non-invasive nature of the measurement also makes these sensors ideal for man/machine and human/robot interfacing. In addition, there are obvious security and biometric possibilities since we can obtain physiological data remotely, without the knowledge of the subject. This is a clear advantage if such systems are to be used for evaluating the psychological state of a subject. In this paper we report the results obtained with a new version of the sensor which is capable of acquiring electrophysiological signals remotely in an open unshielded laboratory. We believe that this technology opens up a new area of remote biometrics which could have considerable implications for security applications. We have also demonstrated the ability of EPS to function in closely-packed one and two dimensional arrays for real-time imaging.

Prance, Robert J.; Harland, Christopher J.; Prance, Helen

2008-10-01

475

On the Security of PayPerClick and Other Web Advertising Schemes  

E-print Network

of auditability inherent in these schemes. Keywords: Electronic Commerce, Secure Systems, On­line Advertising, Pay­through count for which it should be paid. Consequently, most ad networks include clauses in their service

Pinkas, Benny

476

High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20 th Century  

Microsoft Academic Search

this report and its predecessor requires the establishment of an"upper bound" for the control threshold that lies at or above the lower bound, but below theperformance requirements of key applications of national security concern, or clusters ofnational security applications. This study has cataloged in detail an extensive number ofnational security applications. The national security community must decide which of thesehave

Seymour E. Goodman; Peter Wolcott; Patrick T. Homer

1998-01-01

477

Computer-aided diagnosis workstation and teleradiology network system for chest diagnosis using the web medical image conference system with a new information security solution  

NASA Astrophysics Data System (ADS)

Diagnostic MDCT imaging requires a considerable number of images to be read. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. Because of such a background, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis. We also have developed the teleradiology network system by using web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. Our teleradiology network system can perform Web medical image conference in the medical institutions of a remote place using the web medical image conference system. We completed the basic proof experiment of the web medical image conference system with information security solution. We can share the screen of web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with the workstation that builds in some diagnostic assistance methods. Biometric face authentication used on site of teleradiology makes "Encryption of file" and "Success in login" effective. Our Privacy and information security technology of information security solution ensures compliance with Japanese regulations. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new teleradiology network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our teleradiology network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaro; Moriyama, Noriyuki

2010-03-01

478

Development of a Secure Mobile GPS Tracking and Management System  

ERIC Educational Resources Information Center

With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …

Liu, Anyi

2012-01-01

479

A flexible security architecture to support third-party applications on mobile devices  

Microsoft Academic Search

The problem of supporting the secure execution of poten- tially malicious third-party applications has received a con- siderable amount of attention in the past decade. In this paper we describe a security architecture for mobile de- vices that supports the flexible integration of a variety of advanced technologies for such secure execution of applica- tions, including run-time monitoring, static verification

Lieven Desmet; Wouter Joosen; Fabio Massacci; Katsiaryna Naliuka; Pieter Philippaerts; Frank Piessens; Dries Vanoverberghe

2007-01-01

480

M-Identity and its Authentication Protocol for Secure Mobile Commerce Applications  

E-print Network

, establishing a secure m-commerce platform that offers high level of service can be challeng- ing. This paper into these networks [4]. Security can be regarded as an enabling factor for the success of m-commerce ap- plications authentication (BDIA) protocol for secure m-commerce applications is proposed. In order to ensure reliable user

van Schyndel, Ron

481

STAR: chart - Preserving Data Semantics in Web-Based Applications  

Microsoft Academic Search

Every time a Web-based interface is built upon pre-existing data-sources, the result comes often from a difficult and painful\\u000a process of negotiation between the data manager – who knows the “semantics” of the data to be exposed, but cannot build the\\u000a UI on his own – and the Web designer – who cares a lot about the presentation and the

Irene Celino; Dario Cerizza; Francesco Corcoglioniti; Alberto Guarino; Andrea Turati; Emanuele Della Valle

2009-01-01

482

Security of Electronic Business Applications - Structure and Quantification  

Microsoft Academic Search

The rapid growth of the commercial use of the Internet goes along with a rising need for security for both customer and merchant. As many parties and different systems are involved, security becomes a complicated issue. There- fore, the need for definition, structuring, and quantification of security arises. This paper proposes a structured approach to analyze security measures and to

Konstantin Knorr; Susanne Röhrig

2000-01-01

483

A web application for cotton irrigation management on the U.S. southern high plains. Part II: Application design  

Technology Transfer Automated Retrieval System (TEKTRAN)

A web-based application to help Southern High Plains cotton producers estimate profitability under center pivot irrigated production is described. The application’s crop modeling and general profit calculation approach are outlined in a preceding companion paper, while additional details of the prof...

484

A Web Application for Cotton Irrigation Management on The US Southern High Plains. Part II: Application Design  

Technology Transfer Automated Retrieval System (TEKTRAN)

A web-based application intended to help Southern High Plains cotton producers estimate profitability under center pivot irrigated production is described. The application’s crop modeling and general profit calculation approach are outlined in a preceding companion paper, while additional details of...

485

Mobile Agent and Web Service Integration Security Architecture Junqi Zhang, Yan Wang and Vijay Varadharajan  

E-print Network

. This architecture provides a new authentication scheme for Web service provider to verify the mobile agent owner require light-weighted, autonomous and efficient systems that consume fewer resources and require less network connection. Mobile agent is a mobile executable object that can be dispatched by its owner

Wang, Yan

486

A secure and privacy-preserving web banner system for targeted advertising  

Microsoft Academic Search

A solution for privacy-preserving targeted advertising through web banners is proposed. The solution allows users to make a balance between the exposure of their privacy and the personalization of advertisements. The general idea of the solution lies in dynamically associating users with profiles according to their interests and\\/or demographics instead of to individual and unique identifiers. Users have complete control

Joris Claessens; Claudia D ´ iaz; Raimondo Faustinelli; Bart Preneel

487

2014 Twelfth Annual Conference on Privacy, Security and Trust (PST) ZARATHUSTRA: Extracting WebInject Signatures  

E-print Network

a client is infected. Differently from the state of the art, our method works regardless of how the Web Politecnico di MilanoPolitecnico di Milano and Google Zurich Politecnico di Milano Email: claudioc@google with negligible false positives. Throughout the paper, we describe some use cases that describe how our method can

Cortes, Corinna

488

A Secure Web Service-based Platform for Wireless Sensor Network Management and  

E-print Network

a Service Oriented routing protocol for WSN. Keywords: Web Services, WSN, SOA, AAA, Routing 1 Introduction of the works focused on designing routing protocols to address energy consumption issue, fault tolerance: A Wireless Sensor Network (WSN) is composed of small, low cost and low energy consumption devices called

Paris-Sud XI, Université de

489

Section Course Term Credits Room Day Time 132D ALS4932 Fall 1 WEB WEB WEB  

E-print Network

Section Course Term Credits Room Day Time 132D ALS4932 Fall 1 WEB WEB WEB 1G73 FNR3131C Fall 3 DEGREE APPLICATIONS DUE September 13th CLASSES END December 4th WEB WEB WEB WEB Forest Operations Sager WEB Capinera WEB Turf and Ornamental Entomology Buss WEB Bennet Capinera Lutz STAFF Mac

Watson, Craig A.

490

Development of a web application for water resources based on open source software  

NASA Astrophysics Data System (ADS)

This article presents research and development of a prototype web application for water resources using latest advancements in Information and Communication Technologies (ICT), open source software and web GIS. The web application has three web services for: (1) managing, presenting and storing of geospatial data, (2) support of water resources modeling and (3) water resources optimization. The web application is developed using several programming languages (PhP, Ajax, JavaScript, Java), libraries (OpenLayers, JQuery) and open source software components (GeoServer, PostgreSQL, PostGIS). The presented web application has several main advantages: it is available all the time, it is accessible from everywhere, it creates a real time multi-user collaboration platform, the programing languages code and components are interoperable and designed to work in a distributed computer environment, it is flexible for adding additional components and services and, it is scalable depending on the workload. The application was successfully tested on a case study with concurrent multi-users access.

Delipetrev, Blagoj; Jonoski, Andreja; Solomatine, Dimitri P.

2014-01-01

491

Security Aspects of an Enterprise-Wide Network Architecture.  

ERIC Educational Resources Information Center

Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…

Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan

1999-01-01

492

Computer Science Tripos part 1b | Security Lecture 1 | Security Applications  

E-print Network

, bolts and bars, so a computer system can be made more secure by adding more and more #12;rewalls mechanisms) to enforce the security policy. The strength of mechanisms that we use should be proportional

Cengarle, María Victoria

493

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2011 CFR

17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 ...X-15AA-1, for application for registration as a national securities association or affiliated securities association. 249.801 Section 249.801...

2011-04-01

494

Probing a Self-Developed Aesthetics Measurement Application (SDA) in Measuring Aesthetics of Mandarin Learning Web Page Interfaces  

E-print Network

This article describes the accurateness of our application namely Self-Developed Aesthetics Measurement Application (SDA) in measuring the aesthetics aspect by comparing the results of our application and users' perceptions in measuring the aesthetics of the web page interfaces. For this research, the positions of objects, images element and texts element are defined as objects in a web page interface. Mandarin learning web pages are used in this research. These learning web pages comprised of main pages, learning pages and exercise pages, on the first author's E-portfolio web site. The objects of the web pages were manipulated in order to produce the desired aesthetic values. The six aesthetics related elements used are balance, equilibrium, symmetry, sequence, rhythm, as well as order and complexity. Results from the research showed that the ranking of the aesthetics values of the web page interfaces measured of the users were congruent with the expected perceptions of our designed Mandarin learning web pag...

Zain, Jasni Mohamad; Goh, Yingsoon

2011-01-01

495

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Microsoft Academic Search

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness\\/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort

Mark D. Hadley; Samuel L. Clements

2009-01-01

496

The application research of airport security information management system on the field of civil aviation security  

Microsoft Academic Search

The airport security information management system (ASIMS) has been playing very important role in preventing aircrafts from hijacking, terrorism attacks and other acts of unlawful interference. The system is designed to integrate a variety of security information of an airport into an organic body by analyzing and mining data collected form the security checkpoints and stored in central server database

Wu Wei

2009-01-01

497

Wireless sensors and sensor networks for homeland security applications  

PubMed Central

New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers. PMID:23175590

Potyrailo, Radislav A.; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M.; Kelley-Loughnane, Nancy; Naik, Rajesh R.

2012-01-01

498

A secure RFID-based WBAN for healthcare applications.  

PubMed

A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years. PMID:24061704

Ullah, Sana; Alamri, Atif

2013-10-01

499

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey  

PubMed Central

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

Kumar, Pardeep; Lee, Hoon-Jae

2012-01-01

500

Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks  

PubMed Central

Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311

Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

2014-01-01