These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Web Applications and Security Web protocol overview  

E-print Network

Web Applications and Security Web protocol overview Web forms Cookies Attacks against Web>University of Massachusetts Amherst #12;Basic Web scripting There are two basic HTTP request methods, GET and POST descriptor. #12;Securing basic web apps is easy DON'T TRUST USER INPUT, EVER... Never execute code provide

Massachusetts at Amherst, University of

2

Web application security Executive brief  

E-print Network

, such as credit card data, social security numbers and health records. Therefore, it's more impor- tant than ever, incidents of Web application breaches resulting in data theft are popping up as front-page news standards, such as the Payment Card Industry (PCI) Data Security Standards*--a protocol that includes

3

Title: Abstracting Application-Level Web Security  

Microsoft Academic Search

Application-level web security refers to vulnerabilities inherent in the code of a web-application itself (irrespective of the technologies in which it is implemented or the security of the web- server\\/back-end database on which it is built). In the last few months application-level vulner- abilities have been exploited with serious consequences: hackers have tricked e-commerce sites into shipping goods for no

4

Abstracting application-level web security  

Microsoft Academic Search

Application-level web security refers to vulnerabilities inherent in the code of a web-application itself (irrespective of the technologies in which it is implemented or the security of the web-server\\/back-end database on which it is built). In the last few months application-level vulnerabilities have been exploited with serious consequences: hackers have tricked e-commerce sites into shipping goods for no charge, user-names

David Scott; Richard Sharp

2002-01-01

5

WEB SECURITY Browser Security  

E-print Network

WEB SECURITY 1 Browser Security: Lessons from Google Chrome Google Chrome developers focused can attack users through their Web browsers. Browsers face the challenge of keeping their users safe while providing a rich platform for Web applications. Browsers are an appealing target for attackers

Tomkins, Andrew

6

Specifying and Enforcing Application-Level Web Security Policies  

Microsoft Academic Search

Application-level Web security refers to vulnerabilities inherent in the code of a Web-application itself (irrespective of the technologies in which it is implemented or the security of the Web-server\\/back-end database on which it is built). In the last few months, application-level vulnerabilities have been exploited with serious consequences: Hackers have tricked e-commerce sites into shipping goods for no charge, usernames

David Scott; Richard Sharp

2003-01-01

7

Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2).  

E-print Network

Web Application Security Standards and Practices Page 1 of 13 Web Application Security Standard Operating Environment (SOE) V1 1 (2). Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices

Grishok, Alla

8

Securing web application code by static analysis and runtime protection  

Microsoft Academic Search

Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabilities have been attributed to Web application bugs. Many verification tools are discovering previously unknown vulnerabilities in legacy C programs, raising hopes that the same success can be achieved with Web applications. In this paper,

Yao-Wen Huang; Fang Yu; Christian Hang; Chung-Hung Tsai; Der-Tsai Lee; Sy-Yen Kuo

2004-01-01

9

Ripley: Automatically Securing Distributed Web Applications  

E-print Network

are becoming increasingly distributed, as demon- strated by the popularity of AJAX/Web 2.0 applications such as Hotmail, Google Maps, Facebook, and many others. A typical multi-tier AJAX application con- sists complex and representative AJAX applications suggests that RIPLEY is a promising method for building

Livshits, Ben

10

Simultaneous scalability and security for data-intensive web applications  

Microsoft Academic Search

For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches application data and supplies query answers on behalf of the application. Cost-effective DSSPs will need to cache data from many applications, inevitably raising concerns about security. However, if all data passing through a DSSP is

Amit Manjhi; Anastassia Ailamaki; Bruce M. Maggs; Todd C. Mowry; Christopher Olston; Anthony Tomasic

2006-01-01

11

Secure Web Application Development and Global Regulation  

Microsoft Academic Search

The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today's global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled

William Bradley Glisson; L. Milton Glisson; Ray Welland

2007-01-01

12

Web-Based Training Applications in Safeguards and Security  

SciTech Connect

The U.S. Department of Energy (DOE) requires all employees who hold a security clearance and have access to classified information and/or special nuclear material to be trained in the area of Safeguards and Security. Since the advent of the World Wide Web, personnel who are responsible for training have capitalized on this communication medium to develop and deliver Web-based training. Unlike traditional computer based training where the student was required to find a workstation where the training program resided, one of Web-based training strongest advantage is that the training can be delivered right to the workers desk top computer. This paper will address reasons for the driving forces behind the utilization of Web-based training at the Laboratory with a brief explanation of the different types of training conducted. Also discussed briefly is the different types of distance learning used in conjunction with Web-based training. The implementation strategy will be addressed and how the Laboratory utilized a Web-Based Standards Committee to develop standards for Web-based training applications. Web-based problems resulting from little or no communication between training personnel across the Laboratory will be touched on and how this was solved. Also discussed is the development of a ''Virtual Training Center'' where personnel can shop on-line for their training needs. Web-based training programs within the Safeguards and Security arena will be briefly discussed. Specifically, Web-based training in the area of Materials Control and Accountability will be explored. A Web-based example of what a student would experience during a training session is also discussed. A short closing statement of what the future of Web-based Training holds in the future is offered.

Lopez, R.L.

1999-05-21

13

SECURING WEB 2.0 APPLICATIONS THROUGH REPLICATED EXECUTION  

E-print Network

Client-side computation Server-side computation Client-side rendering Static HTML Web 1.0 Web 2.0 3 for performance #12;Motivation Security vs. Performance 9 responsiveness security Web 1.0: · ASP.NET · PHP Web 2

Livshits, Ben

14

Security Analysis and Improvement Model for Web-based Applications  

E-print Network

be conceptually expressed in the discrete states of (web_client_good; web_server_good, web_server_vulnerable, web_server_attacked, web_server_security_failed; database_server_good, database_server_vulnerable, database_server_attacked, database...

Wang, Yong

2010-01-14

15

Preventing Secure Web Applications Overload through Dynamic Resource Provisioning and Admission Control  

Microsoft Academic Search

Overload control mechanisms such as admission control and connections differentiation have been proven effective for preventing overload of application servers running secure web applications. However, achieving optimal results in overload prevention is only possible when considering some kind of resource management in addition to these mechanisms. In this paper we propose an overload control strategy for secure web applications that

Jordi Guitart; David Carrera

16

Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms  

Microsoft Academic Search

Overload control mechanisms such as admission control and connection differentiation have proven effective for pre- venting overload of application servers running secure web applications. However, achieving optimal results in overload prevention is only possible when some kind of resource management is considered in addition to these mechanisms. In this paper we propose an overload control strategy for secure web applications

Jordi Guitart; David Carrera; Vicen Beltran; Jordi Torres; Eduard Ayguad

2008-01-01

17

Practical security for multi-user web application databases  

E-print Network

Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can ...

Redfield, Catherine M. S

2012-01-01

18

A dynamic technique for enhancing the security and privacy of web applications  

Microsoft Academic Search

Web application security and privacy became a central concern among the security community. The problems that are faced once an application is compromised necessarily demands special attention. The emerging programming languages, which allow unexperienced users to quickly develop applications, still fail to introduce mechanisms for pre- venting the aforementioned attacks. We introduce a technique for en- hancing the security and

Ariel Futoransky; Ezequiel Gutesman; Ariel Waissbein

19

Unit Testing and Action-Level Security Solution of Struts Web Applications Based on MVC  

Microsoft Academic Search

The MVC design pattern is very useful for architecting Web applications, which encourages developers to partition the applications as early as in the design phase. Nowadays, Struts Web applications based on MVC have become more and more popular in various fields, the unit testing and action-level security are the most important method for guaranteeing the applications quality.In this paper, we

Qinglin Wu; Yanzhong Hu; Yan Wang

2010-01-01

20

CAPTCHAs: An Artificial Intelligence Application to Web Security  

Microsoft Academic Search

Nowadays, it is hard to find a popular Web site with a registration form that is not protected by an automated human proof test which displays a sequence of characters in an image, and requests the user to enter the sequence into an input field. This security mechanism is based on the Turing Testone of the oldest concepts in Artificial

Jos Mara Gmez Hidalgo; Gonzalo Alvarez

2011-01-01

21

Towards a Formal Foundation of Web Security  

Microsoft Academic Search

We propose a formal model of web security based on an abstraction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We identify three distinct threat models that can be used to analyze web applications, ranging from a web attacker who controls malicious web sites and clients, to stronger attackers

Devdatta Akhawe; Adam Barth; Peifung E. Lam; John C. Mitchell; Dawn Song

2010-01-01

22

MasteringWeb Services Security MasteringWeb Services Security  

E-print Network

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

23

Evaluation of OPC UA secure communication in web browser applications  

Microsoft Academic Search

OPC UA XML Web services mapping offers a Web service interface to access process data. Web services use XML technology for data exchange. Present-day Web browsers include XML functionality already as a standard feature, they are therefore very promising candidates for the implementation of monitoring and operating functions for industrial processes. However, the acceptance of Web services in industrial automation

Annerose Braune; Stefan Hennig; Sebastian Hegler

2008-01-01

24

January 2008 SECURE WEB SERVERS  

E-print Network

-44, Guidelines on Securing Public Web Servers, which focuses on the design, implementation, and operation, which focuses on the design, implementation, and operation of publicly accessible and secure Web serversJanuary 2008 SECURE WEB SERVERS: PROTECTING WEB SITES SECURE WEB SERVERS: PROTECTING WEB SITES

25

Security Lab Series Introduction to Web Technologies  

E-print Network

Security Lab Series Introduction to Web Technologies Prof. Lixin Tao Pace University http...........................................................................................................................................1 1.1 Web ArchitectureScript..................................................................................16 4.6 Creating Your First JavaServer Page Web Application

Tao, Lixin

26

Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications  

Microsoft Academic Search

\\u000a While Java and PHP are two of the most popular languages for open source web applications found at \\u000a freshmeat.net\\u000a , Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is deserved.\\u000a We studied whether the variation in vulnerability density is greater between languages or between different applications written\\u000a in a single

James Walden; Maureen Doyle; Robert Lenhof; John Murray

2010-01-01

27

Developing secure Web-applications Security criteria for the development of e-Democracy Web-applications  

Microsoft Academic Search

One of the most important requirements in government websites is the security. The Data Protection Act, Human Rights Act and\\u000a other legislation require that privacy is respected. Beyond this, Government websites must be secure to build trust and maintain\\u000a the reputation of electronic government. This will be seriously damaged if websites are defaced, services are unavailable\\u000a or sensitive information is

Antnio Pacheco; Carlos Serro

28

Simultaneous Scalability and Security for Data-Intensive Web Applications  

E-print Network

Ailamaki Bruce M. Maggs Todd C. Mowry Christopher Olston Anthony Tomasic March 2006 CMU-CS-06-116 School of the application. Cost-effective DSSPs will need to cache data from many applications, inevitably raising concerns impacting scalability. Experiments over a prototype DSSP system show the effectiveness of our static

29

Introduction to Web and Internet Security Patrick McDaniel  

E-print Network

Introduction to Web and Internet Security Patrick McDaniel AT&T Labs - Research Florham Park, NJ tutorial, we present an introduction to the methods and pitfalls of Web and Internet security. We explore of emerging areas and applications in Web and Internet security. 1 Tutorial Overview and Objectives

McDaniel, Patrick Drew

30

Ripley: Automatically Securing Web 2.0 Applications Through Replicated Execution  

E-print Network

are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many others. A typ- ical multi-tier AJAX application consists representative AJAX applications built in Volta and also on Hotmail, a large widely-used AJAX application. Our

Livshits, Ben

31

Web service security management using semantic web techniques  

Microsoft Academic Search

The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Security standard is a step towards satisfying this demand. However, in the current security approach, the mechanism used for describing security properties of Web services restricts security policy specification and intersection. In environments that

Diego Zuquim Guimares Garcia; Maria Beatriz Felgar De Toledo

2008-01-01

32

Ripley: automatically securing web 2.0 applications through replicated execution  

Microsoft Academic Search

Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many others. A typ- ical multi-tier AJAX application consists, at the least, of a server- side component implemented in Java J2EE, PHP or ASP.NET and a client-side component running JavaScript. The resulting applica- tion is

K. Vikram; Abhishek Prateek; V. Benjamin Livshits

2009-01-01

33

Gordon and Mike's ICT Podcast: Flat World Strategies: Web 2.0 Application Security Threats  

NSDL National Science Digital Library

Gordon and Mike's ICT Podcast offers perspectives on the information and communication technologies (ICT) industries from Gordon Snyder and Mike Qaissaunee. In this podcast, Mike and Gordon discuss the vulnerabilities of Web 2.0 technologies by examining the seven threats identified by security experts at SPI Dynamics, Inc. The running time for this show is 23:26.This podcast is available for direct download in mp3 format from the Libsyn site, or click here to subscribe to the whole series in iTunes.

Qaissaunee, Michael; Snyder, Gordon F.

2008-02-20

34

An Empirical Evaluation of Security Indicators in Mobile Web Browsers  

E-print Network

1 An Empirical Evaluation of Security Indicators in Mobile Web Browsers Chaitrali Amrutkar, Student--Measurement, mobile security, SSL indicators, web browsers. ! 1 INTRODUCTION Mobile browsers provide a rich set information to the ability for third-party applications to render content through WebViews, browsers

Van Oorschot, Paul

35

OMash: Enabling Secure Web Mashups via Object Abstractions  

E-print Network

.6 [Operating Systems]: Security and Protection General Terms Design, Languages, Security. Keywords Web, browser, and discussion boards. The rise of AJAX (Asynchronous JavaScript and XML) style web applications has given the rise of AJAX and mashups, at any given time a web browser likely contained pages from different domains

Chen, Hao

36

Building a Secure Web Browser  

Microsoft Academic Search

Abstract: Over the last several years, popular application such as Microsoft InternetExplorer and Netscape Navigator have become prime targets ofattacks. These applications are targeted because their function is to processunauthenticated network data that often carry active content. Theprocessing is done either by helper applications, or by the web browseritself. In both cases the software is often too complex to be

Sotiris Ioannidis; Steven M. Bellovin

2001-01-01

37

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon  

E-print Network

FOUNDATIONS OF WEB SCRIPT SECURITY Aaron Bohannon A DISSERTATION in Computer and Information Science #12;FOUNDATIONS OF WEB SCRIPT SECURITY COPYRIGHT 2012 Aaron Bohannon #12;Acknowledgements applying reactive noninterference to web browsers. Before I started the final phase of my thesis research

Plotkin, Joshua B.

38

web identity application sectioneleven  

E-print Network

web identity application sectioneleven 99 contents elements of webpage design......................................................................... 100-101 web development and design considerations web banners is required for all official UCSF webpages. This banner includes a required link

Derisi, Joseph

39

Security for Distributed Web-Applications via Aspect-Oriented Programming  

Microsoft Academic Search

Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on as- pect oriented programming and the liberty

Nicolai Kuntze; Thomas Rauch; Andreas U. Schmidt

2005-01-01

40

Introducing Web Application Development  

E-print Network

Introducing Web Application Development Instructor: Dr Wei Ding Development Instructor: Dr.Wei Ding Fall 2009 1CS 437/637 Database-BackedWeb Sites andWeb Services Introduction: Internet vs. World Wide Web Internet is an interconnected network of thousands ofInternet is an interconnected network

Ding, Wei

41

On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management  

Microsoft Academic Search

The adoption of a policy-based approach for the dynamic regulation of a system or service (e.g. security, QoS or mobility service) requires an appropriate policy representation and processing. In the context of the Semantic Web, the representation power of languages enriched with semantics (i.e. semantic languages), together with the availability of suitable interpreters, make such kind of languages well suited

Flix J. Garca Clemente; Gregorio Martnez Prez; Juan A. Bota Blaya; Antonio F. Gmez-skarmeta

2005-01-01

42

Securing Web Services Using Semantic Web Technologies  

Microsoft Academic Search

In this paper we propose an authorisation definition and access control solution for Web Services. In our proposal we define\\u000a our access control policies using an OWL-DL language based on the extensible Access Control Markup Language (XACML). We propose\\u000a the use of resource and subject metadata ontologies, also written in OWL. We then present a complete Web Services architecture\\u000a which

Brian Shields; Owen Molloy; Gerard Lyons; Jim Duggan

43

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc  

E-print Network

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

Qian, Ning

44

Adaptive Web Applications  

Microsoft Academic Search

The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contemporary ideas for user modelling in web applications is that of cognitive styles, where a user's psychological preferences are assessed stored in a database and then used to provide personalised content and\\/or links. We

Elizabeth Brown; Tim Brailsford; Tony Fisher; Adam Moore; Helen Ashman

45

Building fast and secure Web services with OKWS  

E-print Network

OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, ...

Krohn, Maxwell (Maxwell N.)

2005-01-01

46

Crowdsourced Web Augmentation: A Security Model  

Microsoft Academic Search

\\u000a Web augmentation alters the rendering of existing Web applications at the back of these applications. Changing the layout, adding\\/removing content or providing additional\\u000a hyperlinks\\/widgets are examples of Web augmentation that account for a more personalized user experience. Crowdsourced Web augmentation considers end users not only the beneficiaries but also the contributors of augmentation scripts. The fundamental\\u000a problem with so augmented

Cristbal Arellano; Oscar Daz; Jon Iturrioz

2010-01-01

47

Speculations on the science of web user security Ravi Sandhu  

E-print Network

Speculations on the science of web user security Ravi Sandhu Institute for Cyber Security history: Available online 26 October 2012 Keywords: Web user security Security science Cyber security a b s t r a c t There appears to be consensus among seasoned cyber security researchers

Sandhu, Ravi

48

Intelligent Crawling of Web Applications for Web Archiving  

E-print Network

that uses Web standards such as HTML and HTTP to publish information on the Web, accessible by Web browsers. A Web appli- cation is any HTTP-based application that utilizes the Web and Web browser technologiesIntelligent Crawling of Web Applications for Web Archiving Muhammad Faheem supervised by Pierre

Paris-Sud XI, Université de

49

Complex Image Recognition and Web Security  

Microsoft Academic Search

Web services offered for human use are being abused by programs. Efforts to defend against these abuses have, over the last 5 years, stimulated the development of a new family of security protocols able to distinguish between human and machine users automatically over graphical user interfaces (GUIs) and networks. AltaVista pioneered this technology in 1997; by 2000, Yahoo! and PayPal

Henry S. Baird

50

Factsheets Web Application  

SciTech Connect

The Factsheets web application was conceived out of the requirement to create, update, publish, and maintain a web site with dynamic research and development (R and D) content. Before creating the site, a requirements discovery process was done in order to accurately capture the purpose and functionality of the site. One of the high priority requirements for the site would be that no specialized training in web page authoring would be necessary. All functions of uploading, creation, and editing of factsheets needed to be accomplished by entering data directly into web form screens generated by the application. Another important requirement of the site was to allow for access to the factsheet web pages and data via the internal Sandia Restricted Network and Sandia Open Network based on the status of the input data. Important to the owners of the web site would be to allow the published factsheets to be accessible to all personnel within the department whether or not the sheets had completed the formal Review and Approval (R and A) process. Once the factsheets had gone through the formal review and approval process, they could then be published both internally and externally based on their individual publication status. An extended requirement and feature of the site would be to provide a keyword search capability to search through the factsheets. Also, since the site currently resides on both the internal and external networks, it would need to be registered with the Sandia search engines in order to allow access to the content of the site by the search engines. To date, all of the above requirements and features have been created and implemented in the Factsheet web application. These have been accomplished by the use of flat text databases, which are discussed in greater detail later in this paper.

VIGIL,FRANK; REEDER,ROXANA G.

2000-10-30

51

Geospatial Web Applications  

NSDL National Science Digital Library

GeoTech Center presents a series of model courses on GIS, spatial technologies, and related subjects. This eighth course introduces "the design, publishing, optimization of geospatial servers, and maintenance of basic geospatial web services and applications." A course outline describes prerequisites, student learning outcomes, and course objectives. A second document contains a rubric for evaluating student learning outcomes.

2014-07-11

52

Security and Privacy on the Semantic Web  

Microsoft Academic Search

The semantic Web aims to enable sophisticated and autonomic machine-to-machine interactions without human intervention, by\\u000a providing machines not only with data but also with its meaning (semantics). In this setting, traditional security mechanisms\\u000a are not suitable anymore. For example, identity-based access control assumes that parties are known in advance. Then, a machine\\u000a first determines the identity of the requester in

Daniel Olmedilla

53

Representing Security Policies in Web Information Systems  

Microsoft Academic Search

Policies, which usually govern the behaviour of networking services (e.g., security, QoS, mobility, etc.), are becoming an increasingly popular approach for the dynamic regulation of web information systems. The adoption of a policy-based approach for controlling a system requires an appropriate policy representation regarding both syntax and semantics, and the design and development of a policy management framework. In the

Flix J. Garca; Gregorio Martnez; Juan A. Bota; Antonio F. Gmez

2005-01-01

54

Dragnet? No, Internet! Campus Security on the Web.  

ERIC Educational Resources Information Center

Examines college campus security's use of an Internet Web page to better inform its students and enhance campus law enforcement. The University of Richmond security Web site is provided as an example of how an interactive security system works. It notes that this system is available free to campus law enforcement agencies able to satisfy certain

Fickes, Michael

1998-01-01

55

Web Application Orchestration Using Excel  

Microsoft Academic Search

Form-based Web applications described in HTML can be easily used by end-users. In order to enable end-users to define a series of tasks by combining multiple Web resources, it is necessary to provide an orchestration environment for Web applications. A spreadsheet is one of the most popular applications for office workers. It provides an end- user programming environment. In this

Jun Fujima; Shohei Yoshihara; Yuzuru Tanaka

2007-01-01

56

Towards a Framework for Migrating Web Applications to Web Services  

E-print Network

Towards a Framework for Migrating Web Applications to Web Services Asil A. Almonaies Manar H {asil,alalfi,cordy,dean}@cs.queensu.ca Abstract Migrating traditional legacy web applications to web services is an important step in the modernization of web-based business systems to more complex inter

Cordy, James R.

57

SPIM Architecture for MVC based Web Applications  

E-print Network

The Model / View / Controller design pattern divides an application environment into three components to handle the user-interactions, computations and output respectively. This separation greatly favors architectural reusability. The pattern works well in the case of single-address space and not proven to be efficient for web applications involving multiple address spaces. Web applications force the designers to decide which of the components of the pattern are to be partitioned between the server and client(s) before the design phase commences. For any rapidly growing web application, it is very difficult to incorporate future changes in policies related to partitioning. One solution to this problem is to duplicate the Model and controller components at both server and client(s). However, this may add further problems like delayed data fetch, security and scalability issues. In order to overcome this, a new architecture SPIM has been proposed that deals with the partitioning problem in an alternative way. S...

Sridaran, R; Iyakutti, K; Mani, M N S

2010-01-01

58

A Systematic Analysis of XSS Sanitization in Web Application Frameworks  

E-print Network

A Systematic Analysis of XSS Sanitization in Web Application Frameworks Joel Weinberger, Prateek. By streamlining and au- tomating XSS sanitization, web application frameworks stand in a good position to stop XSS systematically study the security of the XSS sanitization abstractions frameworks provide. We develop a novel

Song, Dawn

59

Secure Web-Site Access with Tickets and Message-Dependent Digests  

USGS Publications Warehouse

Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.

Donato, David I.

2008-01-01

60

Secure Authentication and Session State Management for Web Services  

E-print Network

Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services communicate over the internet, and is language independent. #12;Lehman 2 Web services will provide a way

Young, R. Michael

61

Building Fast and Secure Web Services with OKWS  

Microsoft Academic Search

Abstract OKWS is a Web server specialized for secure and fast delivery of dynamic,content. It provides Web developers with a small set of tools powerful enough to build complex Web- based systems. Despite its emphasis on security, OKWS shows performance improvements compared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWSs throughput and responsiveness exceed that of Apache

Maxwell Krohn

2005-01-01

62

Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies  

Microsoft Academic Search

While conducting a security analysis of JavaScriptand VBScript, the most popular scripting languageson the Web, we found some serious #aws. Motivatedby this outcome, we propose steps towards asound de#nition and design of a security frameworkfor scripting languages on the Web. We show that ifsuch a security framework had been integrated intothe respective scripting languages from the very beginning,the probability of

Vinod Anupam

1998-01-01

63

A Framework for Migrating Web Applications to Web Services  

E-print Network

A Framework for Migrating Web Applications to Web Services Asil A. Almonaies, Manar H. Alalfi-automatically migrat- ing monolithic legacy web applications to service oriented architecture (SOA) by separating potentially reusable features as web services. Software design re- covery and source transformation techniques

Cordy, James R.

64

OWL-S Semantics of Security Web Services: a Case Study  

Microsoft Academic Search

\\u000a The power of Web services (WS) technology lies in the fact that it takes integration to a new level. With the increasing amount\\u000a of services available on the Web, solutions are needed that address security concerns of distributed Web service applications\\u000a such as end-to-end service requirements for authentication, authorization, data integrity and confidentiality, and non-repudiation\\u000a in the context of dynamic

Grit Denker; Son Nguyen; Andrew Ton

2004-01-01

65

Mobile Security for Internet Applications  

E-print Network

Mobile Security for Internet Applications Roger Kehr1 · Joachim Posegga2 Roland Schmitz1 · Peter this technology can be used for securing services over the Internet and describes several concrete application will not explicitly refer to UMTS; however, our approach can easily be #12;2 Mobile Security for Internet Applications

Posegga, Joachim

66

Web Cube: a Programming Model for Reliable Web Applications  

E-print Network

Web Cube: a Programming Model for Reliable Web Applications I.S.W.B. Prasetya, T.E.J. Vos, S UU-CS-2005-002 www.cs.uu.nl #12;Web Cube: a Programming Model for Reliable Web Applications I@cs.uu.nl, tanja@iti.upv.es, doaitse@cs.uu.nl, bela@cs.ui.ac.id Abstract Web Cube is a server side programming

Utrecht, Universiteit

67

Lecture 24: Document and Web Applications  

E-print Network

Lecture 24: Document and Web Applications Sam Roweis March 31, 2004 Machine Learning on Text/Web Machine Learning Problems for Text/Web Data · Document / Web Page Classification or Detection 1. Does this document/web page contain an example of thing X? e.g. Job advertisements (FlipDog). 2. Is this document/web

Roweis, Sam

68

Intelligent and Adaptive Crawling of Web Applications for Web Archiving  

E-print Network

Intelligent and Adaptive Crawling of Web Applications for Web Archiving Muhammad Faheem1 and Pierre Kong, Hong Kong firstname.lastname@telecom.paristech.fr Abstract. Web sites are dynamic in nature with content and structure changing overtime. Many pages on the Web are produced by content management systems

Senellart, Pierre

69

Users' conceptions of web security: a comparative study  

Microsoft Academic Search

This study characterizes users' conceptions of web security. Seventy-two individuals, 24 each from a rural community in Maine, a suburban professional community in New Jersey, and a high-technology community in California, participated in an extensive (2-hour) semi-structured interview (including a drawing task) about Web security. The results show that many users across the three diverse communities mistakently evaluated whether a

Batya Friedman; David Hurley; Daniel C. Howe; Edward W. Felten; Helen Nissenbaum

2002-01-01

70

Building Secure High-Performance Web Services with OKWS  

Microsoft Academic Search

OKWS is a toolkit for building fast and secure Web ser- vices. It provides Web developers with a small set of tools that has proved powerful enough to build complex systems with limited effort. Despite its emphasis on se- curity, OKWS shows performance improvements com- pared to popular systems: when servicing fully dynamic, non-disk-bound database workloads, OKWS's through- put and

Maxwell N. Krohn

2004-01-01

71

Security and Privacy on the Semantic Web Daniel Olmedilla  

E-print Network

with each other automatically and therefore this assumption does not hold. Hence, a semantically enrichedSecurity and Privacy on the Semantic Web Daniel Olmedilla L3S Research Center and University of Hannover olmedilla@L3S.de Summary. The Semantic Web aims at enabling sophisticated and autonomic ma- chine

Olmedilla, Daniel

72

December 2002 SECURITY OF PUBLIC WEB  

E-print Network

locations, foiling attempts by organi zations to develop effective counter measures. Once web servers have their customers and the public, and conduct electronic transactions. The web server is the essential system-46 are available in electronic format from the NIST website: http:// csrc.nist.gov/publications/nistpubs/ index

73

Providing caching abstractions for web applications  

E-print Network

Web-based applications are used by millions of users daily, and as a result a key challenge facing web application designers is scaling their applications to handle this load. A crucial component of this challenge is scaling ...

Gupta, Priya, S.M. Massachusetts Institute of Technology

2010-01-01

74

Security Requirements for Social Networks in Web 2.0  

NASA Astrophysics Data System (ADS)

A social network is a structure of individuals or organizations, which are connected by one or more types of interdependency, such as friendship, affinity, common interests or knowledge. Social networks use now web 2.0 technology and the users may need to follow a series of restrictions or conditions to join or add contents. We look here at their context and threats, in order to ascertain their needs for security. We propose the use of patterns to specify these requirements in a precise way and we present two specific patterns. A pattern is an encapsulated solution to a software problem in a given context. We present here the Participation-Collaboration Pattern, which describes the functionality of the collaboration between users in applications and the Collaborative Tagging Pattern, which is useful to share content using keywords to tag bookmarks, photographs and other contents. We also discuss possible improvements to the current situation.

Fernandez, Eduardo B.; Marin, Carolina; Petrie, Maria M. Larrondo

75

Secure password-based authenticated key exchange for web services  

SciTech Connect

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22

76

Information flow control for secure web sites  

E-print Network

Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on ...

Krohn, Maxwell N. (Maxwell Norman)

2008-01-01

77

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security  

E-print Network

Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Suryakant applications, so-called Rich Internet Applications (RIAs). RIAs present new security and crawling challenges, Rich Internet Applications, State Equivalence I. INTRODUCTION The concerns on the security of the web

Jourdan, Guy-Vincent

78

Automated intrusion recovery for web applications  

E-print Network

In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

2013-01-01

79

Web 2.0 Applications in China  

NASA Astrophysics Data System (ADS)

Since 2005, the term Web 2.0 has gradually become a hot topic on the Internet. Web 2.0 lets users create web contents as distinct from webmasters or web coders. Web 2.0 has come to our work, our life and even has become an indispensable part of our web-life. Its applications have already been widespread in many fields on the Internet. So far, China has about 137 million netizens [1], therefore its Web 2.0 market is so attractive that many sources of venture capital flow into the Chinese Web 2.0 market and there are also a lot of new Web 2.0 companies in China. However, the development of Web 2.0 in China is accompanied by some problems and obstacles. In this paper, we will mainly discuss Web 2.0 applications in China, with their current problems and future development trends.

Zhai, Dongsheng; Liu, Chen

80

Extending Desktop Applications to the Web  

Microsoft Academic Search

Web applications have become the major means to allow ubiquitous access to backend systems via a web browser. Several technologies such as JSP, ASP.NET, or Java Server Faces exist today that help in developing web applications. These technologies do not support the migration of existing legacy desktop applications written with a GUI class library such as Swing, Qt, or GTK

Arno Puder

2001-01-01

81

Web Mining Concepts, Applications and Research Directions  

Microsoft Academic Search

From its very beginning, the potential of extracting valuable knowledge from the Web has been quite evident. Web mining, i.e. the application of data mining techniques to extract knowledge from Web content, structure, and usage, is the collection of technologies to fulfill this potential. Interest in Web mining has grown rapidly in its short history, both in the research and

T. Srivastava; Prasanna Desikan; Vipin Kumar

82

Capturing Trust in Social Web Applications  

Microsoft Academic Search

The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which are frameworks for the publication of user-provided content. Traditionally, Web content could be `trusted' to some extent based on the site

John O'Donovan

2009-01-01

83

Hera: Engineering Web Applications Using Semantic Web-based Models  

NASA Astrophysics Data System (ADS)

In this chapter, we consider the contribution of models and model-driven approaches based on Semantic Web for the development of Web applications. The model-driven web engineering approach, that separates concerns on different abstraction level in the application design process, allows for more robust and structural design of web applications. This is illustrated by the use of Hera, an approach from the class of Web engineering methods that relies on models expressed using RDF(S) and an RDF(S) query language. It illustrates how models and in particular models that fit with the ideas and concepts from the Semantic Web allow to approach the design and engineering of modern, open and heterogeneous Web based systems. In the presented approach, adaptation and personalization are a main aspect and it is illustrated how they are expressed using semantic data models and languages. Also specific features of Hera are discussed, like interoperability between applications in user modeling, aspect orientation in Web design and graphical tool support for Web application design.

van der Sluijs, Kees; Houben, Geert-Jan; Leonardi, Erwin; Hidders, Jan

84

A Spreadsheet Client for Web Applications  

Microsoft Academic Search

There is an increasing gap between web services and web applications. While web services communicate via typed interfaces\\u000a (e.g., using WSDL and SOAP), many web applications still rely on untyped, manually programmed forms in the restricted HTML\\u000a widget set. These limitations cause developers to resort to HTML with client-side scripting, resulting in applications that\\u000a can be hard to maintain. The

Dirk Draheim; Peter Thiemann; Gerald Weber

2006-01-01

85

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-print Network

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most agency explaining why you need a Social Security number and that you meet all the requirements

Li, Mo

86

SAMP: Application Messaging for Desktop and Web Applications  

NASA Astrophysics Data System (ADS)

SAMP, the Simple Application Messaging Protocol, is a technology which allows tools to communicate. It is deployed in a number of desktop astronomy applications including ds9, Aladin, TOPCAT, World Wide Telescope and numerous others, and makes it straightforward for a user to treat a selection of these tools as a loosely-integrated suite, combining the most powerful features of each. It has been widely used within Virtual Observatory contexts, but is equally suitable for non-VO use. Enabling SAMP communication from web-based content has long been desirable. An obvious use case is arranging for a click on a web page link to deliver an image, table or spectrum to a desktop viewer, but more sophisticated two-way interaction with rich internet applications would also be possible. Use from the web however presents some problems related to browser sandboxing. We explain how the SAMP Web Profile, introduced in version 1.3 of the SAMP protocol, addresses these issues, and discuss the resulting security implications.

Taylor, M. B.; Boch, T.; Fay, J.; Fitzpatrick, M.; Paioro, L.

2012-09-01

87

Exposing private information by timing web applications  

Microsoft Academic Search

We show that the time web sites take to respond to HTTP requests can leak private information, using two dierent types of attacks. The first, direct timing, directly measures response times from a web site to expose private informa- tion such as validity of an username at a secured site or the number of private photos in a publicly viewable

Andrew Bortz; Dan Boneh

2007-01-01

88

XMM-Newton Mobile Web Application  

NASA Astrophysics Data System (ADS)

We present the first XMM-Newton web mobile application, coded using new web technologies such as HTML5, the Query mobile framework, and D3 JavaScript data-driven library. This new web mobile application focuses on re-formatted contents extracted directly from the XMM-Newton web, optimizing the contents for mobile devices. The main goals of this development were to reach all kind of handheld devices and operating systems, while minimizing software maintenance. The application therefore has been developed as a web mobile implementation rather than a more costly native application. New functionality will be added regularly.

Ibarra, A.; Kennedy, M.; Rodrguez, P.; Hernndez, C.; Saxton, R.; Gabriel, C.

2013-10-01

89

Application Instructions for: Cyber Security Fundamentals Certificate  

E-print Network

Application Instructions for: Cyber Security Fundamentals Certificate Naval Postgraduate School Center for Information Systems Security Studies and Research (CISR) Monterey, CA 93943 cyber@nps.edu #12;Cyber Security Fundamentals Certificate - Online Application Instructions 1. Go to https

90

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-print Network

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

91

Building smarter web applications with HTML5  

Microsoft Academic Search

Web applications have seen increased usage as of late, to the point where they are more favorable than desktop applications. The rise in the prevalence of web applications can be attributed to their flexibility, which enable programmers to go beyond the limitation of conventional desktop applications.

Johan Harjono; Gloria Ng; Ding Kong; Jimmy Lo

2010-01-01

92

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-print Network

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

93

INSTITUTE FOR CYBER SECURITY Application-Centric Security Models  

E-print Network

INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

Sandhu, Ravi

94

INSTITUTE FOR CYBER SECURITY Application-Centric Security Models  

E-print Network

INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

Sandhu, Ravi

95

Security seal. [Patent application  

DOEpatents

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17

96

Efficient Integration of Web Services in Ambient-aware Sensor Network Applications1  

E-print Network

, and security cameras. Emergency response, homeland security, and many other applications have a very real need platforms such as satellite imaging systems, meteorological stations, air quality stations, and security cameras. The ability to seamlessly assemble a sensor web from various sensor network architectures greatly

Koutsoukos, Xenofon D.

97

Developing Offline Web Application Kanda Runapongsa Saikaew  

E-print Network

Script in the background to improve performance #12; JCSSE 2009 13 The Web with AJAX and Gears AJAX and Gears in the web environment and native environment #12; JCSSE 2009 14 AJAX Architecture #12; JCSSE 2009 15Pool ­ Make your web applications more responsive by performing resourceintensive operations asynchronously

Runapongsa, Kanda

98

Web administered pre/post assessment: reliability, compliance and security  

NASA Astrophysics Data System (ADS)

Pre/post assessment measures learning by comparing assessment performance before and after instruction. Usually it is administered on paper during class, needing to be distributed, collected, graded and analyzed. Administration on the web outside class frees up class time and automates many steps. However, this switch to unproctored web administration raises questions. Will the results be as reliable? Will students take it? Will test questions leak to fraternity files? An experiment using two different assessments pre/post test was carried out in introductory astronomy classes. Each section took one assessment on line and one in class. Comparing performance on paper vs. web provides information on reliability. Numbers of students completing in each mode give information on compliance and factors influencing it. Browser events that could indicate copying, saving or printing of questions were recorded to identify possible loss of security.

Bonham, Scott W.

2006-12-01

99

Capturing Trust in Social Web Applications  

Microsoft Academic Search

The Social Web constitutes a shift in information flow from the traditional Web. Previously, content was provided by the owners\\u000a of a website, for consumption by the end-user. Nowadays, these websites are being replaced by Social Web applications which\\u000a are frameworks for the publication of user-provided content. Traditionally, Web content could be trusted to some extent\\u000a based on the site

John ODonovan

100

Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance  

SciTech Connect

This paper explores techno-social predictive analytics (TPA) and related methods for Web data mining where users posts and queries are garnered from Social Web (Web 2.0) tools such as blogs, microblogging and social networking sites to form coherent representations of real-time health events. The paper includes a brief introduction to commonly used Social Web tools such as mashups and aggregators, and maps their exponential growth as an open architecture of participation for the masses and an emerging way to gain insight about peoples collective health status of whole populations. Several health related tool examples are described and demonstrated as practical means through which health professionals might create clear location specific pictures of epidemiological data such as flu outbreaks.

Kamel Boulos, Maged; Sanfilippo, Antonio P.; Corley, Courtney D.; Wheeler, Steve

2010-03-17

101

Data mining approach to web application intrusions detection  

NASA Astrophysics Data System (ADS)

Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

Kalicki, Arkadiusz

2011-10-01

102

Extensible Web Browser Security Mike Ter Louw, Jin Soon Lim, and V.N. Venkatakrishnan  

E-print Network

Extensible Web Browser Security Mike Ter Louw, Jin Soon Lim, and V.N. Venkatakrishnan Department examine the security issues in functionality extension mechanisms supported by web browsers. Extensions (or "plug-ins") in modern web browsers enjoy unlimited power without restraint and thus are attractive

Venkatakrishnan, V.N.

103

MedIT Solutions Web application development  

E-print Network

MedIT Solutions Web application development MedIT can create a customized web app unique to you- ports, pull metrics and much more. Virtual server hosting On a grant budget? MedIT provides vir- tual infrastructure. Virtual desktop and applications MedIT offers a complete remote office, giving you access to all

MacMillan, Andrew

104

Evaluation Methods for Web Application Clustering  

Microsoft Academic Search

Clustering of the entities composing a Web application (static and dynamic pages) can be used to support program understanding. However, several alternative options are available when a clustering technique is designed for Web applications. The entities to be clustered can be described in different ways (e.g., by their structure, by their connec- tivity, or by their content), different similarity measures

Paolo Tonella; Filippo Ricca; Emanuele Pianta; Christian Girardi; Giuseppe A. Di Lucca; Anna Rita Fasolino; Porfirio Tramontana

2003-01-01

105

Reappraising cognitive styles in adaptive web applications  

Microsoft Academic Search

The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contemporary ideas for user modelling in web applications is that of cognitive styles, where a user's psychological preferences are assessed stored in a database and then used to provide personalised content and\\/or links. We

Elizabeth Brown; Tim J. Brailsford; Tony Fisher; Adam Moore; Helen Ashman

2006-01-01

106

Bachelor Project StockHome -Web Application  

E-print Network

Bachelor Project StockHome - Web Application User interface for a financial analysis tool Gilad and assisting us during dark times. Last but not least, I would like to thank my friends who spent those long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 iii #12;Gilad Geron StockHome - Web Application A Technologies 31 A.1 Ruby

Lanza, Michele

107

Analysis of the Security of Web Browsers via API Calls and Function Return Values  

E-print Network

Analysis of the Security of Web Browsers via API Calls and Function Return Values Lorie M. Liebrock and Technology Socorro, NM-87801 Abstract Web browsers are the primary interface for accessing the information on the World Wide Web. This work examines the relative vulnerability of web browsers. More specifically

Liebrock, Lorie M.

108

A taxonomy and business analysis for mobile web applications  

E-print Network

Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications ...

Liu, Kevin H

2009-01-01

109

Web Application Software for Ground Operations Planning Database (GOPDb) Management  

NASA Technical Reports Server (NTRS)

A Web application facilitates collaborative development of the ground operations planning document. This will reduce costs and development time for new programs by incorporating the data governance, access control, and revision tracking of the ground operations planning data. Ground Operations Planning requires the creation and maintenance of detailed timelines and documentation. The GOPDb Web application was created using state-of-the-art Web 2.0 technologies, and was deployed as SaaS (Software as a Service), with an emphasis on data governance and security needs. Application access is managed using two-factor authentication, with data write permissions tied to user roles and responsibilities. Multiple instances of the application can be deployed on a Web server to meet the robust needs for multiple, future programs with minimal additional cost. This innovation features high availability and scalability, with no additional software that needs to be bought or installed. For data governance and security (data quality, management, business process management, and risk management for data handling), the software uses NAMS. No local copy/cloning of data is permitted. Data change log/tracking is addressed, as well as collaboration, work flow, and process standardization. The software provides on-line documentation and detailed Web-based help. There are multiple ways that this software can be deployed on a Web server to meet ground operations planning needs for future programs. The software could be used to support commercial crew ground operations planning, as well as commercial payload/satellite ground operations planning. The application source code and database schema are owned by NASA.

Lanham, Clifton; Kallner, Shawn; Gernand, Jeffrey

2013-01-01

110

Structuring Integrated Web Applications for Fault Tolerance  

Microsoft Academic Search

The intention of this paper is to demonstrate how modern structuring techniques can be employed in inte- grating complex web applications. Our focus is on developing a Travel Agency case study. The main challenges the developers of such systems face are dealing with legacy web services and incorporating means for tolerating a considerable number of errors. Because of the very

Alexander B. Romanovsky; Panos Periorellis; Avelino F. Zorzo

2003-01-01

111

VOGCLUSTERS: An Example of DAME Web Application  

NASA Astrophysics Data System (ADS)

We present the alpha release of the VOGCLUSTERS web application, specialized for data and text mining on globular clusters. It is one of the web2.0 technology based services of Data Mining &Exploration (DAME) Program, devoted to mine and explore heterogeneous information related to globular clusters data.

Castellani, M.; Brescia, M.; Mancini, E.; Pellecchia, L.; Longo, G.

2012-07-01

112

Security Types for Dynamic Web Data 1 Mariangiola Dezani-Ciancaglini a  

E-print Network

Security Types for Dynamic Web Data 1 Mariangiola Dezani-Ciancaglini a Silvia Ghilezan b Jovanka is based on types for locations, data and processes, expressing security levels. A tree can store data of different security level, independently from the security level of the enclosing location. The access

Paris-Sud XI, Université de

113

Application Instructions for: Cyber Security Defense Certificate  

E-print Network

Application Instructions for: Cyber Security Defense Certificate Naval Postgraduate School Center for Information Systems Security Studies and Research (CISR) Monterey, CA 93943 cyber@nps.edu #12;Cyber Security ­ Cyber Security Defense iv. Academic Year/ Quarter: SELECT THE FOLLOWING START DATE: a. Quarter 3 Start

114

A specialized framework for data retrieval Web applications  

SciTech Connect

Although many general-purpose frameworks have been developed to aid in web application development, they typically tend to be both comprehensive and complex. To address this problem, a specialized server-side Java framework designed specifically for data retrieval and visualization has been developed. The framework's focus is on maintainability and data security. The functionality is rich with features necessary for simplifying data display design, deployment, user management and application debugging, yet the scope is deliberately kept limited to allow for easy comprehension and rapid application development. The system clearly decouples the application processing and visualization, which in turn allows for clean separation of layout and processing development. Duplication of standard web page features such as toolbars and navigational aids is therefore eliminated. The framework employs the popular Model-View-Controller (MVC) architecture, but it also uses the filter mechanism for several of its base functionalities, which permits easy extension of the provided core functionality of the system.

Jerzy Nogiec; Kelley Trombly-Freytag; Dana Walbridge

2004-07-12

115

Rubicon: Bounded Verification of Web Applications  

E-print Network

Rubicon is a verifier for web applications. Specifications are written in an embedded domain-specific language and are checked fully automatically. Rubicon is designed to fit with current practices: its language is based ...

Jackson, Daniel

116

ANNOUNCEMENT OF EMPLOYMENT OPPORTUNITY WEB APPLICATIONS ANALYST  

E-print Network

, and third party software; analyzing and resolving technical and operational problems; implementing, configuring, and maintaining web-based ERP servers, applications hardware, software, and operating systems multiple server platforms and various operating systems and software, Internet Information Server (IIS

Ravikumar, B.

117

End User Development of Web Applications  

Microsoft Academic Search

This chapter investigates entry barriers and approaches for facilitating end-user web application development with the particular\\u000a focus on shaping web programming technology and tools according to end-users expectations and natural mental models. Our\\u000a underlying assumption and motivation is that given the right tools and techniques even nonprogrammers may become successfulweb\\u000a application developers. The main target audience for this research are

Jochen Rode; Mary Beth Rosson

118

Where Did All the Data Go? Internet Security for Web-Based Assessments.  

ERIC Educational Resources Information Center

The purpose of this paper is to enumerate a series of security steps that might be taken by those individuals or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations focus

Shermis, Mark D.; Averitt, Jason

119

Leveraging User-Session Data to Support Web Application Testing  

Microsoft Academic Search

Web applications are vital components of the global information infrastructure, and it is important to ensure their dependability. Many techniques and tools for validating Web applications have been created, but few of these have addressed the need to test Web application functionality and none have attempted to leverage data gathered in the operation of Web applications to assist with testing.

Sebastian G. Elbaum; Gregg Rothermel; Srikanth Karre; Marc Fisher II

2005-01-01

120

Network and Application Security in Mobile e-Health Applications  

Microsoft Academic Search

\\u000a Different IT applications require different network and application security services. We have been working in the area of\\u000a e-health applications in mobile environments, and we have needed to integrate security services therein. This paper presents\\u000a aspecification of such network and application security services for mobile e-health applications and how we have implemented\\u000a them. First, various security threats specific of e-health

Ramon Mart; Jaime Delgado; Xavier Perramon

2004-01-01

121

IEEE TRANSACTIONS ON POWER SYSTEMS 1 Web-based Security Cost Analysis in Electricity  

E-print Network

IEEE TRANSACTIONS ON POWER SYSTEMS 1 Web-based Security Cost Analysis in Electricity Markets Hong, and describes its implementation using a 3-tier client/server architecture and up-to-date web technologies to certain system parameters. The web implementation allows easy and effective access by all market

Cañizares, Claudio A.

122

Multimedia Security System for Security and Medical Applications  

ERIC Educational Resources Information Center

This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and

Zhou, Yicong

2010-01-01

123

Border security and surveillance system with smart cameras and motes in a Sensor Web  

NASA Astrophysics Data System (ADS)

In this paper we describe a prototype surveillance system that leverages smart sensor motes, intelligent video, and Sensor Web technologies to aid in large area monitoring operations and to enhance the security of borders and critical infrastructures. Intelligent video has emerged as a promising tool amid growing concern about border security and vulnerable entry points. However, numerous barriers exist that limit the effectiveness of surveillance video in large area protection; such as the number of cameras needed to provide coverage, large volumes of data to be processed and disseminated, lack of smart sensors to detect potential threats and limited bandwidth to capture and distribute video data. We present a concept prototype that addresses these obstacles by employing a Smart Video Node in a Sensor Web framework. Smart Video Node (SVN) is an IP video camera with automated event detection capability. SVNs are cued by inexpensive sensor motes to detect the existence of humans or vehicles. Based on sensor motes' observations cameras are slewed in to observe the activity and automated video analysis detects potential threats to be disseminated as "alerts". Sensor Web framework enables quick and efficient identification of available sensors, collects data from disparate sensors, automatically tasks various sensors based on observations or events received from other sensors, and receives and disseminates alerts from multiple sensors. The prototype system is implemented by leveraging intuVision's intelligent video, Northrop Grumman's sensor motes and SensorWeb technologies. Implementation of a deployable system with Smart Video Nodes and sensor motes within the SensorWeb platform is currently underway. The final product will have many applications in commercial, government and military systems.

Guler, Sadiye; Cole, Timothy; Silverstein, Jay; Pushee, Ian; Fairgrieve, Scott

2010-04-01

124

Optimising Ajax Web Applications with Communication Restructuring  

Microsoft Academic Search

We present an automated run-time optimization framework that can improve the performance of Ajax web applications while preserving its semantics. The key point of this framework is to prefetch and cache dynamic web content intelligently and to use aggregation technology while prefetching and caching the responses on client. XMLHttpRequest are intercepted and replaced by a new one. The new XMLHttpRequest

Jun Zhang

125

Towards Collaborative Robots for Infrastructure Security Applications  

E-print Network

, infrastructure security and monitoring of sensitive national security sites (e.g. nuclear facilities, power applications. A vast number of critical facilities, including power plants, military bases, water plants, air and chemical plants), building and parking lot security, warehouse guard duty, monitoring restricted access

Guo, Yi

126

Data mining approach to web application intrusions detection  

Microsoft Academic Search

Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs

Arkadiusz Kalicki

2011-01-01

127

BenchLab: Benchmarking with Real Web Applications and Web Browsers Emmanuel Cecchet, Veena Udayabhanu,  

E-print Network

BenchLab: Benchmarking with Real Web Applications and Web Browsers Emmanuel Cecchet, VeenaScript and AJAX that are essential to real Web 2.0 applications. Further, traditional benchmarks rely on browser emulators that mimic the basic network functionality of real web browsers but cannot emulate their more

Massachusetts at Amherst, University of

128

Semantic-Web Technology: Applications at NASA  

NASA Technical Reports Server (NTRS)

We provide a description of work at the National Aeronautics and Space Administration (NASA) on building system based on semantic-web concepts and technologies. NASA has been one of the early adopters of semantic-web technologies for practical applications. Indeed there are several ongoing 0 endeavors on building semantics based systems for use in diverse NASA domains ranging from collaborative scientific activity to accident and mishap investigation to enterprise search to scientific information gathering and integration to aviation safety decision support We provide a brief overview of many applications and ongoing work with the goal of informing the external community of these NASA endeavors.

Ashish, Naveen

2004-01-01

129

Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services  

Microsoft Academic Search

To enable checking of SOAP messages for compliance to a given security policy, extensions to the classical ,,Schema-only'' validation of SOAP messages are required. These extensions check, if the WS-Security elements found in a SOAP message fulfill the Web Service security specification that is laid down in the WS-SecurityPolicy document. In this paper, we discuss to what extent the proposed

Nils Gruschka; Norbert Luttenberger; Ralph Herkenhoener

2006-01-01

130

Robust image obfuscation for privacy protection in Web 2.0 applications  

NASA Astrophysics Data System (ADS)

We present two approaches to robust image obfuscation based on permutation of image regions and channel intensity modulation. The proposed concept of robust image obfuscation is a step towards end-to-end security in Web 2.0 applications. It helps to protect the privacy of the users against threats caused by internet bots and web applications that extract biometric and other features from images for data-linkage purposes. The approaches described in this paper consider that images uploaded to Web 2.0 applications pass several transformations, such as scaling and JPEG compression, until the receiver downloads them. In contrast to existing approaches, our focus is on usability, therefore the primary goal is not a maximum of security but an acceptable trade-off between security and resulting image quality.

Poller, Andreas; Steinebach, Martin; Liu, Huajian

2012-03-01

131

Serving Embedded Content via Web Applications: Model, Design and Experimentation  

E-print Network

Serving Embedded Content via Web Applications: Model, Design and Experimentation Simon Duquennoy dedicated terminals. A new trend consists in embedding Web servers in small devices, making both access of embedded Web servers, and we introduce a taxonomy of the contents possi- bly served by Web applications

Paris-Sud XI, Université de

132

Evaluation of Web Applications According to Intelligence Parameters  

Microsoft Academic Search

Nowadays evaluation of software is important term in software engineering world. Engineers use conventional metrics to evaluate a software production which was defined in software engineering. Also defining a metric is depending on application of software. Web application is wellknown as software. Evaluation of Web application is possible by conventional metrics. As we know competition in developing of Web application

Alireza Tabatabaei Tabrizi; Mohsen Sadighi Moshkenani

2008-01-01

133

Virtual real-time inspection of nuclear material via VRML and secure web pages  

SciTech Connect

Sandia National Laboratories` Straight Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight Line`s efforts is to create a system to securely disseminate this data on the Internet`s World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight Line secure 3-D web page. A discussion of the ``pros and cons`` of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at the following address: http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended.

Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J.

1997-04-01

134

Virtual real-time inspection of nuclear material via VRML and secure web pages  

SciTech Connect

Sandia National Laboratories` Straight-Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight-Line`s efforts is to create a system to securely disseminate this data on the Internet`s World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight-Line secure 3-D web page. A discussion of the pros and cons of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at this address, http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended.

Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J. [Sandia National Labs., Livermore, CA (United States)

1996-12-31

135

SecureClick: A Web Payment System with Disposable Credit Card Numbers  

Microsoft Academic Search

This paper describes the design philosophy and overall architecture of a new web payment system which uses disposable credit\\u000a card numbers to solve the major security issues associated with card based e-commerce.

Adi Shamir

2001-01-01

136

Certificate for secure web The Department of computer Science and Artificial Intelligence  

E-print Network

About us Certificate for secure web The Department of computer Science and Artificial Intelligence of Artificial Intelligence, Computer Graphics, Computational Geometry or Coding and Cryptology, among others of the Computation and Artificial Intelligence #12;

Escolano, Francisco

137

Semantics-Based Design for Secure Web Services  

Microsoft Academic Search

We outline a methodology for designing and composing services in a secure manner. In particular, we are concerned with safety properties of service behavior. Services can enforce security policies locally and can invoke other services that respect given security contracts. This call-by-contract mechanism offers a significant set of opportunities, each driving secure ways to compose services. We discuss how we

Massimo Bartoletti; Pierpaolo Degano; Gian-Luigi Ferrari; Roberto Zunino

2008-01-01

138

A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects  

NASA Astrophysics Data System (ADS)

Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In comparison to traditional web applications, the application logic of modern Web 2.0 applications tends to push the interactive user interface tasks to the client side. The client components on the other hand negotiate with remote services that deal with user events. The user should be assisted in different scenarios in order to use the existing platforms, share the resources with other users and improve his security. In this paper we present a user-centered content extraction and classification method based on self-organizing maps (SOM) as well as a prototype for provided content on Web 2.0. The extracted and classified data serves as a basis for above mentioned scenarios.

Tahamtan, Amirreza; Anjomshoaa, Amin; Weippl, Edgar; Tjoa, A. Min

139

Secure coprocessing applications and research issues  

SciTech Connect

The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

Smith, S.W.

1996-08-01

140

The Data and Application Security and Privacy (DASPY) Challenge  

E-print Network

.ics.utsa.edu Institute for Cyber Security The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Institute for Cyber Security 1 The Data and Application Security But not securable by academically taught cyber security not studied as a success story missing technologies highly

Sandhu, Ravi

141

Position Announcement Position: GIS Web Application Developer, W0007467  

E-print Network

and researchers to identify needs and opportunities for GIS Web applications that would serve diverse user groups Web Application Developer will be responsible for the design, creation, and maintenance of custom Web mobile GIS applications for iOS and Android platforms. Salary and Benefits: Commensurate with experience

Marston, Richard A.

142

Collaborative Robots for Infrastructure Security Applications  

E-print Network

.g. nuclear facilities, power and chemical plants), building and parking lot security, warehouse guard duty facilities, including power plants, military bases, water plants, air fields, and so forth, must be protected9 Collaborative Robots for Infrastructure Security Applications Yi Guo1 , Lynne E. Parker2

Parker, Lynne E.

143

On Secure JAVA Application in SOA-Based PKI Mobile Government Systems  

Microsoft Academic Search

\\u000a In this paper, we describe a possible model of secure m-government system based on secure JAVA mobile application and SOA-Based\\u000a m-government platform. The proposed model consists of additional external entities\\/servers, such as: PKI, XKMS, STS, UDDI\\u000a and TSA. The main parts of the proposed model are secure JAVA mobile application and secure Web Service implemented on the\\u000a SOA-based platform. One

Milan Markovi?; Goran ?or?evi?

144

Secure voice for mobile satellite applications  

NASA Technical Reports Server (NTRS)

The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.

Vaisnys, Arvydas; Berner, Jeff

1990-01-01

145

Secure voice for mobile satellite applications  

NASA Astrophysics Data System (ADS)

The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.

Vaisnys, Arvydas; Berner, Jeff

146

Programming Secure and Robust Pervasive Computing Applications  

E-print Network

and demonstrate its utility for building context-aware, secure, fault-tolerant pervasive computing applications on the contextual information. A user's physical location has been one of the most prominent context information

Minnesota, University of

147

Using Service Brokers for Accessing Backend Servers for Web Applications  

E-print Network

, directory services, secure trans- actions, and other services. A schematic diagram of a typ- ical Web server of Computer Science, Engineering II, One Shields Avenue, University of California, Davis, CA 95616. Email

Mohapatra, Prasant

148

Healing Web applications through automatic workarounds  

Microsoft Academic Search

We develop the notion of automatic workaround in the context of Web applications. A workaround is a sequence of operations, applied to a failing component, that is equivalent\\u000a to the failing sequence in terms of its intended effect, but that does not result in a failure. We argue that workarounds\\u000a exist in modular systems because components often offer redundant interfaces

Antonio Carzaniga; Alessandra Gorla; Mauro Pezz

2008-01-01

149

Web Browser as an Application Platform: The Lively Kernel Experience  

Microsoft Academic Search

For better or worse, the web browser has become a widely-used target platform for software applications. Desktop-style applications such as word processors, spreadsheets, calendars, games and instant messaging systems that were written earlier for specific operating systems, CPU architectures or devices are now written for the World Wide Web, to be used from a web browser by anyone, anywhere, anytime.

Antero Taivalsaari; Tommi Mikkonen; Dan Ingalls; Krzysztof Palacz

2008-01-01

150

A Safety-Oriented Platform for Web Applications  

Microsoft Academic Search

The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and e- commerce services. Early Web browsers provided simple access to static hypertext documents. In contrast, modern browsers serve as de facto operating systems that must man- age dynamic and potentially malicious applications. Unfor- tunately, browsers have

Richard S. Cox; Steven D. Gribble; Henry M. Levy; Jacob Gorm Hansen

2006-01-01

151

Web-Enabled Scientific Services & Applications (Calculators)  

NSDL National Science Digital Library

Anyone without access to a statistical software package may find this Web site to be a valuable tool. A wide variety of free online utilities are offered, including data and equation plotting, regression analysis, and scientific forecasting. The applications' interfaces are very straightforward, and many options are available for users to input their data and customize the desired output. No explanation of the applications' functions and settings is included. This is not necessarily a problem, however, since it is expected that users will know what kind of statistical analyses they want to perform on their data beforehand.

152

Seaweed : a Web application for designing economic games  

E-print Network

Seaweed is a web application for experimental economists with no programming background to design two-player symmetric games in a visual-oriented interface. Games are automatically published to the web where players can ...

Chilton, Lydia B

2009-01-01

153

Design of a security platform for CORBA based application  

Microsoft Academic Search

This paper proposes a security platform, SCAP(Security platform for CORBA based APplication), to cope with potential threats in a distributed object system. SOAP supports CORBA security specification announced by OMG. SOAP is composed of four functional blocks which co-work with ORB to provide security services: Authentication Block, Security Association Block, Access Control Block, and Security Information Management Block. It is

Rakman Choi; Jung-chan Na; Kwonil Lee; Eunmi Kim; Wooyong Han

1997-01-01

154

WEB DEVELOPMENT EVOLUTION: THE BUSINESS PERSPECTIVE ON SECURITY  

Microsoft Academic Search

Protection of data, information, and knowledge is a hot topic in today's business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and defend accountability. Research indicates that a significant portion of the financial losses is due to straight forward software design errors. Security should be addressed throughout the

William Bradley Glisson; L. Milton Glisson; Ray Welland

155

A DIAGRAM APPROACH TO AUTOMATIC GENERATION OF JSP\\/SERVLET WEB APPLICATIONS  

Microsoft Academic Search

We defined diagrams called Web transition diagrams to rep- resent overall behavior of Web applications. Using these diagrams, we can generate server program type Web ap- plications such as CGI-based Web applications, and server page type Web applications such as ASP-based Web appli- cations. The purpose of this paper is to design Web transi- tion diagrams to represent wider class

Kornkamol Jamroendararasame; Tetsuya Suzuki; Takehiro Tokuda

156

Improving application security with data flow assertions  

Microsoft Academic Search

RESIN is a new language runtime that helps prevent security vulner- abilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy objects, which programmers use to specify assertion code and metadata; data tracking, which allows programmers to associate assertions with application data, and to keep track of assertions as the data flow through the appli- cation; and

Alexander Yip; Xi Wang; Nickolai Zeldovich; M. Frans Kaashoek

2009-01-01

157

APFEL Web: a web-based application for the graphical visualization of parton distribution functions  

E-print Network

We present APFEL Web, a web-based application designed to provide a flexible user-friendly tool for the graphical visualization of parton distribution functions (PDFs). In this note we describe the technical design of the APFEL Web application, motivating the choices and the framework used for the development of this project. We document the basic usage of APFEL Web and show how it can be used to provide useful input for a variety of collider phenomenological studies. Finally we provide some examples showing the output generated by the application.

Stefano Carrazza; Alfio Ferrara; Daniele Palazzo; Juan Rojo

2014-10-20

158

APFEL Web: a web-based application for the graphical visualization of parton distribution functions  

E-print Network

We present APFEL Web, a web-based application designed to provide a flexible user-friendly tool for the graphical visualization of parton distribution functions (PDFs). In this note we describe the technical design of the APFEL Web application, motivating the choices and the framework used for the development of this project. We document the basic usage of APFEL Web and show how it can be used to provide useful input for a variety of collider phenomenological studies. Finally we provide some examples showing the output generated by the application.

Carrazza, Stefano; Palazzo, Daniele; Rojo, Juan

2014-01-01

159

A Lightweight Authentication Protocol for Web Applications in Mobile Environments  

NASA Astrophysics Data System (ADS)

User's authentication over insecure networks like the Internet is frequently required to be based just on username and password due to the simplicity and the convenience of such a mechanism. A number of password authentication schemes have been proposed in the literature with different robustness against possible attacks. Moreover, the issue of saving power and requiring reduced computation resources without loss of security, is rapidly increasing its importance mainly due to the emergence of ubiquitous (mobile) Web applications, where the user works on wireless devices possibly with limited computation capacities and poor energy autonomy. In this paper we give a significative contribution towards the above direction, by proposing a new authentication scheme requiring neither cryptographic algorithms nor one-way hash functions, as all the methods existing in the literature do, but resisting all the major known attacks, thus improving the state of the art on the authentication schemes in mobile environments.

Buccafurri, Francesco; Lax, Gianluca

160

A FRAMEWORK FOR COLLECTING CLIENTSIDE PARADATA IN WEB APPLICATIONS  

E-print Network

Personalization, JavaScript 1. INTRODUCTION In the recent years, the number of websites has grown vastly. Unlike those websites that were spread during the 1990s--which used to present the information to users with static web pages--current web sites--which we call web applications--interact with users through rich

Bremen, Universität

161

WATSON: SUPPORTING NEXT GENERATION SEMANTIC WEB APPLICATIONS 1  

Microsoft Academic Search

Watson is a gateway to the Semantic Web: it collects, analyzes and gives access to ontologies and semantic data available online. Its objective is to support the development of next generation Semantic Web applications that dynamically select, combine and exploit the knowledge published on the Semantic Web. We present the design of Watson, which have been guided by the requirements

Mathieu d'Aquin; Claudio Baldassarre; Laurian Gridinoc; Marta Sabou; Sofia Angeletou; Enrico Motta

162

Reliability, Compliance and Security of Web-based Pre/Post-testing  

NASA Astrophysics Data System (ADS)

Pre/post testing is an important tool for improving science education. Standard in-class administration has drawbacks such as `lost' class time and converting data into electronic format. These are not issues for unproctored web-based administration, but there are concerns about assessment validity, compliance rates, and instrument security. A preliminary investigation compared astronomy students taking pre/post tests on paper to those taking the same tests over the web. The assessments included the Epistemological Beliefs Assessment for Physical Science and a conceptual assessment developed for this study. Preliminary results on validity show no significant difference on scores or on most individual questions. Compliance rates were similar between web and paper on the pretest and much better for web on the posttest. Remote monitoring of student activity during the assessments recorded no clear indication of any copying, printing or saving of questions, and no widespread use of the web to search for answers.

Bonham, Scott

2007-01-01

163

Reliability, Compliance and Security of Web-based Pre/Post-testing  

NSDL National Science Digital Library

Pre/post testing is an important tool for improving science education. Standard in-class administration has drawbacks such as `lost' class time and converting data into electronic format. These are not issues for unproctored web-based administration, but there are concerns about assessment validity, compliance rates, and instrument security. A preliminary investigation compared astronomy students taking pre/post tests on paper to those taking the same tests over the web. The assessments included the Epistemological Beliefs Assessment for Physical Science and a conceptual assessment developed for this study. Preliminary results on validity show no significant difference on scores or on most individual questions. Compliance rates were similar between web and paper on the pretest and much better for web on the posttest. Remote monitoring of student activity during the assessments recorded no clear indication of any copying, printing or saving of questions, and no widespread use of the web to search for answers.

Bonham, Scott W.

2007-11-25

164

Rivet: Browser-agnostic Remote Debugging for Web Applications  

Microsoft Academic Search

Rivet is the first fully-featured, browser-agnostic remote debugger for web applications. Using Rivet, developers can inspect and modify the state of live web pages that are running inside unmodified end-user web browsers. This allows developers to explore real application bugs in the context of the actual machines on which those bugs occur. To make an application Rivet-aware, developers simply add

James Mickens

2012-01-01

165

Building Trust Through Secure Web Sites. The Systems Librarian  

ERIC Educational Resources Information Center

Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they

Breeding, Marshall

2005-01-01

166

Is the Web a Secure Environment for Electronic Commerce?  

Microsoft Academic Search

The Internet is a world-wide network of computers. Currently, there are about 30 million people using the Internet, and approximately one million new users log on each month. The Internet consists of many parts, but the two most popular are the World Wide Web (WWW) and electronic mail (e-mail). What hinders the rest of the world to connect to the

Manfred Bogen; Michael Lenz; Andreas Reichpietsch; Peter Simons

1997-01-01

167

Managing and Securing Web Services with VPNs Lina ALCHAAL  

E-print Network

introduced a VPN service provider architecture that enables to dynamically build IPsec VPNs between sites technologies, IPsec and SSL, and the web ser­ vices technology into the same melting pot. The resulting hybrid features, and quickly compare SSL and IPsec VPNs. #12; 2.1. Centralized VPN Architecture In a previous work

Castelluccia, Claude

168

Managing and Securing Web Services with VPNs Lina ALCHAAL  

E-print Network

introduced a VPN service provider architecture that enables to dynamically build IPsec VPNs between sites technologies, IPsec and SSL, and the web ser- vices technology into the same melting pot. The resulting hybrid features, and quickly compare SSL and IPsec VPNs. #12;2.1. Centralized VPN Architecture In a previous work

Castelluccia, Claude

169

Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side  

E-print Network

Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. Cross-Site scripting Flaws occur when accessing information in intermediate trusted sites. Client side solution acts as a web proxy to mitigate Cross Site Scripting Flaws which manually generated rules to mitigate Cross Site Scripting attempts. Client side solution effectively protects against information leakage from the user's environment. Cross Site Scripting Flaws are easy to execute, but difficult to detect and prevent. This paper provides client-side solution to mitigate cross-site scripting Flaws. The existing client-side solutions degrade the performance of client's system resulting in a poor web surfing experience. In this project provides a client side solution that uses a step by step approach to protect cross site sc...

Selvamani, K; Kannan, A

2010-01-01

170

75 FR 30892 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...  

Federal Register 2010, 2011, 2012, 2013

...information regarding municipal securities to the MSRB, at no charge...dissemination on the EMMA Web site, the EMMA Web site would display such...the applicable municipal security otherwise displayed on the EMMA Web site. Currently,...

2010-06-02

171

Authoring and Maintaining of Educational Applications on the Web.  

ERIC Educational Resources Information Center

This paper discusses problems concerning the design of educational applications in general, as well as specific problems connected with educational applications meant to be published on the Web. A new approach to the authoring and maintaining of Web-based educational applications is proposed which is based on the concept of hypermedia composites.

Helic, Denis; Maurer, Hermann; Scherbakov, Nick

172

Web Based Training (WEB BT) TES employees can get free training on applications within  

E-print Network

Web Based Training (WEB BT) TES employees can get free training on applications within office applications and more. Each tutorial can last up to 4 hours. TES schedules training time, in the TES Office to scheduling. Registration Criteria · Training must not conflict with your current assignment. (We suggest

Tsien, Roger Y.

173

The Bioverse API and Web Application  

SciTech Connect

The Bioverse is a framework for creating, warehousing and presenting biological information based on hierarchical levels of organisation. The framework is guided by a deeper philosophy of desiring to represent all relationships between all components of biological systems towards the goal of a wholistic picture of organismal biology. Data from various sources is combined into a single repository and a uniform interface is exposed to access it. The power of the approach of the Bioverse is that, due to its inclusive nature, patterns emerge from the acquired data and new predictions are made. The implementation of this repository (beginning with acquisition of source data, processing in a pipeline and concluding with storage in a relational database) and interfaces to the data contained in it, from a programmatic application interface to a user friendly web application, are discussed

Guerquin, Michal; McDermott, Jason E.; Frazier, Zach; Samudrala, Ram

2009-04-20

174

CRCHD - Patient Navigation Information: Publications, Web Sites, and Applications  

Cancer.gov

CRCHD - Patient Navigation Information: Publications, Web Sites, and Applications Back to CRCHD Ongoing Research PNP Background Patient Navigation Information Patient Navigation Concept What Are Patient Navigators? Patient Navigation

175

Web-based IDE to create Model and Controller Components for MVC-based Web Applications on Presented to  

E-print Network

Web-based IDE to create Model and Controller Components for MVC-based Web Applications on Cake and Controller Components for MVC-based Web Applications on CakePHP by Sugiharto Widjaja The purpose users to easily create the Model and Controller components for MVC-based Web applications on Cake

Pollett, Chris

176

Security through Traffic Network: Tracking of Missing Vehicles and Routing in TMIS using Semantic Web Services  

Microsoft Academic Search

This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture Intelligent Junction (IJ) are summarized from recent work. Their design employs autonomous semantic agent-based software, sensor networks, and wire\\/wireless integrated communication infrastructure. Especially described are their essential functions crucial to aid security applications. A security scenario concerning tracing

Atilla Eli; Behnam Rahnama; Amirhasan Amintabar

177

MEMS and MOEMS for national security applications  

NASA Astrophysics Data System (ADS)

Major opportunities for microsystem insertion into commercial applications, such as telecommunications and medical prosthesis, are well known. Less well known are applications that ensure the security of our nation, the protection of its armed forces, and the safety of its citizens. Microsystems enable entirely new possibilities to meet National Security needs, which can be classed along three lines: anticipating security needs and threats, deterring the efficacy of identified threats, and defending against the application of these threats. In each of these areas, specific products that are enabled by MEMS and MOEMS are discussed. In the area of anticipating needs and threats, sensored microsystems designed for chem/bio/nuclear threats, and sensors for border and asset protection can significantly secure our borders, ports, and transportation systems. Key features for these applications include adaptive optics and spectroscopic capabilities. Microsystems to monitor soil and water quality can be used to secure critical infrastructure, food safety can be improved by in-situ identification of pathogens, and sensored buildings can ensure the architectural safety of our homes and workplaces. A challenge to commercializing these opportunities, and thus making them available for National Security needs, is developing predictable markets and predictable technology roadmaps. The integrated circuit manufacturing industry provides an example of predictable technology maturation and market insertion, primarily due to the existence of a "unit cell" that allows volume manufacturing. It is not clear that microsystems can follow an analogous path. The possible paths to affordable low-volume production, as well as the prospects of a microsystems unit cell, are discussed.

Scott, Marion W.

2003-01-01

178

Terahertz Imaging and Security Applications  

NASA Astrophysics Data System (ADS)

Imaging at millimeter-wave and terahertz frequencies could vastly improve the security of personnel checkpoints, because of the penetration through clothing and spatial resolution available in this spectral range. Since 9/11, the social need for improved checkpoint screening has been obvious and great. However, although efforts to develop such imagers had been underway for many years before that, practical low-cost systems, analogous to IR uncooled imagers, still don't exist. An emphasis on purely passive imaging places very stringent sensitivity requirements on such imagers. A number of long-term efforts, which I briefly mention, are underway to improve the sensitivity of such passive imagers. However, most of the emphasis in our program is on active imaging. With this approach, much simpler and lower-cost detectors, such as (uncooled) antenna-coupled microbolometers can be used, at the expense of incorporating slightly more complex optics and illumination components. I discuss several tradeoffs presented in the design of active imaging systems for the 100 to 1000 GHz frequency range, describe how we have addressed them in the design of a scanning, 95 GHz, bolometer-based imager for concealed weapons detection that is nearing completion, and describe how the system architecture can be modified to scale the operating frequency to the 650 GHz atmospheric window. Co-authors: Arttu Luukanen and Aaron Miller

Grossman, Erich

2005-03-01

179

Preventing Web-Spoofing with Automatic Detecting Security Indicator  

Microsoft Academic Search

The anti-spoofing community has been intensively propos- ing new methods for defending against new spoofing techniques. It is still challenging for protecting na ive users from advanced spoofing at- tacks. In this paper, we analyze the problems within those anti-spoofing mechanisms and propose a new Automatic Detecting Security Indicator (ADSI) scheme. This paper describe the trust model in ADSI in

Fang Qi; Feng Bao; Tieyan Li; Weijia Jia; Yongdong Wu

2006-01-01

180

A Hybrid Web Based Personal Health Record System Shielded with Comprehensive Security  

Microsoft Academic Search

We present the design and development of a hybrid, web-based scheme for creating, maintaining and sharing personal health records (PHRs) with embedded security. We adopt a hybrid approach to processing PHRs and present a prototype called Personal Health Manager (PHM) that is based on this hybrid model. PHRs in the PHM prototype are owned by patients but updated by medical

Jennifer Israelson; Ebru Celikel Cankaya

2012-01-01

181

WebViz: A web browser based application for collaborative analysis of 3D data  

NASA Astrophysics Data System (ADS)

In the age of high speed Internet where people can interact instantly, scientific tools have lacked technology which can incorporate this concept of communication using the web. To solve this issue a web application for geological studies has been created, tentatively titled WebViz. This web application utilizes tools provided by Google Web Toolkit to create an AJAX web application capable of features found in non web based software. Using these tools, a web application can be created to act as piece of software from anywhere in the globe with a reasonably speedy Internet connection. An application of this technology can be seen with data regarding the recent tsunami from the major japan earthquakes. After constructing the appropriate data to fit a computer render software called HVR, WebViz can request images of the tsunami data and display it to anyone who has access to the application. This convenience alone makes WebViz a viable solution, but the option to interact with this data with others around the world causes WebViz to be taken as a serious computational tool. WebViz also can be used on any javascript enabled browser such as those found on modern tablets and smart phones over a fast wireless connection. Due to the fact that WebViz's current state is built using Google Web Toolkit the portability of the application is in it's most efficient form. Though many developers have been involved with the project, each person has contributed to increase the usability and speed of the application. In the project's most recent form a dramatic speed increase has been designed as well as a more efficient user interface. The speed increase has been informally noticed in recent uses of the application in China and Australia with the hosting server being located at the University of Minnesota. The user interface has been improved to not only look better but the functionality has been improved. Major functions of the application are rotating the 3D object using buttons. These buttons have been replaced with a new layout that is easier to understand the function and is also easy to use with mobile devices. With these new changes, WebViz is easier to control and use for general use.

Ruegg, C. S.

2011-12-01

182

76 FR 7884 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...  

Federal Register 2010, 2011, 2012, 2013

...Uniform Application for Securities Industry Registration...Depository System (``Web CRD''), and must pass the General Securities Representative examination...already registered in Web CRD must register (i...person is engaged in the securities business of a...

2011-02-11

183

An Application-Driven Perspective on Wireless Sensor Network Security  

E-print Network

objectives such as energy efficiency, cost, and application level performance with security to a degreeAn Application-Driven Perspective on Wireless Sensor Network Security Eric Sabbah, Adnan Majeed- tant applications. Securing WSNs is challenging due to their unique nature as an application

Kang, Kyoung-Don

184

Consuming Services in Browser Based Web Applications using IBM Rational Application Developer  

E-print Network

Consuming Services in Browser Based Web Applications using IBM Rational Application Developer: Intermediate Consuming Services in Browser Based Web Applications Page 1 #12;Consuming Services in Browser and beginner Java programming skills Page 2 Consuming Services in Browser Based Web Applications #12;Required

185

On the Applicability of Problem Frames to Web-based Business Applications  

Microsoft Academic Search

Problem frames offer a way to understand complex domains, hence their application to web based systems would seem a natural progression. However, it has been argued by some that web based systems are fundamentally different to typical software applications, and that existing problem frames may need extension to be applied to web-based applications. This paper discusses the application of problem

Sheridan Jeary; Keith Phalp

186

Test web applications with Selenium RC Introducing Selenium Remote Control  

E-print Network

Test web applications with Selenium RC Introducing Selenium Remote Control Skill Level 17 Aug 2010 Selenium is a testing framework used for automated Web application testing. Get to know Selenium Remote Control (Selenium RC), which allows you to build tests for different browsers to ensure

187

University of Essex Natural Language Engineering and Web Applications Group  

E-print Network

University of Essex Natural Language Engineering and Web Applications Group Depratment of Computer Science Kappa3 = Alpha (or Beta) Ron Artstein artstein [at] essex.ac.uk Massimo Poesio poesio [at] essex;University of Essex Natural Language Engineering and Web Applications Group NLE Technical Note 05-1, CS

Poesio, Massimo

188

An architecture for the evolution of Web applications (poster session)  

Microsoft Academic Search

This work presents a software architecture that is especially useful for managing the evolution of web applications. Web-based systems are a range of applications for which there are no technological standards and new concepts and tools are currently under evolution. Examples of this lack of standards include the transition from CGI scripts to Java Servlets and to Java Server Pages

Paulo Caroli; Carlos Jos P. de Lucena; Marcus Fontoura

2000-01-01

189

An Architecture for the Evolution of Web Applications  

Microsoft Academic Search

This work presents a software architecture that is especially useful for managing the evolution of web applications. Web-based systems are a range of applications for which there are no technological standards and new concepts and tools are currently under evolution. Examples of this lack of standards include the transition from CGI scripts to Java Servlets and to Java Server Pages

Paulo Caroli; Marcus Fontoura

2000-01-01

190

Bring AJAX to Web Application Based on Grid Service  

Microsoft Academic Search

AJAX is a new concept of Web application development, which can help developers build more dynamic and more responsive Web applications. Grid services are software components that provide seamless access to a variety of grid resources such as computational resources and data sources. Grid service is considered to be the mainstream of future Internet. In this paper, we present a

Youchan Zhu; Pengfei Shen

2009-01-01

191

Enforcing Security Policies for Distributed Objects Applications  

E-print Network

In this paper we present the design and the implementation of a policy engine for enforcing security policies for distributed applications. Such policies, represented by using the RBAC model, include both how the distributed, shared and replicated objects are used, by mean of role certificates and how these roles are managed by means of administrative roles. The policy engine can enforce not only privileges to invoke methods with particular parameters and under specific conditions but also the permissions to execute such methods. The engine is o#ered as a middleware service such that application developers can concntrate on specify the security policies for their applications and they are realesed from the burden of implementing the mechanisms for the actual enforcement of such policies.

Bogdan C. Popescu; Bruno Crispo; Andrew S. Tanenbaum; Maas Zeeman

2003-01-01

192

Photonic sensor applications in transportation security  

NASA Astrophysics Data System (ADS)

There is a broad range of security sensing applications in transportation that can be facilitated by using fiber optic sensors and photonic sensor integrated wireless systems. Many of these vital assets are under constant threat of being attacked. It is important to realize that the threats are not just from terrorism but an aging and often neglected infrastructure. To specifically address transportation security, photonic sensors fall into two categories: fixed point monitoring and mobile tracking. In fixed point monitoring, the sensors monitor bridge and tunnel structural health and environment problems such as toxic gases in a tunnel. Mobile tracking sensors are being designed to track cargo such as shipboard cargo containers and trucks. Mobile tracking sensor systems have multifunctional sensor requirements including intrusion (tampering), biochemical, radiation and explosives detection. This paper will review the state of the art of photonic sensor technologies and their ability to meet the challenges of transportation security.

Krohn, David A.

2007-09-01

193

Specification Patent Management for Web Application Platform Ecosystem  

NASA Astrophysics Data System (ADS)

Diversified usage of web applications has encouraged disintegration of web platform into management of identification and applications. Users make use of various kinds of data linked to their identity with multiple applications on certain social web platforms such as Facebook or MySpace. There has emerged competition among web application platforms. Platformers can design relationship with developers by controlling patent of their own specification and adopt open technologies developed external organizations. Platformers choose a way to open according to feature of the specification and their position. Patent management of specification come to be a key success factor to build competitive web application platforms. Each way to attract external developers such as standardization, open source has not discussed and analyzed all together.

Fukami, Yoshiaki; Isshiki, Masao; Takeda, Hideaki; Ohmukai, Ikki; Kokuryo, Jiro

194

Mobile web applications: bringing mobile apps and web together  

Microsoft Academic Search

The popularity of mobile applications is very high and still growing rapidly. These applications allow their users to stay connected with a large number of service providers in seamless fashion, both for leisure and productivity. But service prThe popularity of mobile applications is very high and still growing rapidly. These applications allow their users to stay connected with a large

Marie-Claire Forgue; Dominique Hazal-Massieux

2012-01-01

195

Holistic Query Transformations for Dynamic Web Applications Amit Manjhi  

E-print Network

applications suffer from unpredictable load, particularly due to breaking news (e.g., Hurricane Katrina- formations will continue to exist in Web applications. We then present algorithms for automating

Zimmerman, John

196

Improving target acquisition in Web applications with link prediction  

E-print Network

Web application users spend considerable time clicking on hyperlinks and buttons to complete frequent tasks. Individual application developers can optimize their interfaces to improve typical usage; however, no single task ...

Hanna, Roger B

2007-01-01

197

The Roadmap of Trust and Trust Evaluation in Web Applications and Web Services  

E-print Network

introduced from technology, state of the art and scientific challenges standpoints. This roadmap providesChapter 1 The Roadmap of Trust and Trust Evaluation in Web Applications and Web Services Lei Li- jective trust results and preventing huge monetary losses. This research roadmap presents an overview

Wang, Yan

198

78 FR 35043 - Aviation Security Advisory Committee Charter Renewal and Request for Applicants  

Federal Register 2010, 2011, 2012, 2013

...Docket Management System (FDMS) Web page at http://www.regulations...the Government Printing Office's Web page at http://www.gpoaccess...html; or (3) Visiting TSA's Security Regulations Web page at...

2013-06-11

199

A Web of Things Application Architecture -Integrating the Real-World into the Web  

E-print Network

for a Common Internet of Things Application Architecture Application development with smart things: Requires of Internet of Things applications and bring it closer to non-specialists?» 15.08.2011 4Dominique Guinard [Mot Development in the Internet of Things [flickr.com/photos/docman] #12;Web of Things Application Architecture 15

200

Integrated use of Web technologies to deliver a secure collaborative Web portal  

Microsoft Academic Search

This paper describes the design and operation of the OMII web site, which has to date achieved three major targets. The first target is the successful integrations in different tech- nologies (Server 2003 + IIS server + SQL server + .NET and SUSE Linux + Apache Server) and standards (W3C \\/ Mac- romedia and .NET). The second target is the

Victor Chang

2005-01-01

201

IPSec overhead in wireline and wireless networks for Web and email applications  

Microsoft Academic Search

This paper focuses on characterizing the overhead of IP security (IPSec) for email and Web applications using a set of test bed configurations. The different configurations are implemented using both wireline and wireless network links. The testing considers different combinations of authentication algorithms and authentication protocols. Authentication algorithms include Hashed Message Authentication Code-Message Digest 5 (HMAC-MD5) and Hashed Message Authentication

G. C. Hadjichristophi; Nathaniel J. Davis; Scott F. Midkiff

2003-01-01

202

Now accepting applications for Sam Nunn Security Program Fellows  

E-print Network

Scarcity o Climate Change o Energy Security o Infrastructure Protection o Disaster Management o Mass's origins are in national and international security policy. However, security relevant policy has alwaysNow accepting applications for Sam Nunn Security Program Fellows for the 2014/15 Academic Year What

Jacobs, Laurence J.

203

Creating Web-Based Scientific Applications Using Java Servlets  

NASA Technical Reports Server (NTRS)

There are many advantages to developing web-based scientific applications. Any number of people can access the application concurrently. The application can be accessed from a remote location. The application becomes essentially platform-independent because it can be run from any machine that has internet access and can run a web browser. Maintenance and upgrades to the application are simplified since only one copy of the application exists in a centralized location. This paper details the creation of web-based applications using Java servlets. Java is a powerful, versatile programming language that is well suited to developing web-based programs. A Java servlet provides the interface between the central server and the remote client machines. The servlet accepts input data from the client, runs the application on the server, and sends the output back to the client machine. The type of servlet that supports the HTTP protocol will be discussed in depth. Among the topics the paper will discuss are how to write an http servlet, how the servlet can run applications written in Java and other languages, and how to set up a Java web server. The entire process will be demonstrated by building a web-based application to compute stagnation point heat transfer.

Palmer, Grant; Arnold, James O. (Technical Monitor)

2001-01-01

204

Web Application Design Using Server-Side JavaScript  

SciTech Connect

This document describes the application design philosophy for the Comprehensive Nuclear Test Ban Treaty Research & Development Web Site. This design incorporates object-oriented techniques to produce a flexible and maintainable system of applications that support the web site. These techniques will be discussed at length along with the issues they address. The overall structure of the applications and their relationships with one another will also be described. The current problems and future design changes will be discussed as well.

Hampton, J.; Simons, R.

1999-02-01

205

Weaving a Secure Web around Education: A Guide to Technology Standards and Security.  

ERIC Educational Resources Information Center

The purpose of this guidebook is to assist education agencies and organizations--which include state education agencies or state departments of education, school districts, and schools--in the development, maintenance, and standardization of effective Web sites. Also included is a detailed examination of the procedures necessary to provide

National Forum on Education Statistics (ED/OERI), Washington, DC.

206

Application of Mobile Agents in Web-Based Learning Environment.  

ERIC Educational Resources Information Center

Web-based learning environments are strongly driven by the information revolution and the Internet, but they have a number of common deficiencies, such as slow access, no adaptivity to the individual student, limitation by bandwidth, and more. This paper outlines the benefits of mobile agents technology, and describes its application in Web-based

Hong Hong, Kinshuk; He, Xiaoqin; Patel, Ashok; Jesshope, Chris

207

Transforming Legacy Web Applications to the MVC Architecture  

Microsoft Academic Search

With the rapid changes that occur in the area of Web technologies, the porting and adaptation of existing Web applications into new platforms that take advantage of modern technologies has become an issue of increasing importance. This paper presents a reengineering framework whose target system is an architecture based on the Model-View-Controller (MVC) design pattern and enabled for the Java

Yu Ping; Kostas Kontogiannis; Terence C. Lau

2003-01-01

208

3 Ontology-based Information Visualization: Towards Semantic Web Applications  

E-print Network

of the increased semantics. For example, an ontology-based search engine could use its ontology to enrich3 Ontology-based Information Visualization: Towards Semantic Web Applications Christiaan Fluit, Marta Sabou and Frank van Harmelen 3.1 Introduction The Semantic Web is an extension of the current

van Harmelen, Frank

209

DEVELOPING GIS VISUALIZATION WEB SERVICES FOR GEOPHYSICAL APPLICATIONS  

E-print Network

DEVELOPING GIS VISUALIZATION WEB SERVICES FOR GEOPHYSICAL APPLICATIONS A. Sayar a,b. *, M. Pierce Commission II, WG II/2 KEY WORDS: GIS, Geophysics, Visualization, Internet/Web, Interoperability, Networks Information System (GIS) community. In this paper we will describe our group's efforts to implement GIS

210

Secure Web-based Ground System User Interfaces over the Open Internet  

NASA Technical Reports Server (NTRS)

A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

Langston, James H.; Murray, Henry L.; Hunt, Gary R.

1998-01-01

211

Semantically Rich Application-Centric Security in Android  

Microsoft Academic Search

Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smart- phone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to

Machigar Ongtang; Stephen E. Mclaughlin; William Enck; Patrick Drew Mcdaniel

2009-01-01

212

Towards semantic web-based management of security services  

Microsoft Academic Search

Policy-based management of distributed system has become a commonly accepted approach for such systems. However, there are\\u000a a number of open technical issues that might put large-scale deployment of policy-based management techniques at risk. They\\u000a include automated policy translation (i.e., refinement from abstract business goals to final configurations); development\\u000a of integrated policy architectures for network, service and application management, and

Flix J. Garca Clemente; Gregorio Martnez Prez; Andrs Muoz Ortega; Juan A. Bota; Antonio F. Gmez-skarmeta

2008-01-01

213

Writing Web 2.0 applications for science archives  

NASA Astrophysics Data System (ADS)

Writing these sorts of science archive web applications is now possible because of some significant breakthroughs in web technology over the last four years. The Web browser is no longer a glorified batch processing terminal, but an interactive environment that allows the user to have a similar experience as one might expect with an installed desktop application. Taking advantage of this technology requires a significant amount of UI design and advanced interactions with the web server. There are new levels of sophistication required to effectively develop this sort of web application. The IRSA group (NASA/IPAC Infrared Science Archive) is developing web-based software that equally takes advantage of modern technology and is designed to be reused easily. This way we can add new missions and data sets without a large programming effort while keeping the advanced interface. We can now provide true web-based FITS viewing, data overlays, and interaction without any plugins. Our tabular display allows us to filter, sort, and interact with large amounts data in ways that take advantage of the browser's power. This talk will show how we can us AJAX technology, the Google Web Toolkit (GWT), and Java to develop a data archive that is both well designed and creates a truly interactive experience.

Roby, William

2010-07-01

214

Intrusion recovery for database-backed web applications  

E-print Network

Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

Chandra, Ramesh

215

Development of a Web-based financial application System  

NASA Astrophysics Data System (ADS)

The paper describes a technique to develop a web based financial system, following latest technology and business needs. In the development of web based application, the user friendliness and technology both are very important. It is used ASP .NET MVC 4 platform and SQL 2008 server for development of web based financial system. It shows the technique for the entry system and report monitoring of the application is user friendly. This paper also highlights the critical situations of development, which will help to develop the quality product.

Hasan, M. R.; Ibrahimy, M. I.; Motakabber, S. M. A.; Ferdaus, M. M.; Khan, M. N. H.; Mostafa, M. G.

2013-12-01

216

DBProxy: A dynamic data cache for Web applications  

Microsoft Academic Search

The majority of web pages served today are generated dynamically, usually by an application server querying a back-end database. To enhance the scalability of dynamic content serving in large sites, application servers are of- floaded to front-end nodes, called edge servers. The im- provement from such application offloading is marginal, however, if data is still fetched from the origin database

Khalil Amiri; Sanghyun Park; Renu Tewari; Sriram Padmanabhan

2003-01-01

217

NEWT: A RESTful service for building High Performance Computing web applications  

Microsoft Academic Search

The NERSC Web Toolkit (NEWT) brings High Performance Computing (HPC) to the web through easy to write web applications. Our work seeks to make HPC resources more accessible and useful to scientists who are more comfortable with the web than they are with command line interfaces. The effort required to get a fully functioning web application is decreasing, thanks to

Shreyas Cholia; David Skinner; Joshua Boverhof

2010-01-01

218

Detecting user-visible failures in AJAX web applications by analyzing users' interaction behaviors  

Microsoft Academic Search

Web applications can suffer from poor reliability, and AJAX technology makes Web sites even more error-prone. Failures of a Web application, particularly user-visible failures, impact users' satisfaction and may drive users away from using the Web site. Conventional testing techniques are inadequate for improving AJAX applications' reliability, and application providers commonly rely on fast failure detection, which is challenging. In

Wanchun Li; Mary Jean Harrold; Carsten Grg

2010-01-01

219

Passive terahertz imaging for security application  

NASA Astrophysics Data System (ADS)

The passive detection is safe for passengers and operators as no radiation. Therefore, passive terahertz (THz) imaging can be applied to human body security check. Imaging in the THz band offers the unique property of being able to identify object through a range of materials. Therefore passive THz imaging is meaningful for security applications. This attribute has always been of interest to both the civil and military marks with applications. We took advantage of a single THz detector and a trihedral scanning mirror to propose another passive THz beam scanning imaging method. This method overcame the deficiencies of the serious decline in image quality due to the movement of the focused mirror. We exploited a THz scanning mirror with a trihedral scanning mirror and an ellipsoidal mirror to streamline the structure of the system and increase the scanning speed. Then the passive THz beam scanning imaging system was developed based on this method. The parameters were set as follows: the best imaging distance was 1.7m, the image height was 2m, the image width was 1m, the minimum imaging time of per frame was 8s, and the minimum resolution was 4cm. We imaged humans with different objects hidden under their clothes, such as fruit knife, belt buckle, mobile phone, screwdriver, bus cards, keys and other items. All the tested stuffs could be detected and recognized from the image.

Guo, Lan-tao; Deng, Chao; Zhao, Yuan-meng; Zhang, Cun-lin

2013-08-01

220

Video performance for high security applications.  

SciTech Connect

The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

Connell, Jack C.; Norman, Bradley C.

2010-06-01

221

A Voice Web Application Based on Dynamic Navigation of VXML  

NASA Astrophysics Data System (ADS)

Voice Web, as the name suggests, accesses web resources via voice. VoiceXML is the markup language used to develop speech applications. VoiceXML is interactive and allows voice input to be received and processed by voice browser. Unfortunately, the navigation of VoiceXML document is completely controlled by application developer. Also, the user does not have flexibility to utter random word from currently executing dialog. The aim of the paper is to address the weakness of VoiceXML and develop an application, which dynamically detects recognition candidates in user content, in contrast with recognition candidates of the existing voice web, which depend on the application developer. In this application, a news service is implemented along with dictionary of IT-specific terms and dictionary of words from currently executing news.

Bhingarkar, Sukhada P.

2010-11-01

222

Mobile Applications for Public Sector: Balancing Usability and Security  

Microsoft Academic Search

Development of mobile software applications for use in specific domains such as Public Security must conform to stringent security requirements. While mobile devices have many known limitations, assuring complex fine-grained security policies poses an additional challenge to quality mobile services and raises usability concerns. We address these challenges by means of a novel approach to authentication and gradual multi-factor authorization

Yuri NATCHETOI; Viktor KAUFMAN; Konstantin BEZNOSOV

2008-01-01

223

Adaptive portal framework for Semantic Web applications  

Microsoft Academic Search

In this paper we propose a framework for the creation of adaptive portal solutions for the Semantic Web. It supports difierent target domains in a single portal instance. We propose a platform envi- ronment where the ontology models and adaptivity are among flrst-class features. Adaptivity is supported by the personalized presentation layer that integrates software tools for automatic user characteristic

Michal Barla; Peter Bartalos; Mria Bielikov; Roman Filkorn; Michal Tvarozek

2007-01-01

224

AUTOMATICALLY HARDENING WEB APPLICATIONS USING PRECISE TAINTING  

E-print Network

review, including static analysis tools that scan code for possible vulnerabilities5 and automated testing tools that test web sites with inputs designed to expose vulnerabilities5-7 . Taint analysis-critical parameter, such as the command passed to an exec command. Taint analysis can be done statically

Evans, David

225

Radiation Detection for Homeland Security Applications  

NASA Astrophysics Data System (ADS)

In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

Ely, James

2008-05-01

226

75 FR 22151 - National Maritime Security Advisory Committee; Vacancies  

Federal Register 2010, 2011, 2012, 2013

...recommendations on national maritime security matters to the Secretary of Homeland Security via the Commandant of the...application form visit NMSAC Web site at http://www.homeport...under Missions>Maritime Security>National Maritime...

2010-04-27

227

AUTOMATICALLY HARDENING WEB APPLICATIONS USING PRECISE TAINTING  

E-print Network

to an exec command. Taint analysis can be done statically or dynamically. Section 3 describes previous work. Several tools have been developed to partially automate aspects of a security review, including static with inputs designed to expose vulnerabilities5-7 . Taint analysis identifies inputs that come from

Nguyen-Tuong, Anh

228

Spidergl: a Graphics Library for 3d Web Applications  

NASA Astrophysics Data System (ADS)

The recent introduction of the WebGL API for leveraging the power of 3D graphics accelerators within Web browsers opens the possibility to develop advanced graphics applications without the need for an ad-hoc plug-in. There are several contexts in which this new technology can be exploited to enhance user experience and data fruition, like e-commerce applications, games and, in particular, Cultural Heritage. In fact, it is now possible to use the Web platform to present a virtual reconstruction hypothesis of ancient pasts, to show detailed 3D models of artefacts of interests to a wide public, and to create virtual museums. We introduce SpiderGL, a JavaScript library for developing 3D graphics Web applications. SpiderGL provides data structures and algorithms to ease the use of WebGL, to define and manipulate shapes, to import 3D models in various formats, and to handle asynchronous data loading. We show the potential of this novel library with a number of demo applications and give details about its future uses in the context of Cultural Heritage applications.

Di Benedetto, M.; Corsini, M.; Scopigno, R.

2011-09-01

229

A widget library for creating policy-aware semantic Web applications  

E-print Network

In order to truly reap the benefits of the Semantic Web, there must be adequate tools for writing Web applications that aggregate, view, and edit the widely varying data the Semantic Web makes available. As a step toward ...

Hollenbach, James Dylan

2010-01-01

230

Ultra Lightweight Web Applications: A Single-Page Wiki employing a Partial Ajax Solution  

Microsoft Academic Search

The overloaded term Web 2.0 web site usually connotes an interactive web application that offers features normally associated with free-standing applications running directly under the control of an operating system. Such an interactive web applications, also known as a rich internet application (RIA), run within web browsers and must download XHTML and client-side scripts to control user interactivity. Via a

Michael J Rees

2006-01-01

231

49 CFR 1572.9 - Applicant information required for HME security threat assessment.  

Code of Federal Regulations, 2012 CFR

... Applicant information required for HME security threat assessment. 1572.9 Section...Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION...

2012-10-01

232

Reactivity on the Web: Paradigms and Applications of the Language XChange  

Microsoft Academic Search

Reactivity on the Web is an emerging issue. It is essential for upcoming Web systems such as online marketplaces, adaptive, Semantic Web systems as well as Web services and Grids. This article first introduces the paradigms upon which the high-level language XChange for programming reactive behaviour and distributed applications on the Web relies. Then, it briefly presents the main syntactical

Franccois Bry; Paula-Lavinia P?tranjan

2005-01-01

233

Assessing Night Vision Goggle Performance in Security Applications  

E-print Network

Assessing Night Vision Goggle Performance in Security Applications Robert S. Allisona , Pearl Police and border security operations are an important and growing application of night vision devices (NVDs). NVDs improve visibility at night but suffer from a variety of perceptual artifacts and human

Allison, Robert

234

Securing a web-based teleradiology platform according to German law and "best practices".  

PubMed

The Medical Data and Picture Exchange platform (MDPE), as a teleradiology system, facilitates the exchange of digital medical imaging data among authorized users. It features extensive support of the DICOM standard including networking functions. Since MDPE is designed as a web service, security and confidentiality of data and communication pose an outstanding challenge. To comply with demands of German laws and authorities, a generic data security concept considered as "best practice" in German health telematics was adapted to the specific demands of MDPE. The concept features strict logical and physical separation of diagnostic and identity data and thus an all-encompassing pseudonymization throughout the system. Hence, data may only be merged at authorized clients. MDPE's solution of merging data from separate sources within a web browser avoids technically questionable techniques such as deliberate cross-site scripting. Instead, data is merged dynamically by JavaScriptlets running in the user's browser. These scriptlets are provided by one server, while content and method calls are generated by another server. Additionally, MDPE uses encrypted temporary IDs for communication and merging of data. PMID:19745407

Spitzer, Michael; Ullrich, Tobias; Ueckert, Frank

2009-01-01

235

Web Services Provide Access to SCEC Scientific Research Application Software  

NASA Astrophysics Data System (ADS)

Web services offer scientific communities a new paradigm for sharing research codes and communicating results. While there are formal technical definitions of what constitutes a web service, for a user community such as the Southern California Earthquake Center (SCEC), we may conceptually consider a web service to be functionality provided on-demand by an application which is run on a remote computer located elsewhere on the Internet. The value of a web service is that it can (1) run a scientific code without the user needing to install and learn the intricacies of running the code; (2) provide the technical framework which allows a user's computer to talk to the remote computer which performs the service; (3) provide the computational resources to run the code; and (4) bundle several analysis steps and provide the end results in digital or (post-processed) graphical form. Within an NSF-sponsored ITR project coordinated by SCEC, we are constructing web services using architectural protocols and programming languages (e.g., Java). However, because the SCEC community has a rich pool of scientific research software (written in traditional languages such as C and FORTRAN), we also emphasize making existing scientific codes available by constructing web service frameworks which wrap around and directly run these codes. In doing so we attempt to broaden community usage of these codes. Web service wrapping of a scientific code can be done using a "web servlet" construction or by using a SOAP/WSDL-based framework. This latter approach is widely adopted in IT circles although it is subject to rapid evolution. Our wrapping framework attempts to "honor" the original codes with as little modification as is possible. For versatility we identify three methods of user access: (A) a web-based GUI (written in HTML and/or Java applets); (B) a Linux/OSX/UNIX command line "initiator" utility (shell-scriptable); and (C) direct access from within any Java application (and with the correct API interface from within C++ and/or C/Fortran). This poster presentation will provide descriptions of the following selected web services and their origin as scientific application codes: 3D community velocity models for Southern California, geocoordinate conversions (latitude/longitude to UTM), execution of GMT graphical scripts, data format conversions (Gocad to Matlab format), and implementation of Seismic Hazard Analysis application programs that calculate hazard curve and hazard map data sets.

Gupta, N.; Gupta, V.; Okaya, D.; Kamb, L.; Maechling, P.

2003-12-01

236

On enabling secure applications through off-line biometric identification  

SciTech Connect

In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

1998-04-01

237

Web-based radiology applications for clinicians and radiologists  

NASA Astrophysics Data System (ADS)

The University of Pennsylvania Radiology Department has developed a suite of Web based applications for clinicians and radiologists to provide wide spread, cost-effective and easy access to radiological information. The Image Viewer application provides clinicians and radiologists access to all diagnostic reports and digital images performed in the last week for all Emergency Dept., Intensive Care Unit and Neuro/CT studies. Image control options including zoom/pan, rotate, flip, and window/level are all available. The image mover/viewer application gives radiologists and technologists the ability to both move studies between any DICOM Storage Class Provider (SCP) and DICOM storage class user (SCU) and to view studies from any DICOM displayed. Web server support requires integration using Perl based CGI scripts with our DICOM/PACS and the MIR/CTN for images and our IDXrad/RIS for reports. Targeted images and reports are automatically routed from the PACS and RIS for storage on the web server. All images sent to the web server are modality specific per-processed to reduce size and improve contrast. After processing, all images are stored in DICOM and GIF formats. Client support requires web browsers with JavaScript and frame support.

Feingold, Eric R.; Grevera, George J.; Mezrich, Reuben S.; Horii, Steven C.; Khalsa, Satjeet S.; Phan, Le

1997-05-01

238

Filtergraph: An interactive web application for visualization of astronomy datasets  

NASA Astrophysics Data System (ADS)

Filtergraph is a web application being developed and maintained by the Vanderbilt Initiative in Data-intensive Astrophysics (VIDA) to flexibly and rapidly visualize a large variety of astronomy datasets of various formats and sizes. The user loads a flat-file dataset into Filtergraph which automatically generates an interactive data portal that can be easily shared with others. From this portal, the user can immediately generate scatter plots of up to five dimensions as well as histograms and tables based on the dataset. Key features of the portal include intuitive controls with auto-completed variable names, the ability to filter the data in real time through user-specified criteria, the ability to select data by dragging on the screen, and the ability to perform arithmetic operations on the data in real time. To enable seamless data visualization and exploration, changes are quickly rendered on screen and visualizations can be exported as high quality graphics files. The application is optimized for speed in the context of large datasets: for instance, a plot generated from a stellar database of 3.1 million entries renders in less than 2 s on a standard web server platform. This web application has been created using the Web2py web framework based on the Python programming language. Filtergraph is free to use at http://filtergraph.vanderbilt.edu/.

Burger, Dan; Stassun, Keivan G.; Pepper, Joshua; Siverd, Robert J.; Paegert, Martin; De Lee, Nathan M.; Robinson, William H.

2013-08-01

239

The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1  

Microsoft Academic Search

Application integration technology of Web Services is a challenge research area in web application area. Till now, many research works on web service have been done on the platform of desktop PC, however little work is done on the hardware platform of Java phone. By analysis on web services ar- chitecture and exploring Java mobile phone, this paper puts forward

Li Luqun; Li Minglu; Cui Xianguo

240

Framework for Supporting Web-Based Collaborative Applications  

NASA Astrophysics Data System (ADS)

The article proposes an intelligent framework for supporting Web-based applications. The framework focuses on innovative use of existing resources and technologies in the form of services and takes the leverage of theoretical foundation of services science and the research from services computing. The main focus of the framework is to deliver benefits to users with various roles such as service requesters, service providers, and business owners to maximize their productivity when engaging with each other via the Web. The article opens up with research motivations and questions, analyses the existing state of research in the field, and describes the approach in implementing the proposed framework. Finally, an e-health application is discussed to evaluate the effectiveness of the framework where participants such as general practitioners (GPs), patients, and health-care workers collaborate via the Web.

Dai, Wei

241

EMBEDDEDSYSTEMS Medinet is a Web-based  

E-print Network

of the necessary requirements for telemedicine appli- cations. More security is required for patient data than ON THE WORLD WIDE WEB The first Web-based telemedicine applications have demonstrated that the Web offers- works. Today's telemedicine applications have two main network requirements: they must enable

Abrardo, Andrea

242

Live Monitoring: Using Adaptive Instrumentation and Analysis to Debug and Maintain Web Applications  

Microsoft Academic Search

AJAX-based web applications are enabling the next gen- eration of rich, client-side web applications, but today's web application developers do not have the end-to-end visibility required to effectively build and maintain a re- liable system. We argue that a new capability of the web application environmentthe ability for a system to automatically create and serve different versions of an application

Emre Kiciman; Helen J. Wang

2007-01-01

243

Recent applications of thermal imagers for security assessment  

SciTech Connect

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01

244

Creating HTML5 Offline Web Applications  

Microsoft Academic Search

\\u000a In this chapter, we will explore what you can do with offline HTML5 applications. HTML5 applications do not necessarily require\\u000a constant access to the network, and loading cached resources can now be more flexibly controlled by developers.

Peter Lubbers; Brian Albers; Frank Salim

245

20 CFR 404.611 - How do I file an application for Social Security benefits?  

Code of Federal Regulations, 2010 CFR

...I file an application for Social Security benefits? 404.611 Section...I file an application for Social Security benefits? (a) General rule...application for title II Social Security benefits, which you may be...

2010-04-01

246

Twitter Web Application How to Discover Twitter Friendship through  

E-print Network

Twitter Web Application How to Discover Twitter Friendship through REST API David Prejban (dprejba1 online social network dataset and implement a tool to utilize Twitter's REST API to collect user's friendship information �To provide a visual representation of the Twitter friendship Conclusion �Twitter

Zhang, Junshan

247

Performance, scalability and reliability issues in web applications  

Microsoft Academic Search

Purpose The primary purpose of this paper is to present a comprehensive strategy for performance, reliability and scalability (PSR) testing of multi-tier web applications. Design\\/methodology\\/approach The strategy for PSR testing is presented primarily through examination of the intangible knowledge base in the PSR testing field. The paper also draws on relevant recent work conducted in the area of

Lakshmi S. Iyer; Babita Gupta; Nakul Johri

2005-01-01

248

KnittingFactory: An Infrastructure for Distributed Web Applications.  

National Technical Information Service (NTIS)

While Java and applets have created a new perspective for Web applications some problems are still unsolved. Among these are the question of how Java applets can find other members of the collaboration session. how to deal with the restrictions imposed by...

A. Baratloo, M. Karaul, H. Karl, Z. M. Kedem

1997-01-01

249

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

SciTech Connect

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01

250

Web-based Exercise #4: GIS Applications.  

NSDL National Science Digital Library

Justin Shepard, San Diego State University Geography Department Summary Introduce various GIS applications and usefulness in different specialty areas. The strength is that it provides an overview of GIS ...

Shepard, Justin

251

MVC et applications Web Servlets/JSP et modle MVC  

E-print Network

MVC et applications Web Servlets/JSP et modèle MVC Model2, Struts PierreYves Gibello pierreyves. #12;Modèle MVC · Model / View / Controller ­ Modèle : l 'application métier, les données... ce qui ' interface utilisateur, composée de vues, intéragit avec le contrôleur. #12;Le Pattern MVC Utilisateur Vue

Pous, Damien

252

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications  

E-print Network

Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web world applications. Keywords--Privacy Preservation, Indistinguishability, Uncer- tainty, Web Application communications render such attacks a pervasive and fundamental threat in the age of cloud computing. Existing

Wang, Lingyu

253

SOCLe: Integrated Design of Software Applications and Security  

Microsoft Academic Search

Abstract Defence Research and Development Canada (DRDC) ? Valcartier, with the support of the CRAC Laboratory at Ecole Polytechnique de Montr eal, carried out an ambitious R&D project aiming at developing a tool called SOCLe which integrates the design of software applications with their security. Integrating the design of software applica- tions and security into a unique tool is

Fr Ed Eric Painchaud; Damien Azambre; Val-b Elair; Raveca Maria Oarga

254

A Semantic Sensor Web for Environmental Decision Support Applications  

PubMed Central

Sensing devices are increasingly being deployed to monitor the physical world around us. One class of application for which sensor data is pertinent is environmental decision support systems, e.g., flood emergency response. For these applications, the sensor readings need to be put in context by integrating them with other sources of data about the surrounding environment. Traditional systems for predicting and detecting floods rely on methods that need significant human resources. In this paper we describe a semantic sensor web architecture for integrating multiple heterogeneous datasets, including live and historic sensor data, databases, and map layers. The architecture provides mechanisms for discovering datasets, defining integrated views over them, continuously receiving data in real-time, and visualising on screen and interacting with the data. Our approach makes extensive use of web service standards for querying and accessing data, and semantic technologies to discover and integrate datasets. We demonstrate the use of our semantic sensor web architecture in the context of a flood response planning web application that uses data from sensor networks monitoring the sea-state around the coast of England. PMID:22164110

Gray, Alasdair J. G.; Sadler, Jason; Kit, Oles; Kyzirakos, Kostis; Karpathiotakis, Manos; Calbimonte, Jean-Paul; Page, Kevin; Garcia-Castro, Raul; Frazer, Alex; Galpin, Ixent; Fernandes, Alvaro A. A.; Paton, Norman W.; Corcho, Oscar; Koubarakis, Manolis; De Roure, David; Martinez, Kirk; Gomez-Perez, Asuncion

2011-01-01

255

Browser-based Analysis of Web Framework Applications  

E-print Network

Although web applications evolved to mature solutions providing sophisticated user experience, they also became complex for the same reason. Complexity primarily affects the server-side generation of dynamic pages as they are aggregated from multiple sources and as there are lots of possible processing paths depending on parameters. Browser-based tests are an adequate instrument to detect errors within generated web pages considering the server-side process and path complexity a black box. However, these tests do not detect the cause of an error which has to be located manually instead. This paper proposes to generate metadata on the paths and parts involved during server-side processing to facilitate backtracking origins of detected errors at development time. While there are several possible points of interest to observe for backtracking, this paper focuses user interface components of web frameworks.

Kersten, Benjamin; 10.4204/EPTCS.35.5

2010-01-01

256

GWASS: GRASS web application software system based on the GeoBrain web service  

NASA Astrophysics Data System (ADS)

GRASS is a well-known geographic information system developed more than 30 years ago. As one of the earliest GIS systems, GRASS has currently survived mainly as free, open-source desktop GIS software, with users primarily limited to the research community or among programmers who use it to create customized functions. To allow average GIS end users to continue taking advantage of this widely-used software, we developed a GRASS Web Application Software System (GWASS), a distributed, web-based, multi-tiered Geospatial Information System (GIS) built on top of the GeoBrain web service, a project sponsored by NASA using the latest service oriented architecture (SOA). This SOA enabled system offers an effective and practical alternative to current commercial desktop GIS solutions. With GWASS, all geospatial processing and analyses are conducted by the server, so users are not required to install any software at the client side, which reduces the cost of access for users. The only resource needed to use GWASS is an access to the Internet, and anyone who knows how to use a web browser can operate the system. The SOA framework is revitalizing the GRASS as a new means to bring powerful geospatial analysis and resources to more users with concurrent access.

Qiu, Fang; Ni, Feng; Chastain, Bryan; Huang, Haiting; Zhao, Peisheng; Han, Weiguo; Di, Liping

2012-10-01

257

Suggestions for Social Security Disability Applicants  

MedlinePLUS

... and specialty. How much will an attorney cost? Fee Agreement Before the attorney can charge you for ... and your attorney must sign and file a fee agreement with the Social Security Administration. Your attorney ...

258

Machine Intelligence Applications to Securities Production.  

National Technical Information Service (NTIS)

The production of security documents provides a cache of interesting problems ranging across a broad spectrum. Some of the problems do not have rigorous scientific solutions available at this time and provide opportunities for less structured approaches s...

C. K. Johnson

1987-01-01

259

Specification and Verification of Web Applications in Rewriting Logic  

NASA Astrophysics Data System (ADS)

This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through a communicating protocol abstracting HTTP. The proposed framework includes a scripting language that is powerful enough to model the dynamics of complex Web applications by encompassing the main features of the most popular Web scripting languages (e.g. PHP, ASP, Java Servlets). We also provide a detailed characterization of browser actions (e.g. forward/backward navigation, page refresh, and new window/tab openings) via rewrite rules, and show how our models can be naturally model-checked by using the Linear Temporal Logic of Rewriting (LTLR), which is a Linear Temporal Logic specifically designed for model-checking rewrite theories. Our formalization is particularly suitable for verification purposes, since it allows one to perform in-depth analyses of many subtle aspects related to Web interaction. Finally, the framework has been completely implemented in Maude, and we report on some successful experiments that we conducted by using the Maude LTLR model-checker.

Alpuente, Mara; Ballis, Demis; Romero, Daniel

260

Application of models in information security management  

Microsoft Academic Search

The impact of information technology on business operations is widely recognized and its role in the emergence of new business models is well-known. In order to leverage the benefits of IT-supported business processes the security of the underlying information systems must be managed. Various so- called best-practice models and information security standards have positioned themselves as generic solutions for a

Danijel Milicevic; Matthias Goeken

2011-01-01

261

Rigorous and Automatic Testing of Web Applications Xiaoping Jia and Hongming Liu  

E-print Network

Rigorous and Automatic Testing of Web Applications Xiaoping Jia and Hongming Liu School of Computer, jordan}@cs.depaul.edu ABSTRACT As web applications become more and more prevalent, the quality assurance of web applications has become more and more important. Due to the complexity of the underlying

Jia, Xiaoping

262

Detecting Concurrency Errors in Client-side JavaScript Web Applications  

E-print Network

in client-side web applications written in JavaScript. WAVE generates various sequences of operations as test cases for a web application and executes a sequence of operations by dynamically controlling-server technologies, have evolved quickly, and the com- plexity of client-side dynamic web applications (a.k.a., Ajax

263

Schedule Estimation for Web Application Development  

E-print Network

-Gioia conducted a survey which involved employee satisfaction regarding their ERP systems. There were 232 respondents spanning across many industries, such as information technology, communications, financial, utility, healthcare and government agencies. A... for communication, financial, technology, healthcare and government industries. The development team at xxxx is about 20 developers and the implementation team is about six application consultants. xxxx mainly uses the expert judgment methodology to estimate...

Fernando, Lake

2008-05-16

264

Teleradiology network system using the web medical image conference system with a new information security solution  

NASA Astrophysics Data System (ADS)

We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme and the tokenization as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of automatic backup. With automatic backup technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged due to the large area disaster like the great earthquake of Japan, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. Moreover, by using tokenization, the history information of dividing the confidential medical information into two or more tallies is prevented from lying scattered by replacing the history information with another character string (Make it to powerlessness). As a result, information is available only to those who have rightful access it and the sender of a message and the message itself are verified at the receiving point. We propose a new information transmission method and a new information storage method with a new information security solution.

Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiro; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki

2012-02-01

265

Neutron Detection Alternatives to 3He for National Security Applications  

SciTech Connect

One of the main uses for 3He is in gas proportional counters for neutron detection. Large radiation detection systems deployed for homeland security and proliferation detection applications use such systems. Due to the large increase in use of 3He for homeland security and basic research, the supply has dwindled, and can no longer meet the demand. This has led to the search for an alternative technology to replace the use of 3He-based neutron detectors. In this paper, we review the testing of currently commercially available alternative technologies for neutron detection in large systems used in various national security applications.

Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

2010-11-21

266

Accessing multimedia content from mobile applications using semantic web technologies  

NASA Astrophysics Data System (ADS)

We describe the ideas and results of an applied research project that aims at leveraging the expressive power of semantic web technologies as a server-side backend for mobile applications that provide access to location and multimedia data and allow for a rich user experience in mobile scenarios, ranging from city and museum guides to multimedia enhancements of any kind of narrative content, including e-book applications. In particular, we will outline a reusable software architecture for both server-side functionality and native mobile platforms that is aimed at significantly decreasing the effort required for developing particular applications of that kind.

Kreutel, Jrn; Gerlach, Andrea; Klekamp, Stefanie; Schulz, Kristin

2014-02-01

267

TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones  

NASA Astrophysics Data System (ADS)

Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with nave username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.

Nauman, Mohammad; Ali, Tamleek

268

75 FR 63884 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Approving Proposed...  

Federal Register 2010, 2011, 2012, 2013

...regarding municipal securities to the MSRB...dissemination on the EMMA Web site, the EMMA...applicable municipal security otherwise displayed on the EMMA Web site. Currently...the EMMA public Web site would offer...investors in municipal securities given the...

2010-10-18

269

Page 1 of 19 L. Jean Camp & J. Duncan, "Conducting an Ethical Study of Web Traffic", 5th Workshop on Cyber Security  

E-print Network

of Web Traffic", 5th Workshop on Cyber Security Experimentation and Test, A USENIX Security Symposium Workshop, (Bellevue, WA) 6 August 2012. Conducting an Ethical Study they might opt out of the study (while also increasing their security) through the use of a VPN. While we had

Camp, L. Jean

270

WebKIV: Visualizing Structure and Navigation forWeb Mining Applications  

Microsoft Academic Search

A significant part of the web mining problem is simply in understanding the value of any mining method. For ex- ample, the value of web mining to improve user navigation is even more challenging if one can't visualize the differ- ences over a large collection of web pages or a significant structure within the existing web. We present WebKIV, a

Yonghe Niu; Tong Zheng; Jiyang Chen; Randy Goebel

2003-01-01

271

20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.  

Code of Federal Regulations, 2012 CFR

...703.203 Application for security deposit determination; information...unsecured obligations and the security deposit required. The application...seeking an exemption from the security deposit requirements based...the Branch and posted on the Internet at...

2012-04-01

272

A flexible integration framework for a Semantic Geospatial Web application  

NASA Astrophysics Data System (ADS)

With the growth of the World Wide Web technologies, the access to and use of geospatial information changed in the past decade radically. Previously, the data processed by a GIS as well as its methods had resided locally and contained information that was sufficiently unambiguous in the respective information community. Now, both data and methods may be retrieved and combined from anywhere in the world, escaping their local contexts. The last few years have seen a growing interest in the field of semantic geospatial web. With the development of semantic web technologies, we have seen the possibility of solving the heterogeneity/interoperation problem in the GIS community. The semantic geospatial web application can support a wide variety of tasks including data integration, interoperability, knowledge reuse, spatial reasoning and many others. This paper proposes a flexible framework called GeoSWF (short for Geospatial Semantic Web Framework), which supports the semantic integration of the distributed and heterogeneous geospatial information resources and also supports the semantic query and spatial relationship reasoning. We design the architecture of GeoSWF by extending the MVC Pattern. The GeoSWF use the geo-2007.owl proposed by W3C as the reference ontology of the geospatial information and design different application ontologies according to the situation of heterogeneous geospatial information resources. A Geospatial Ontology Creating Algorithm (GOCA) is designed for convert the geospatial information to the ontology instances represented by RDF/OWL. On the top of these ontology instances, the GeoSWF carry out the semantic reasoning by the rule set stored in the knowledge base to generate new system query. The query result will be ranking by ordering the Euclidean distance of each ontology instances. At last, the paper gives the conclusion and future work.

Yuan, Ying; Mei, Kun; Bian, Fuling

2008-10-01

273

A novel web application frame developed by MVC  

Microsoft Academic Search

The MVC (Model\\/View\\/Controller) design pattern was developed in Smalltalk-80 and widely used in software design. This paper introduces a novel Web application frame based on MVC. This frame separates the transaction logic from the presentation format. It also improves the system maintain-ability, scalability and performance by using the module data-base, template database, messaging object and buffer queue.

Luo GuangChun; WangYanhua Lu; Xianliang Hanhong

2003-01-01

274

Secure iPhone Access to Corporate Web Applications Contents  

E-print Network

The way corporations operate around mobile devices is currently shiftingemployees are starting to use their own devices for business purposes, rather than companyowned devices. With no direct control of the endpoints, IT departments have generally had to prohibit this or risk insecure access inside the firewall. But as more mobile devices appear on the corporate network, mobile device management has become a key IT initiative.

unknown authors

275

Semantic Policy-based Security Framework for Business Processes  

Microsoft Academic Search

Web service composition and work?ow language enable the deflnition and execution of business process in various application do- mains. Security is now a major concern for us to implement business process in the context of web service. Meanwhile policy-based approach is becoming popular for the dynamic speciflcation and regulation of web service constraints. We are going to propose a security

Dong Huang

2005-01-01

276

Randomness Quality of CI Chaotic Generators: Applications to Internet Security  

E-print Network

Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.

Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

2011-01-01

277

Web-Based Distributed Simulation and Data Management Services for Medical Applications  

Microsoft Academic Search

We proposed a distributed service oriented system with Web-based interface for medical information to promote the practical prediction of clinical prognosis. The proposed system provided hospitals secure access for medical information and processing simulations to examine effects of surgical treatments. Through a Web interface, users could operate the system in order to execute the simulations, access data from\\/to distributed storage,

Masashi Nakagawa; Kazunori Nozaki; Shinji Shimojo

2006-01-01

278

DOHA: scalable real-time web applications through adaptive concurrent execution  

Microsoft Academic Search

Browsers have become mature execution platforms enabling web applications to rival their desktop counterparts. An important class of such applications is interactive multimedia: games, animations, and interactive visualizations. Unlike many early web applications, these applications are latency sensitive and processing (CPU and graphics) intensive. When demands exceed available resources, application quality (e.g., frame rate) diminishes because it is hard to

Aiman Erbad; Norman C. Hutchinson; Charles Krasic

2012-01-01

279

A Framework with Tools for Designing Web-based Geographic Applications  

E-print Network

A Framework with Tools for Designing Web-based Geographic Applications The Nhan Luong, Sébastien models. In order to create Web-based geographic applica- tions and overcome these design problems, we. In this paper, we propose a framework for designing Web- based geographic applications. This framework

Paris-Sud XI, Université de

280

A Visual Architectural Approach to Maintaining Web Applications Ahmed E. Hassan and Richard C. Holt  

E-print Network

A Visual Architectural Approach to Maintaining Web Applications Ahmed E. Hassan and Richard C. Holt aeehassa@plg.uwaterloo.ca September 4, 2002 #12;Abstract Web applications are complex software systems which contain a rich structure with many relations between their components. Web developers are faced

Holt, Richard C.

281

Extracting RESTful Services from Web Applications Bipin Upadhyaya, Foutse Khomh, Ying Zou  

E-print Network

Extracting RESTful Services from Web Applications Bipin Upadhyaya, Foutse Khomh, Ying Zou.upadhyaya, foutse.khomh, ying.zou}@queensu.ca Abstract-- The Web contains large amount of information and services primarily intended for human users. A Web application offers high user experience and responsiveness. A user

Zou, Ying

282

Imagen: Runtime Migration of Browser Sessions for JavaScript Web Applications  

E-print Network

@ece.ubc.ca ABSTRACT Due to the increasing complexity of web applications and emerging HTML5 standards, a large amountScript, session migration, HTML5, JSON, DOM 1. INTRODUCTION The World Wide Web was originally designed around. With the evolution of web technologies, browsers, and HTML5 [5] a great deal of application state is being offloaded

Mesbah, Ali

283

DEVELOPMENT, EVALUATION, AND APPLICATION OF A FOOD WEB BIOACCUMULATION MODEL FOR PCBS  

E-print Network

DEVELOPMENT, EVALUATION, AND APPLICATION OF A FOOD WEB BIOACCUMULATION MODEL FOR PCBS IN THE STRAIT Management Title of Research Project: Development, Evaluation, and Application of a Food Web Bioaccumulation of Georgia; food web; sediment quality guidelines iii #12;ACKNOWLEDGEMENTS I sincerely thank Frank Gobas, my

284

IRS-III: A Broker for Semantic Web Services Based Applications  

Microsoft Academic Search

In this paper we describe IRS-III which takes a semantic broker based approach to creating applications from Semantic Web Services by medi- ating between a service requester and one or more service providers. Business organisations can view Semantic Web Services as the basic mechanism for in- tegrating data and processes across applications on the Web. This paper extends previous publications

Liliana Cabral; John Domingue; Stefania Galizia; Alessio Gugliotta; Vlad Tanasescu; Carlos Pedrinaci; Barry Norton

2006-01-01

285

A Mashup Tool for Cross-Domain Web Applications Using HTML5 Technologies  

Microsoft Academic Search

\\u000a Many web applications that do not take reusability and interoperability into account are being published today. However, there\\u000a are demands that developers provide the ability to collaborate among different web applications. In e-Science, an application\\u000a uses the results of other application as input data. In this paper, we introduce a mashup tool which can easily create a mashup\\u000a web application

Akiyoshi Matono; Akihito Nakamura; Isao Kojima

2011-01-01

286

A SECURE JAILING SYSTEM FOR CONFINING UNTRUSTED APPLICATIONS  

E-print Network

A SECURE JAILING SYSTEM FOR CONFINING UNTRUSTED APPLICATIONS Guido van 't Noordende, ´Ad´am Balogh, Application Confinement, Jailing. Abstract: System call interception based jailing is a well-known method an overview of the most important threats to jailing systems, and presents novel mechanisms for implementing

Tanenbaum, Andrew S.

287

An empirical study on the usefulness of Conallen's stereotypes in Web application comprehension  

E-print Network

An empirical study on the usefulness of Conallen's stereotypes in Web application comprehension extended with Conallen's stereotypes. The research question addressed by this study is whether enriching stan- dard UML diagrams with Web specific stereotypes gives any significant contribution

Di Penta, Massimiliano

288

Privacy, Security and Interoperability of Mobile Health Applications  

Microsoft Academic Search

\\u000a This paper will discuss the security, privacy and interoperability of mobile health applications (MHAs) and how these issues\\u000a must be reconciled in order for MHA devices to be implemented in the most robust fashion. Balance is needed between privacy\\u000a and accessibility, between security and interoperability and between flexibility and standardization. The interoperability\\u000a of diverse MHA devices must be a goal

Josette F. Jones; Sara A. Hook; Seong C. Park; LaSha M. Scott

289

Music domain ontology applications for intelligent web searching  

Microsoft Academic Search

The Semantic Web is an extension of the current Web that at- tempts to reach a state in the future where everything on the Web will no longer be only machine-readable, but also machine-understandable. Three important technologies for developing the Semantic Web are al- ready in place: Extensible Markup Language (XML), the Resource Description Framework (RDF), and Web Ontology Language

Pablo R. Fillottrani; Baha Blanca

290

Secure web-based access to radiology: forms and databases for fast queries  

NASA Astrophysics Data System (ADS)

Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

McColl, Roderick W.; Lane, Thomas J.

2002-05-01

291

WebKIV: visualizing structure and navigation for Web mining applications  

Microsoft Academic Search

A significant part of the Web mining problem is simply in understanding the value of any mining method. For example, the value of Web mining to improve user navigation is even more challenging if one can't visualize the differences over a large collection of Web pages or a significant structure within the existing Web. We present WebKIV, a tool we've

Yonghe Niu; Tong Zheng; Jiyang Chen; Randy Goebel

2003-01-01

292

Using the PL/SQL Cartridge of the Oracle Application Server to Deploy Web Applications  

SciTech Connect

Deploying business applications on the internal Web is a priority at Oak Ridge National Laboratory (Lockheed Martin Energy Research) and Lockheed Martin Energy Systems, Inc. as with most corporations. Three separate applications chose the Oracle Application Server (OAS), using the PL/SQL cartridge as a Web deployment method. This method was chosen primarily because the data was already stored in Oracle tables and developers knew HJSQL or at least SQL. The Database Support group had the responsibility of installing, testing, and determining standard methods for interfacing with the PL/SQL cartridge of the OAS. Note that the term Web Application Server was used for version 3, but in this discussion, OAS will be used for both version 3 and version 4.

Begovich, C.L.

1999-06-14

293

GCOOS Web Applications for Recreational Boaters and Fishermen  

NASA Astrophysics Data System (ADS)

Spatial and temporal information on the ecology of marine species and encompassing oceanographic environment is vital to the development of effective strategies for marine resource management and biodiversity conservation. Assembling data and generating products is a time-consuming and often laborious part of the workflow required of fisheries specialists, resource managers, marine scientists and other stakeholder groups for effective fishery management and marine spatial planning. Workflow costs for all groups can be significantly reduced through the use of interoperable networked data systems. The Gulf of Mexico Coastal Ocean Observing System Regional Association (GCOOS-RA) is one of 11 RAs comprising the non-Federal part of the U.S. Integrated Ocean Observing System (IOOS). The RAs serve the regions needs for data and information: by working with data providers to offer their data in standardized ways following IOOS guidance, by gathering stakeholders needs and requirements, and by producing basic products or facilitating product-generation by others to meet those needs. The GCOOS Data Portal aggregates regional near real-time data and serves these data through standardized service interfaces suitable for automated machine access or in formats suitable for human consumption. The related Products Portal generates products in graphical displays for humans and in standard formats for importing into common software packages. Web map applications are created using ArcGIS server RESTful service, publicly available Open Geospatial Consortium (OGC) Web Map Service (WMS) layers, and Web Coverage Service (WCS). Use of standardize interfaces allows us to construct seamless workflows that carry data from sensors through to products in an automated fashion. As a demonstration of the power of interoperable standards-based systems we have developed tailored product web pages for recreational boaters and fishermen. This is a part of an ongoing project to provide an interactive tool for decision support in the Gulf of Mexico.

Kobara, S.; Howard, M. K.; Simoniello, C.; Jochens, A. E.; Gulf Of Mexico Coastal Ocean Observing System Regional Association (Gcoos-Ra)

2010-12-01

294

A Survey on Web-based AR Applications  

E-print Network

Due to the increase of interest in Augmented Reality (AR), the potential uses of AR are increasing also. It can benefit the user in various fields such as education, business, medicine, and other. Augmented Reality supports the real environment with synthetic environment to give more details and meaning to the objects in the real word. AR refers to a situation in which the goal is to supplement a user's perception of the real-world through the addition of virtual objects. This paper is an attempt to make a survey of web-based Augmented Reality applications and make a comparison among them.

Parhizkar, Behrang; Lashkari, Arash Habibi; Bartaripou, Mohammad Mehdi; Babae, Hossein Reza

2011-01-01

295

web cellHTS2: A web-application for the analysis of high-throughput screening data  

PubMed Central

Background The analysis of high-throughput screening data sets is an expanding field in bioinformatics. High-throughput screens by RNAi generate large primary data sets which need to be analyzed and annotated to identify relevant phenotypic hits. Large-scale RNAi screens are frequently used to identify novel factors that influence a broad range of cellular processes, including signaling pathway activity, cell proliferation, and host cell infection. Here, we present a web-based application utility for the end-to-end analysis of large cell-based screening experiments by cellHTS2. Results The software guides the user through the configuration steps that are required for the analysis of single or multi-channel experiments. The web-application provides options for various standardization and normalization methods, annotation of data sets and a comprehensive HTML report of the screening data analysis, including a ranked hit list. Sessions can be saved and restored for later re-analysis. The web frontend for the cellHTS2 R/Bioconductor package interacts with it through an R-server implementation that enables highly parallel analysis of screening data sets. web cellHTS2 further provides a file import and configuration module for common file formats. Conclusions The implemented web-application facilitates the analysis of high-throughput data sets and provides a user-friendly interface. web cellHTS2 is accessible online at http://web-cellHTS2.dkfz.de. A standalone version as a virtual appliance and source code for platforms supporting Java 1.5.0 can be downloaded from the web cellHTS2 page. web cellHTS2 is freely distributed under GPL. PMID:20385013

2010-01-01

296

End-User Visual Design of Web-Based Interactive Applications Making Use of Geographical Information  

E-print Network

End-User Visual Design of Web-Based Interactive Applications Making Use of Geographical Information (called WIND - Web INteraction Design) that focuses on both designers' creativity and model executability Environment providing designers with visual functionality. Keywords: Interaction Design, Semantic Web

Paris-Sud XI, Université de

297

An empirical study on the usefulness of Conallen's stereotypes inWeb application comprehension  

Microsoft Academic Search

Comprehension of Web applications is a complex task, since several concerns co-exist in their implementation, among which the business logic, the navigation structure (as supported by hyperlinks and form submission), and per- sistent data storage. Design notations tailored for Web ap- plications promise increased understandability and main- tainability, thanks to the explicit representation of Web spe- cific elements (such as

Filippo Ricca; Massimiliano Di Penta; Marco Torchiano; Paolo Tonella; Mariano Ceccato

2006-01-01

298

Model-Based Testing of Thin-Client Web Applications and Navigation Input  

E-print Network

its state, becomes divided between the browser (handling rendering and browser navigation) and the web the web application at the server is unaware of this browser navigation, the part of the state stored the contents of the basket in a web shop, can safely be changed by browser navigation and hence should

Achten, Peter

299

Considering Browser Interaction in Web Application Testing1 Giuseppe A. Di Lucca, Massimiliano Di Penta  

E-print Network

Considering Browser Interaction in Web Application Testing1 Giuseppe A. Di Lucca, Massimiliano Di by interactions with web browser buttons. A testing model, considering the role of the browser while navigating: - The user interface of a WA is the page rendered in a web browser. The user can interact with the WA

Di Penta, Massimiliano

300

Offline web application and quiz synchronization for e-learning activity for mobile browser  

Microsoft Academic Search

Rapid growing of internet applications and users has led the improvement of mobile web browser technology and standards such as HTML5. Recently, HTML5 is turning to be a de facto standard after some of its features has been implemented in major mobile web browsers. Moodle as a web based Learning Management System (LMS) has been popular in academic environment for

Royyana M. Ijtihadie; Yoshifumi Chisaki; Tsuyoshi Usagawa; H. B. Cahyo; Achmad Affandi

2010-01-01

301

A State of the Art on Social Network Analysis and its Applications on a Semantic Web  

E-print Network

A State of the Art on Social Network Analysis and its Applications on a Semantic Web Guillaume as plain web resources. Some researchers apply classical methods of social network analysis. Keywords: social network analysis, semantic web. 1 Introduction Research conducted on large social networks

Paris-Sud XI, Université de

302

On the Use of Social Networks in Web Services: Application to the Discovery Stage  

Microsoft Academic Search

This chapter discusses the use of social networks in Web services with focus on the discovery stage that characterizes the life cycle of these Web services. Other stages in this life cycle include description, publication, invocation, and composition. Web services are software applications that end users or other peers can invoke and compose to satisfy different needs such as hotel

Zakaria Maamar; Leandro Krug Wives; Khouloud Boukadi

2010-01-01

303

Guidelines for Logotype Use For Web and Print Applications logo.wustl.edu  

E-print Network

Guidelines for Logotype Use For Web and Print Applications logo.wustl.edu #12;Directory of Contacts@wustl.edu USE OF THE SEAL Office of Brand Management (see above) USE OF LOGOS ON THE WEB Digital Communications...........................................6 Digital Logo Guidelines and Rules Web Styleguide

Subramanian, Venkat

304

MaJaB: improving resource management for web-based applications on mobile devices  

Microsoft Academic Search

The Web has become the host platform for interactive and collaborative applications that usually consist of multiple Web services. This transition is pushing the browsers to perform operating system like functionalities for better resource utilization. Unfortunately, there exists limited support for resource management on current Web platforms. This problem is further aggravated on mobile devices because of their limited resources.

Du Li; Manish Anand

2009-01-01

305

Creating Commercial Web 2.0 Applications with Autodesk MapGuide Studio and DM Solutions  

E-print Network

, the technical enablers underlying Web 2.0 including AJAX, and creating dynamic Web 2.0 mapping applications. YouGuide Web Tier. The MapGuide Server holds all the data and performs all the basic operations of creating

Ahmad, Sajjad

306

Model-Driven Development of Web Applications with UWA, MVC and JavaServer Faces  

Microsoft Academic Search

This paper presents a model-driven approach to the development of web applications based on the Ubiquitous Web Application (UWA) design framework, the Model-View-Controller (MVC) architectural pattern and the JavaServer Faces technology. The approach combines a complete and robust methodology for the user-centered conceptual design of web applications with the MVC metaphor, which improves separation of business logic and data presentation.

Damiano Distante; Paola Pedone; Gustavo Rossi; Gerardo Canfora

2007-01-01

307

Web 2.0 traffic measurement: analysis on online map applications  

Microsoft Academic Search

In recent years, web based online map applications have been getting more and more popular, such as Google Maps, Yahoo Maps. Many new Web 2.0 techniques such as mash-up and AJAX were adopted in these map applications to improve user experiences. But few researches have been done on traffic analysis of the Web 2.0 based online map applications. In this

Song Lin; Zhiguo Gao; Ke Xu

2009-01-01

308

Wireless structural monitoring for homeland security applications  

NASA Astrophysics Data System (ADS)

This paper addresses the development of a robust, low-cost, low power, and high performance autonomous wireless monitoring system for civil assets such as large facilities, new construction, bridges, dams, commercial buildings, etc. The role of the system is to identify the onset, development, location and severity of structural vulnerability and damage. The proposed system represents an enabling infrastructure for addressing structural vulnerabilities specifically associated with homeland security. The system concept is based on dense networks of "intelligent" wireless sensing units. The fundamental properties of a wireless sensing unit include: (a) interfaces to multiple sensors for measuring structural and environmental data (such as acceleration, displacements, pressure, strain, material degradation, temperature, gas agents, biological agents, humidity, corrosion, etc.); (b) processing of sensor data with embedded algorithms for assessing damage and environmental conditions; (c) peer-to-peer wireless communications for information exchange among units(thus enabling joint "intelligent" processing coordination) and storage of data and processed information in servers for information fusion; (d) ultra low power operation; (e) cost-effectiveness and compact size through the use of low-cost small-size off-the-shelf components. An integral component of the overall system concept is a decision support environment for interpretation and dissemination of information to various decision makers.

Kiremidjian, Garo K.; Kiremidjian, Anne S.; Lynch, Jerome P.

2004-07-01

309

Build great web search applications quickly with Solr and Blacklight  

NASA Astrophysics Data System (ADS)

The NRAO faced performance and usability issues after releasing a single-search-box ("Google-like") web application to query data across all NRAO telescope archives. Running queries with several relations across multiple databases proved to be very expensive in compute resources. An investigation for a better platform led to Solr and Blacklight, a solution stack which allows in-house development to focus on in-house problems. Solr is an Apache project built on Lucene to provide a modern search server with a rich set of features and impressive performance. Blacklight is a web user interface (UI) for Solr primarily developed by libraries at the University of Virginia and Stanford University. Though Blacklight targets libraries, it is highly adaptable for many types of search applications which benefit from the faceted searching and browsing, minimal configuration, and flexible query parsing of Solr and Lucene. The result: one highly reused codebase provides for millisecond response times and a flexible UI. Not just for observational data, NRAO is rolling out Solr and Blacklight across domains of library databases, telescope proposals, and more -- in addition to telescope data products, where integration with the Virtual Observatory is on-going.

DuPlain, Ron; Balser, Dana S.; Radziwill, Nicole M.

2010-07-01

310

Developing web-based and parallelized biostatistics/bioinformatics applications: ADaCGH  

E-print Network

Developing web-based and parallelized biostatistics/bioinformatics applications: ADaCGH as a case: end user's needs Bioinformatics/biostatistics needs Accessible, user-friendly, applications: end user's needs Bioinformatics/biostatistics needs Accessible, user-friendly, applications

Díaz-Uriarte, Ramón

311

Data Mining Applications for Fraud Detection in Securities Market  

E-print Network

Data Mining Applications for Fraud Detection in Securities Market Koosha Golmohammadi, Osmar R. Zaiane Department of Computing Science University of Alberta, Canada Edmonton, Canada {golmoham, zaiane review of data mining methods that are used to address the issue. We identify the best practices

Zaiane, Osmar R.

312

Privacy and security in biomedical applications of wireless sensor networks  

Microsoft Academic Search

Wireless sensor network applications in healthcare and biomedical technology have received increasing attention, while associated security and privacy issues remain open areas of consideration. The relevance of this technology to our growing elderly population, as well as our increasingly over-crowded and attention-drained healthcare systems, is promising. However, prior to the emergence of these systems as a ubiquitous technology, healthcare providers

Ellen Stuart; Melody Moh; Teng-Sheng Moh

2008-01-01

313

Innovative methods to enhance transaction security of banking applications  

Microsoft Academic Search

The increasing number of identity theft incidents such as credit card fraud, card duplication and internet attacks threaten the banking business that is mainly based on customer trust. Information and communication technologies create new business opportunities and innovative applications but do also enable new attack scenarios. Therefore, maintaining security and integrity is essential for the future economic success of banking.Biometric

Gregor Kltzsch

2006-01-01

314

Web Robots and Web Mining  

NSDL National Science Digital Library

Manually indexing the World Wide Web is obviously an impossible task, and it is even a daunting challenge for automated techniques. Web content mining is a general term used to describe these techniques, which are intended for information categorization and filtering. Web robots serve a variety of purposes, including indexing; and they can be useful or, in some cases, harmful. Web usage mining, on the other hand, is used to determine how a Web site's structure and organization effect the way users navigate the site.The Web Robots Pages (1) is an excellent starting place to learn about these automated programs. Several hundred robots are documented in a database, and a selection of papers considers proper ethics and guidelines for using robots, among other things. An article on Web mining and its subclasses is given on DM Review (2). It describes the basics of Web analysis and outlines many benefits Web mining can offer. A course homepage on Web data mining from DePaul University (3) offers a broad selection of reading material on the subject. Mostly consisting of research papers and journal articles, the documents range from general applications to specific theories and case studies. Two computer scientists from Polytechnic University propose a robust, distributed Web crawler (another term for Web robot), intended for large-scale network interaction (4). The twelve page paper begins with the motivation for the project, and continues with a full description of the system architecture and implementation. The November 2002 issue of Computer magazine featured an article on Data Mining for Web Intelligence (5). It points out that today's Internet is lacking in many key aspects, and that Web mining will play an important role in the development of improved search engines and automatic document classification. A short poster presentation from the 2002 International World Wide Web Conference (6) introduces GeniMiner, a Web search strategy based on a genetic algorithm. GeniMiner operates on the premise of finding a nearly optimal solution in order to minimize manual analysis of the search results. KDnuggets (7) is a free, biweekly newsletter on data and Web mining. In recent issues, special attention has been given to the Total Information Awareness project, which is investigating ways of mining the Web and email for possible information about terrorist activity. Web robots are occasionally used for malicious purposes, namely to automatically register for free email or participate in online polls. A technology that was developed to counter these robots involved using a blurred or distorted word to gain access, which could easily be read by a human but would be impossible for a robot to read. In a press release from the University of California at Berkeley (8), researchers have discovered a way to allow Web robots to crack this security system. The article describes how it was accomplished and provides motivation for more advanced security measures.

Leske, Cavin.

2003-01-01

315

The Effect of Web-Based Project Applications on Students' Attitudes towards Chemistry  

ERIC Educational Resources Information Center

Students perform intensive web-based applications during their education. One of these is project-based application. In this study, the effect of web based project applications on students' attitudes towards chemistry has been investigated. 42 students attending Hacettepe University, Faculty of Education, and Department of Chemistry Education have

Morgil, Inci; Gungor Seyhan, Hatice; Ural Alsan, Evrim; Temel, Senar

2008-01-01

316

Network-Based Learning and Assessment Applications on the Semantic Web  

ERIC Educational Resources Information Center

Today's Web applications are already "aware" of the network of computers and data on the Internet, in the sense that they perceive, remember, and represent knowledge external to themselves. However, Web applications are generally not able to respond to the meaning and context of the information in their memories. As a result, most applications are

Gibson, David

2005-01-01

317

StreamStats: A Water Resources Web Application  

USGS Publications Warehouse

Streamflow statistics, such as the 1-percent flood, the mean flow, and the 7-day 10-year low flow, are used by engineers, land managers, biologists, and many others to help guide decisions in their everyday work. For example, estimates of the 1-percent flood (the flow that is exceeded, on average, once in 100 years and has a 1-percent chance of being exceeded in any year, sometimes referred to as the 100-year flood) are used to create flood-plain maps that form the basis for setting insurance rates and land-use zoning. This and other streamflow statistics also are used for dam, bridge, and culvert design; water-supply planning and management; water-use appropriations and permitting; wastewater and industrial discharge permitting; hydropower facility design and regulation; and the setting of minimum required streamflows to protect freshwater ecosystems. In addition, researchers, planners, regulators, and others often need to know the physical and climatic characteristics of the drainage basins (basin characteristics) and the influence of human activities, such as dams and water withdrawals, on streamflow upstream from locations of interest to understand the mechanisms that control water availability and quality at those locations. Knowledge of the streamflow network and downstream human activities also is necessary to adequately determine whether an upstream activity, such as a water withdrawal, can be allowed without adversely affecting downstream activities. Streamflow statistics could be needed at any location along a stream. Most often, streamflow statistics are needed at ungaged sites, where no streamflow data are available to compute the statistics. At U.S. Geological Survey (USGS) streamflow data-collection stations, which include streamgaging stations, partial-record stations, and miscellaneous-measurement stations, streamflow statistics can be computed from available data for the stations. Streamflow data are collected continuously at streamgaging stations. Streamflow measurements are collected systematically over a period of years at partial-record stations to estimate peak-flow or low-flow statistics. Streamflow measurements usually are collected at miscellaneous-measurement stations for specific hydrologic studies with various objectives. StreamStats is a Web-based Geographic Information System (GIS) application (fig. 1) that was created by the USGS, in cooperation with Environmental Systems Research Institute, Inc. (ESRI)1, to provide users with access to an assortment of analytical tools that are useful for water-resources planning and management. StreamStats functionality is based on ESRI's ArcHydro Data Model and Tools, described on the Web at http://support.esri.com/index.cfm?fa=downloads.dataModels.filteredGateway&dmid=15. StreamStats allows users to easily obtain streamflow statistics, basin characteristics, and descriptive information for USGS data-collection stations and user-selected ungaged sites. It also allows users to identify stream reaches that are upstream and downstream from user-selected sites, and to identify and obtain information for locations along the streams where activities that may affect streamflow conditions are occurring. This functionality can be accessed through a map-based user interface that appears in the user's Web browser (fig. 1), or individual functions can be requested remotely as Web services by other Web or desktop computer applications. StreamStats can perform these analyses much faster than historically used manual techniques. StreamStats was designed so that each state would be implemented as a separate application, with a reliance on local partnerships to fund the individual applications, and a goal of eventual full national implementation. Idaho became the first state to implement StreamStats in 2003. By mid-2008, 14 states had applications available to the public, and 18 other states were in various stages of implementation.

Ries, Kernell G., III; Guthrie, John G.; Rea, Alan H.; Steeves, Peter A.; Stewart, David W.

2008-01-01

318

A Secure Image Transfer Application for the NHSnet Kerry Jean kjean@ee.ucl.ac.uk, Walter Eaves weaves@ee.ucl.ac.uk, John Lam  

E-print Network

of the security technologies investigated in the HARP (Harmonisation for the security of web technologies and a according to the implemented policy [1]. The HARP (HArmonisation for the secuRity of web technologies and a, their exploitation in telemedicine introduces many security concerns. Through the use of secure servers called HARP

Haddadi, Hamed

319

Web-Based Recruitment: Effects of Information, Organizational Brand, and Attitudes Toward a Web Site on Applicant Attraction  

Microsoft Academic Search

Recruitment theory and research show that objective characteristics, subjective considerations, and critical contact send signals to prospective applicants about the organization and available opportunities. In the generating applicants phase of recruitment, critical contact may consist largely of interactions with recruitment sources (e.g., newspaper ads, job fairs, organization Web sites); however, research has yet to fully address how all 3 types

David G. Allen; Raj V. Mahto; Robert F. Otondo

2007-01-01

320

Millimeter-Wave and Terahertz Imaging in Security Applications  

NASA Astrophysics Data System (ADS)

The relatively short wavelength of mm-wave and THz radiation coupled with good transmission through many dielectric materials allows images to be formed of concealed objects. This chapter gives an overview of the detectors, their associated circuitry, and system developments over the past 10 years, focussing on personnel security screening. We will discuss the phenomenology of imaging at these wavelengths, introduce the reader to the basic architectures being used and developed for image forming instruments, show examples of systems, and also discuss the feasibility of spectroscopic THz imaging for security screening applications.

Luukanen, Arttu; Appleby, Roger; Kemp, Mike; Salmon, Neil

321

(Preliminary field evaluation of solid state cameras for security applications)  

SciTech Connect

Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices.

Not Available

1987-01-01

322

RDFa Ontology-Based Architecture for String-Based Web Attacks: Testing and Evaluation  

Microsoft Academic Search

\\u000a String input is an issue for web application security. The problem is that developers often trust string input without checking\\u000a for validity. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation\\u000a can tend to break the security upon web applications. In this chapter, security vulnerabilities such as SQL injection has\\u000a been described and

Shadi Aljawarneh; Faisal Alkhateeb

323

The research of network database security technology based on web service  

NASA Astrophysics Data System (ADS)

Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

2013-03-01

324

78 FR 46622 - Application of Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...  

Federal Register 2010, 2011, 2012, 2013

...Topaz Exchange, LLC for Registration as a National Securities Exchange; Findings...an Application for Registration as a National Securities Exchange (``Form 1...Application.\\6\\ Topaz Exchange submitted a detailed response to comments on July...

2013-08-01

325

Transforming the web into a real application platform: new technologies, emerging trends and missing pieces  

Microsoft Academic Search

The World Wide Web has evolved from a simple document browsing and distribution environment into a rich software platform in which desktop-style applications are increasingly becoming first class citizens. The document-oriented origins of the Web are still evident in many areas, though, and traditionally it has been difficult to compose truly interactive web applications without using plug-in components or browser

Matti Anttonen; Arto Salminen; Tommi Mikkonen; Antero Taivalsaari

2011-01-01

326

Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research  

Microsoft Academic Search

\\u000a Trajectory similarity of moving objects resembles path similarity of user click-streams in web usage mining. By analyzing\\u000a the URL path of each user, we are able to determine paths that are very similar and therefore effective caching strategies\\u000a can be applied. In recent years, World Wide Web has been increasingly used by terrorists to spread their ideologies and web\\u000a mining

Sajimon Abraham; P. Sojan Lal

327

Ontology-Based Security Policies for Supporting the Management of Web Service Business Processes  

Microsoft Academic Search

Typically, in areas such as e-business and e-government, among others, Web services are used as basic components for building business processes. Participants in a business process may have different computational platforms that should interoperate in order to achieve the process goals. This interoperability is supported by the Web service technology. Thus, the importance of the technology is growing and its

Diego Zuquim Guimares Garcia; Maria Beatriz Felgar De Toledo

2008-01-01

328

The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking  

NASA Astrophysics Data System (ADS)

Communication is a fundamental function of life, and it exists in almost all living things: from single-cell bacteria to human beings. Communication, together with competition and cooperation,arethree fundamental processes in nature. Computer scientists are familiar with the study of competition or 'struggle for life' through Darwin's evolutionary theory, or even evolutionary computing. They may be equally familiar with the study of cooperation or altruism through the Prisoner's Dilemma (PD) game. However, they are likely to be less familiar with the theory of animal communication. The objective of this article is three-fold: (i) To suggest that the study of animal communication, especially the honesty (reliability) of animal communication, in which some significant advances in behavioral biology have been achieved in the last three decades, should be on the verge to spawn important cross-disciplinary research similar to that generated by the study of cooperation with the PD game. One of the far-reaching advances in the field is marked by the publication of "The Handicap Principle: a Missing Piece of Darwin's Puzzle" by Zahavi (1997). The 'Handicap' principle [34][35], which states that communication signals must be costly in some proper way to be reliable (honest), is best elucidated with evolutionary games, e.g., Sir Philip Sidney (SPS) game [23]. Accordingly, we suggest that the Handicap principle may serve as a fundamental paradigm for trust research in computer science. (ii) To suggest to computer scientists that their expertise in modeling computer networks may help behavioral biologists in their study of the reliability of animal communication networks. This is largely due to the historical reason that, until the last decade, animal communication was studied with the dyadic paradigm (sender-receiver) rather than with the network paradigm. (iii) To pose several open questions, the answers to which may bear some refreshing insights to trust research in computer science, especially secure and resilient computing, the semantic web, and social networking. One important thread unifying the three aspects is the evolutionary game theory modeling or its extensions with survival analysis and agreement algorithms [19][20], which offer powerful game models for describing time-, space-, and covariate-dependent frailty (uncertainty and vulnerability) and deception (honesty).

Ma, Zhanshan (Sam); Krings, Axel W.; Hung, Chih-Cheng

329

Situating CoWeb: A Scholarship of Application  

ERIC Educational Resources Information Center

Since 1998, we have been developing and researching CoWeb, a version of Wiki designed to support collaborative learning. In this article, we summarize our results of situating CoWeb across the academic landscape of Georgia Tech. In architecture, CoWeb enabled faculty to serve more students in a design-based course. In English composition, a

Rick, Jochen; Guzdial, Mark

2006-01-01

330

Neutron resonance radiography for security applications  

NASA Astrophysics Data System (ADS)

Fast Neutron Resonance Radiography (NRR) has been devised as an elemental imaging method, with applications such as contraband detection and mineral analysis. In the NRR method, a 2-D elemental mapping of hydrogen, carbon, nitrogen, oxygen and the sum of other elements is obtained from fast neutron radiographic images taken at different neutron energies chosen to cover the resonance cross section features of one or more elements. Images are formed using a lens-coupled plastic scintillator-CCD combination. In preliminary experiments, we have produced NRR images of various simulants using a variable energy neutron beam based on the Li(p,n)Be reaction and a variable energy proton beam. In order to overcome practical limitations to this method, we have studied NRR imaging using the D-D reaction at a fixed incident D energy and scanning through various neutron energies by using the angular variation in neutron energy. The object-detector assembly rotates around the neutron source and different energy (2-6 MeV) neutrons can be obtained at different angles from a D-D neutron source. The radiographic image provides a 2-D mapping of the sum of elemental contents (weighted by the attenuation coefficients). Transmission measurements taken at different neutron energies (angles) form a set of linear equations, which can then be solved to map individual elemental contents.

Lanza, Richard C.

2002-11-01

331

Application distribution model and related security attacks in VANET  

NASA Astrophysics Data System (ADS)

In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

2013-03-01

332

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2013 CFR

...2013-07-01 2012-07-01 true Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2013-07-01

333

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2011 CFR

...2011-07-01 2011-07-01 false Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2011-07-01

334

36 CFR 1194.22 - Web-based intranet and internet information and applications.  

Code of Federal Regulations, 2012 CFR

...2012-07-01 2012-07-01 false Web-based intranet and internet information and applications. 1194.22 Section 1194...Technical Standards 1194.22 Web-based intranet and internet information and applications. (a) A text equivalent for...

2012-07-01

335

Web-Based Intelligent E-Learning Systems: Technologies and Applications  

ERIC Educational Resources Information Center

Collecting and presenting the latest research and development results from the leading researchers in the field of e-learning systems, Web-Based Intelligent E-Learning Systems: Technologies and Applications provides a single record of current research and practical applications in Web-based intelligent e-learning systems. This book includes major

Ma, Zongmin

2006-01-01

336

Predicting common web application vulnerabilities from input validation and sanitization code patterns  

Microsoft Academic Search

Software defect prediction studies have shown that defect predictors built from static code attributes are useful and effective. On the other hand, to mitigate the threats posed by common web application vulnerabilities, many vulnerability detection approaches have been proposed. However, finding alternative solutions to address these risks remains an important research problem. As web applications generally adopt input validation and

Lwin Khin Shar; Hee Beng Kuan Tan

2012-01-01

337

Modeling and Testing Web-based Applications Ye Wu and Jeff Offutt  

E-print Network

as the brains. This means that software faults in web applications have potentially disastrous conse- quences of the application requirement as well as dramatic changes of the web technologies, the fact that the roles, the extremely loose coupling and dynamic integration, and the ability of the user to directly affect the control

Offutt, Jeff

338

C ontent-based Navigation in Web-based Learning Applications  

Microsoft Academic Search

Rapid growth of the Internet make Web-based applications becomes a new means to learn. Authors of Web-based learning applications with multiple resources provide navigation to help users understanding structured idea of learning topics. Since the increasing of resources is such a growing field, navigation map of learning topics would be out of date if it is manually constructed. We define

Diana Purwitasari; Yasuhisa Okazaki; Kenzi Watanabe

339

A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web  

E-print Network

1 A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web Henry M Department of Mechanical and Industrial Engineering University of Toronto 5 King's College Road Toronto;2 A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web Abstract This paper

Dalkilic, Mehmet

340

Potential National Security Applications of Nuclear Resonance Fluorescence Methods  

SciTech Connect

The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

2009-06-09

341

A Case Study in Web 2.0 Application Development  

NASA Astrophysics Data System (ADS)

Recent web technologies focusing on languages, frameworks, and tools are discussed, using the Robert C. Byrd Green Bank Telescopes (GBT) new Dynamic Scheduling System as the primary example. Within that example, we use a popular Python web framework, Django, to build the extensive web services for our users. We also use a second complimentary server, written in Haskell, to incorporate the core scheduling algorithms. We provide a desktop-quality experience across all the popular browsers for our users with the Google Web Toolkit and judicious use of JQuery in Django templates. Single sign-on and authentication throughout all NRAO web services is accomplished via the Central Authentication Service protocol, or CAS.

Marganian, P.; Clark, M.; Shelton, A.; McCarty, M.; Sessoms, E.

2010-12-01

342

Model-based, event-driven programming paradigm for interactive web applications  

E-print Network

Applications are increasingly distributed and event-driven. Advances in web frameworks have made it easier to program standalone servers and their clients, but these applications remain hard to write. A model-based programming ...

Milicevic, Aleksandar

343

NEUTRON AND GAMMA RAY DETECTION FOR BORDER SECURITY APPLICATIONS  

SciTech Connect

Countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments in the U.S. and in a number of other countries by governments and international organizations. Most deployed radiation portal monitor systems are based on plastic scintillator for gamma-ray detection and 3He tubes for neutron detection. The approach to this homeland security application, and lessons learned, are discussed.

Kouzes, Richard T.

2010-05-21

344

VoSeq: a voucher and DNA sequence web application.  

PubMed

There is an ever growing number of molecular phylogenetic studies published, due to, in part, the advent of new techniques that allow cheap and quick DNA sequencing. Hence, the demand for relational databases with which to manage and annotate the amassing DNA sequences, genes, voucher specimens and associated biological data is increasing. In addition, a user-friendly interface is necessary for easy integration and management of the data stored in the database back-end. Available databases allow management of a wide variety of biological data. However, most database systems are not specifically constructed with the aim of being an organizational tool for researchers working in phylogenetic inference. We here report a new software facilitating easy management of voucher and sequence data, consisting of a relational database as back-end for a graphic user interface accessed via a web browser. The application, VoSeq, includes tools for creating molecular datasets of DNA or amino acid sequences ready to be used in commonly used phylogenetic software such as RAxML, TNT, MrBayes and PAUP, as well as for creating tables ready for publishing. It also has inbuilt BLAST capabilities against all DNA sequences stored in VoSeq as well as sequences in NCBI GenBank. By using mash-ups and calls to web services, VoSeq allows easy integration with public services such as Yahoo! Maps, Flickr, Encyclopedia of Life (EOL) and GBIF (by generating data-dumps that can be processed with GBIF's Integrated Publishing Toolkit). PMID:22720030

Pea, Carlos; Malm, Tobias

2012-01-01

345

Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues  

ERIC Educational Resources Information Center

This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,

Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

2007-01-01

346

An ethernet/IP security review with intrusion detection applications  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01

347

Keeping the Web in Web 2.0 An HCI Approach to Designing Web  

E-print Network

Keeping the Web in Web 2.0 An HCI Approach to Designing Web Applications CHI 2007 Course Notes.....................................................................................................................................1 1. Web Application UI versus Desktop Application UI..............................................................................................................................2 3. Examples of State Management in Web Applications

Tomkins, Andrew

348

Development of Grid-like Applications for Public Health Using Web 2.0 Mashup Techniques  

PubMed Central

Development of public health informatics applications often requires the integration of multiple data sources. This process can be challenging due to issues such as different file formats, schemas, naming systems, and having to scrape the content of web pages. A potential solution to these system development challenges is the use of Web 2.0 technologies. In general, Web 2.0 technologies are new internet services that encourage and value information sharing and collaboration among individuals. In this case report, we describe the development and use of Web 2.0 technologies including Yahoo! Pipes within a public health application that integrates animal, human, and temperature data to assess the risk of West Nile Virus (WNV) outbreaks. The results of development and testing suggest that while Web 2.0 applications are reasonable environments for rapid prototyping, they are not mature enough for large-scale public health data applications. The application, in fact a systems of systems, often failed due to varied timeouts for application response across web sites and services, internal caching errors, and software added to web sites by administrators to manage the load on their servers. In spite of these concerns, the results of this study demonstrate the potential value of grid computing and Web 2.0 approaches in public health informatics. PMID:18755998

Scotch, Matthew; Yip, Kevin Y.; Cheung, Kei-Hoi

2008-01-01

349

Graph Drawing for Security Visualization  

Microsoft Academic Search

As the number of devices connected to the internet contin- ues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have become crucial properties for networks and applications. Due the complexity and subtlety of crypto- graphic methods and protocols, software architects and developers often fail to incorporate security principles in their designs and

Roberto Tamassia; Bernardo Palazzi; Charalampos Papamanthou

2008-01-01

350

WEBSCAT: A web application for the analysis of electromagnetic scattering from small particles  

NASA Astrophysics Data System (ADS)

Development of an online web application to simulate and display plane wave scattering from small particles is presented. In particular, the computation of angular variation of the scattering properties (scattering matrix elements, scattering coefficients, single scattering albedo etc.) of particulate matter by using the Mie theory and the T-matrix method was incorporated in the application. Comparison of the results generated by using the web application with other reported benchmark results has shown that the web application is accurate and reliable for electromagnetic scattering computations.

Gogoi, Ankur; Rajkhowa, Pritom; P. Saikia, Gunjan; Ahmed, Gazi A.; Choudhury, Amarjyoti

2014-10-01

351

Terahertz wave opto-mechanical scanner for security application  

NASA Astrophysics Data System (ADS)

This paper describes a new opto-mechanical scanner that is hopeful for terahertz imaging in security applications. The target of using this scanner is portal screening of personnel for high-resolution imaging of concealed threat objects. It is not only applied to active terahertz imaging but also applied to passive Terahertz imaging. Terahertz wave can penetrate many materials that are opaque to visible and infrared light, such as plastics, cardboard, textiles and so on. So the terahertz imaging technology has a potential to be applicable in security inspection at airports, stations and other public place. Now, the most terahertz imaging system works at point to point mechanical scan pattern. The speed of this raster scan is too slow to apply in practical field. 2-D terahertz array detector can be applied to real time imaging. But at present their cost is prohibitively high. Fortunately low cost, high performance, opto-mechanically scanner is able to meet the current requirements. An opto-mechanical scanner should be able to rapidly scan a 2-D image of the scene. It also should have high optical efficiency so that an image system can achieve the required thermal sensitivity with the minimum number of receivers. These ensure that it can easily operate at any wavelength, and be active or passive. The opto-mechanically scanning can meets these requirements and is being developed into a high performance, low-cost prototype system that will meet the future needs for terahertz security.

Deng, Chao; Zheng, Yongju; Zhang, Cunlin

2010-11-01

352

Cyber Security Update Recent Events in the Wild  

E-print Network

Cyber Security Update Recent Events in the Wild and How Can We Prepare? Bob Cowles August, 2011 #12 and tablets · Lab culture ­ ­ Cyber security is not my problem ­ My system is too critical to be scanned · Perform current web application assessment plus incorporate security into application design and test

Wechsler, Risa H.

353

Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services  

Microsoft Academic Search

With the boom of software-as-a-service and social networking, web-based single sign-on (SSO) schemes are being deployed by more and more commercial websites to safeguard many web resources. Despite prior research in formal verification, little has been done to analyze the security quality of SSO schemes that are commercially deployed in the real world. Such an analysis faces unique technical challenges,

Rui Wang; Shuo Chen; XiaoFeng Wang

2012-01-01

354

Preliminary field evaluation of solid state cameras for security applications  

SciTech Connect

Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. The results of these tests as well as a description of the test equipment, test sites, and procedures are presented in this report.

Murray, D.W.

1987-07-01

355

TR-IIS-05-012 An Application-layer Security  

E-print Network

TR-IIS-05-012 An Application-layer Security Control for Real-time Video Streaming Chia-Hui Wang of Information Science, Academia Sinica, Taiwan in 2004. #12;An Application-layer Security Control for Real preserve privacy and commercial values. Thus, it's very important to secure real-time video streaming

Chen, Sheng-Wei

356

Online Geodynamics: interactive web-applications for graduate students in Earth Sciences  

NASA Astrophysics Data System (ADS)

In teaching geosciences classes it is essential to provide students with the possibility of having hands-on experiences, even if sometimes they happen to be only in the virtual world. In the portal created for the Computational Geodynamics Laboratory (http://www.geociencias.unam.mx/geodinamica), we present web-based applications, which will help students to manipulate and visualize not only data but also to understand concepts like mantle convection, plate reconstruction or plate deformation. The "Toolbox" option provides a set of state of the art applications (WebMap, WebPlates, WebFlexure, WebGravity, and WebConvec), in which logged-in users can run on-line various programs, without previous knowledge of advanced programming. WebPlates is used in Plate Tectonics classes, helping students to identify and familiarize themselves with various tectonic plates, different tectonic limits, hotspots, etc. WebFlexure is used to study the mechanical behavior of oceanic plates at trenches. WebConvec comes with four cases, analyzing the thermal and thermo-chemical convection in different conditions. In this way the students can be aware of how variation of various physical parameters can affect the modeling results. The "Models" section presents a collection of dynamic numerical models created in the Computational Geodynamics Laboratory. In this section, the logged-in user can visualize convection and deformation models, tectonic plate reconstructions, or geophysical field data, like geoid, gravity, etc. All these applications are actively used in the Geodynamics classes.

Manea, M.; Manea, V. C.

2009-04-01

357

Intelligent Facial Recognition Systems: Technology advancements for security applications  

SciTech Connect

Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

Beer, C.L.

1993-07-01

358

3D NormalModes Shockwave; A Web Application for Interactive Visualization and Three Dimensional Perc  

NSDL National Science Digital Library

3D Normal Modes is a Web application for interactive visualization and three-dimensional perception of the normal modes of molecular vibration, suitable for undergraduate students in chemistry. The application uses the Macromedia Shockwave plug-in and has been designed and developed especially for the Web. It has a simple graphical user interface and requires a download of only 120 KB, allowing it to be used even with low bandwidth Internet connections. Its performance is comparable to a desktop application.

359

On the Security of PayPerClick and Other Web Advertising Schemes  

E-print Network

of auditability inherent in these schemes. Keywords: Electronic Commerce, Secure Systems, On­line Advertising, Pay­through count for which it should be paid. Consequently, most ad networks include clauses in their service

Pinkas, Benny

360

Web Messaging for Open and Scalable Distributed Sensing Applications  

E-print Network

the Web architecture offers a high degree of interoperability and a low en- try barrier, we propose corner of our lives. Among them, networks of tiny sensors that gather data about the real world ­ called into isolated islands that hardly interact with each other. Web http://houseA.com/ http://building24.com/ http

361

Introduction to the Application of Web-Based Surveys.  

ERIC Educational Resources Information Center

This paper discusses some basic assumptions and issues concerning web-based surveys. Discussion includes: assumptions regarding cost and ease of use; disadvantages of web-based surveys, concerning the inability to compensate for four common errors of survey research: coverage error, sampling error, measurement error and nonresponse error; and

Timmerman, Annemarie

362

WIND: an Interaction Lightweight Programming Model for Geographical Web Applications  

E-print Network

interactions between textual, map and calendar components. We present the core concepts of WIND (event of geographical information avoiding any programmer intervention. In this article, we report on Web Interaction components; it also combines Web Mapping Services, etc.). WIND is fully executable (thanks to the WIND Java

Boyer, Edmond

363

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission  

E-print Network

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National's climate change scenarios. Major results showed that the climate in the future decades in the twenty Security Challenges: Abstract Submission Presentation Title: Projected Drought Severity and Food Security

Miami, University of

364

18 CFR 34.3 - Contents of application for issuance of securities.  

...Contents of application for issuance of securities. 34.3 Section 34.3 Conservation...Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT...FOR AUTHORIZATION OF THE ISSUANCE OF SECURITIES OR THE ASSUMPTION OF LIABILITIES...

2014-04-01

365

18 CFR 34.3 - Contents of application for issuance of securities.  

Code of Federal Regulations, 2011 CFR

...Contents of application for issuance of securities. 34.3 Section 34.3 Conservation...Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT...FOR AUTHORIZATION OF THE ISSUANCE OF SECURITIES OR THE ASSUMPTION OF LIABILITIES...

2011-04-01

366

18 CFR 34.3 - Contents of application for issuance of securities.  

Code of Federal Regulations, 2013 CFR

...Contents of application for issuance of securities. 34.3 Section 34.3 Conservation...Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT...FOR AUTHORIZATION OF THE ISSUANCE OF SECURITIES OR THE ASSUMPTION OF LIABILITIES...

2013-04-01

367

18 CFR 34.3 - Contents of application for issuance of securities.  

Code of Federal Regulations, 2012 CFR

...Contents of application for issuance of securities. 34.3 Section 34.3 Conservation...Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT...FOR AUTHORIZATION OF THE ISSUANCE OF SECURITIES OR THE ASSUMPTION OF LIABILITIES...

2012-04-01

368

18 CFR 34.3 - Contents of application for issuance of securities.  

Code of Federal Regulations, 2010 CFR

...Contents of application for issuance of securities. 34.3 Section 34.3 Conservation...Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT...FOR AUTHORIZATION OF THE ISSUANCE OF SECURITIES OR THE ASSUMPTION OF LIABILITIES...

2010-04-01

369

Migrating graphics applications and tech-niques to the Web introduces techno-  

E-print Network

Migrating graphics applications and tech- niques to the Web introduces techno- logical challenges to improve interoper- ability, defining how hyperlinking works, and defining mechanisms for use in HTML. SVG/TR/2001/ REC-smil-animation-20010904/).SMILcansynchronize Web Graphics Tutorial Migrating computer

Lau, W. H. Nynson

370

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications  

E-print Network

Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Davide properly checked or sanitized the input values prior to their use. Past research on vulnerability analysis of the sanitization process. Thus, whenever a web ap- plication applies some sanitization routine to potentially

Kruegel, Christopher

371

ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications  

E-print Network

ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications@microsoft.com ABSTRACT We empirically analyzed sanitizer use in a shipping web ap- plication with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of which we are aware

Livshits, Ben

372

Intelligent Mining in Image Databases, With Applications to Satellite Imaging and to Web  

E-print Network

Intelligent Mining in Image Databases, With Applications to Satellite Imaging and to Web Search analysis; text in web images; mosaicing satellite images 1 Introduction 1.1 It is necessary to apply data by adding new ideas to the main idea of FFT-based image processing. In this paper, we show how the existing

Kreinovich, Vladik

373

Intelligent Mining in Image Databases, With Applications to Satellite Imaging and to Web  

E-print Network

Intelligent Mining in Image Databases, With Applications to Satellite Imaging and to Web Search analysis; text in web images; mosaicing satellite images 1 Introduction 1.1 It is necessary to apply data by adding new ideas to the main idea of FFT­based image processing. In this paper, we show how the existing

Kreinovich, Vladik

374

Situated Support for Choice of Representation for a Semantic Web Application  

E-print Network

and facilitate the efficient usage of information assets on the Semantic Web [1]. However, a formal, standard. The application is a directory services system, which currently is being moved into the realms of the Semantic Web. 1 Introduction The IT industry is currently changing focus from providing storage, processing

Langseth, Helge

375

Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep  

E-print Network

@acm.org, villemaire.roger@uqam.ca Abstract. BeepBeep is a lightweight runtime monitor for Ajax web ap- plications the server. 1 Introduction and Motivation Asynchronous JavaScript and XML (Ajax) refers to a collection of technologies used to develop rich and interactive web applications. A typical Ajax client runs locally

Villemaire, Roger

376

Applying Mutation Testing to Web Applications Upsorn Praphamontripong and Jeff Offutt  

E-print Network

to the problem of integration testing of web applications by using mutation analysis. New mutation operators are defined, a tool (webMuJava) that implements these operators is presented, and results from a case study Server Pages (JSPs), JavaScripts, Active Server Pages (ASPs), PHP, and AJAX (Asynchronous Java

Offutt, Jeff

377

Internet as Clinical Information System: Application Development Using the World Wide Web  

Microsoft Academic Search

Clinical computing application development at ColumbiaPresbyterian Medical Center has been limited by the lack of a flexible programming environment that supports multiple client user platforms. The World Wide Web offers a potential solution, with its multifunction servers, multiplatform clients, and use of standard protocols for displaying information. The authors are now using the Web, coupled with their own local clinical

James J Cimino; Socrates A Socratous; Paul D Clayton

1995-01-01

378

Frame-buffer on Demand: Applications of Stateless Client Systems in Web-based Learning  

Microsoft Academic Search

The growth of the Internet and the World Wide Web has changed the way people are educated, and distance l earning is amongst the most promising fields of new Web applications built from existing services with supporting infras tructures. In this paper, we introduce a number of new applicatio ns built from Stateless Client Systems to assist the learnin g

Sheng Feng Li; Quentin Stafford-Fraser

1999-01-01

379

Security Technologies for Open Networking Environments (STONE)  

SciTech Connect

Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi-domain scenarios is supported by a set of security engines that represent the core of the Federated Identities Management Server, which is also an extension of the Domain Security Server. The Federated Identity Management server allows users to federate their identities or terminate the federation between the service provider and the identity provider. At the service provider web site, the users are offered a list of identity providers to which they can choose to federate their identities. After users federate their identity, they can perform Single Sign-On protocol in an environment of federated domains. The group security system consists of a number of security technologies under a unified architecture, which supports creation of secure groups and execution of secure group transactions and applications in an open networking environment. The system is based on extensions of the GSAKMP standard for group key distribution and management. The Top layer is the Security Infrastructure with the Security Management and Administration System components and protocols that provide security functions common to all secure network applications The Middle layer is the Secure Group Protocols and Applications layer, consisting of the Policy and Group Key Distribution Server and Web-based (thin) Client. The Bottom layer is the supporting Middleware Security Platform, the cryptographic platform already described above. The group security system is designed to perform the functions necessary to create secure groups and enable secure group applications. Specifically, the system can manage group roles, create and disseminate a group security policy, perform authentication and authorization of users using PKI certificates and Web services security, generate group keys, and recover from compromises. In accordance with the GSAKMP standard, the group security system must perform all the required group life-cycle functions: group definition, group establishment, group maintenance, and group removal. The group security system has been designed to support four roles: The Security Domain Ad

Muftic, Sead

2005-03-31

380

Semantic Access Control in Web Based Communities  

Microsoft Academic Search

Web based social communities are one of the most widely used applications nowadays. Ubiquitous computing and access capabilities leverage the evolution of highly dynamic social communities. Recently, security and privacy concerns within these communities have increased significantly. This paper addresses these challenges by controlling access to community resources exploiting semantic Web technologies. In this regard, a conceptual community framework and

Najeeb Elahi; Mohammad M. R. Chowdhury; Josef Noll

2008-01-01

381

FAFSA on the Web Toolkit.  

ERIC Educational Resources Information Center

The online version of the Free Application for Federal Student Aid (FAFSA) allows students to apply for federal financial aid using the Internet. In many cases, FAFSA on the Web may be used to apply for financial aid from other sources, such as states or schools. Data are secured, so sending an application through the Internet is as safe as

Office of Student Financial Assistance (ED), Washington, DC.

382

Displaying R spatial statistics on Google dynamic maps with web applications created by Rwui  

PubMed Central

Background The R project includes a large variety of packages designed for spatial statistics. Google dynamic maps provide web based access to global maps and satellite imagery. We describe a method for displaying directly the spatial output from an R script on to a Google dynamic map. Methods This is achieved by creating a Java based web application which runs the R script and then displays the results on the dynamic map. In order to make this method easy to implement by those unfamiliar with programming Java based web applications, we have added the method to the options available in the R Web User Interface (Rwui) application. Rwui is an established web application for creating web applications for running R scripts. A feature of Rwui is that all the code for the web application being created is generated automatically so that someone with no knowledge of web programming can make a fully functional web application for running an R script in a matter of minutes. Results Rwui can now be used to create web applications that will display the results from an R script on a Google dynamic map. Results may be displayed as discrete markers and/or as continuous overlays. In addition, users of the web application may select regions of interest on the dynamic map with mouse clicks and the coordinates of the region of interest will automatically be made available for use by the R script. Conclusions This method of displaying R output on dynamic maps is designed to be of use in a number of areas. Firstly it allows statisticians, working in R and developing methods in spatial statistics, to easily visualise the results of applying their methods to real world data. Secondly, it allows researchers who are using R to study health geographics data, to display their results directly onto dynamic maps. Thirdly, by creating a web application for running an R script, a statistician can enable users entirely unfamiliar with R to run R coded statistical analyses of health geographics data. Fourthly, we envisage an educational role for such applications. PMID:22998945

2012-01-01

383

A call control driven MVC programming model for mixing web and call or multimedia applications  

Microsoft Academic Search

With the evolution of internet towards web 2.0 and real time communications and the adoption of IMS by telecommunications service providers, SIP becomes the next major protocol that application developer may want to rely on to develop their latest applications. As SIP specifications stabilize, SIP application server become well understood entities. In fact most application servers, like J2EE, now support

Stphane H. Maes

2007-01-01

384

The Devil is Phishing: Rethinking Web Single Sign-On Systems Security (Extended Abstract)  

E-print Network

websites such as foxnews.com and sears.com directly using an IdP ac- count such as a Gmail or a Facebook Introduction Web Single Sign-On (SSO) systems allow users to sign in multiple relying party (RP) websites using [21], and a few leading IT companies including Google, Facebook, Mi- crosoft, and Yahoo are OpenID Id

Yue, Chuan

385

Security Issues for the Use of Semantic Web in E-Commerce  

Microsoft Academic Search

As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology's integrity and availability. In addition, both suppliers and buyers will use an on- tology to store confidential knowledge pertaining to their preferences or possible substitutions for certain products. Thus, parts of an ontology will need to be kept confidential. We

Andreas Ekelhart; Stefan Fenz; A. Min Tjoa; Edgar R. Weippl

2007-01-01

386

External Insider Threat: A Real Security Challenge in Enterprise Value Webs  

Microsoft Academic Search

Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As the Jericho Forum (an industry consortium of the Open Group) observed, in all these forms of collaboration, the boundaries between organizations become permeable and, as a consequence, insiders and outsiders can no longer be neatly separated using the notion

Virginia N. L. Franqueira; Andr van Cleeff; Pascal van Eck; Roel Wieringa

2010-01-01

387

Passive millimeter-wave imaging for airborne and security applications  

NASA Astrophysics Data System (ADS)

As a result of its relatively short wavelength coupled with relatively high penetration of such things as fog, bad weather and clothing, millimeter-wave imaging provides a powerful tool for both airborne and security type applications. By using a passive approach such as that implemented here, it is possible to image through bad weather or detect concealed weapons and articles all without generating any form of radiation that might either help an enemey or raise health concerns. In this paper we will show imagery from our second generation state-of-the-art unit and discuss the technology involved.

Clark, Stuart E.; Lovberg, John A.; Martin, Christopher A.; Kolinko, Vladimir G.

2003-08-01

388

On the Use of Social Networks in Web Services: Application to the Discovery Stage  

NASA Astrophysics Data System (ADS)

This chapter discusses the use of social networks in Web services with focus on the discovery stage that characterizes the life cycle of these Web services. Other stages in this life cycle include description, publication, invocation, and composition. Web services are software applications that end users or other peers can invoke and compose to satisfy different needs such as hotel booking and car rental. Discovering the relevant Web services is, and continues to be, a major challenge due to the dynamic nature of these Web services. Indeed, Web services appear/disappear or suspend/resume operations without prior notice. Traditional discovery techniques are based on registries such as Universal Description, Discovery and Integration (UDDI) and Electronic Business using eXtensible Markup Language (ebXML). Unfortunately, despite the different improvements that these techniques have been subject to, they still suffer from various limitations that could slow down the acceptance trend of Web services by the IT community. Social networks seem to offer solutions to some of these limitations but raise, at the same time, some issues that are discussed in this chapter. The contributions of this chapter are three: social network definition in the particular context of Web services; mechanisms that support Web services build, use, and maintain their respective social networks; and social networks adoption to discover Web services.

Maamar, Zakaria; Wives, Leandro Krug; Boukadi, Khouloud

389

Computer-aided diagnosis workstation and teleradiology network system for chest diagnosis using the web medical image conference system with a new information security solution  

NASA Astrophysics Data System (ADS)

Diagnostic MDCT imaging requires a considerable number of images to be read. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. Because of such a background, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis. We also have developed the teleradiology network system by using web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. Our teleradiology network system can perform Web medical image conference in the medical institutions of a remote place using the web medical image conference system. We completed the basic proof experiment of the web medical image conference system with information security solution. We can share the screen of web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with the workstation that builds in some diagnostic assistance methods. Biometric face authentication used on site of teleradiology makes "Encryption of file" and "Success in login" effective. Our Privacy and information security technology of information security solution ensures compliance with Japanese regulations. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new teleradiology network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our teleradiology network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaro; Moriyama, Noriyuki

2010-03-01

390

Recent trends in print portals and Web2Print applications  

NASA Astrophysics Data System (ADS)

For quite some time now, the printing business has been under heavy pressure because of overcapacity, dropping prices and the delocalization of the production to low income countries. To survive in this competitive world, printers have to invest in tools that, on one hand, reduce the production costs and, on the other hand, create additional value for their customers (print buyers). The creation of customer portals on top of prepress production systems allowing print buyers to upload their content, approve the uploaded pages based on soft proofs (rendered by the underlying production system) and further follow-up the generation of the printed material, has been illustrative in this respect. These developments resulted in both automation for the printer and added value for the print buyer. Many traditional customer portals assume that the printed products have been identified before they are presented to the print buyer in the portal environment. The products are, in this case, typically entered by the printing organization in a so-called MISi system after the official purchase order has been received from the print buyer. Afterwards, the MIS system then submits the product to the customer portal. Some portals, however, also support the initiation of printed products by the print buyer directly. This workflow creates additional flexibility but also makes things much more complex. We here have to distinguish between special products that are defined ad-hoc by the print buyer and standardized products that are typically selected out of catalogs. Special products are most of the time defined once and the level of detail required in terms of production parameters is quite high. Systems that support such products typically have a built-in estimation module, or, at least, a direct connection to an MIS system that calculates the prices and adds a specific mark-up to calculate a quote. Often, the markup is added by an account manager on a customer by customer basis; in this case, the ordering process is, of course, not fully automated. Standardized products, on the other hand, are easily identified and the cost charged to the print buyer can be retrieved from predefined price lists. Typically, higher volumes will result in more attractive prices. An additional advantage of this type of products is that they are often defined such that they can be produced in bulk using conventional printing techniques. If one wants to automate the ganging, a connection must be established between the on-line ordering and the production planning system. (For digital printing, there typically is no need to gang products since they can be produced more effectively separately.) Many of the on-line print solutions support additional features also available in general purpose e-commerce sites. We here think of the availability of virtual shopping baskets, the connectivity with payment gateways and the support of special facilities for interfacing with courier services (bar codes, connectivity to courier web sites for tracking shipments etc.). Supporting these features also assumes an intimate link with the print production system. Another development that goes beyond the on-line ordering of printed material and the submission of full pages and/or documents, is the interactive, on-line definition of the content itself. Typical applications in this respect are, e.g., the creation of business cards, leaflets, letter heads etc. On a more professional level, we also see that more and more publishing organizations start using on-line publishing platforms to organize their work. These professional platforms can also be connected directly to printing portals and thus enable extra automation. In this paper, we will discuss for each of the different applications presented above (traditional Print Portals, Web2Print applications and professional, on-line publishing platforms) how they interact with prepress and print production systems and how they contribute to the improvement of the overall operations of a printing organization.

Tuijn, Chris

2009-01-01

391

Using service brokers for accessing backend servers for web applications  

E-print Network

Mohapatra Department of Computer Science, Engineering II, One Shields Avenue, University of California. A schematic diagram of a typical Web server environment is shown in Fig. 1. Backend servers can be categorized

California at Davis, University of

392

TermExtractor: a Web Application to Learn the Shared Terminology of Emergent Web Communities  

Microsoft Academic Search

In the Semantic Web era, many techniques have been proposed to capture the explicit knowledge of a virtual community, and represent this knowledge in a structured form often referred to as domain ontology. One of the first steps of the ontology-building task is to collect a vocabulary of domain relevant terms. We designed a high-performing technique to automatically extract the

F. Sclano; P. Velardi

2007-01-01

393

OSP with Jython Web Start application - step-by-step guide  

NSDL National Science Digital Library

A description of how to build Java Web Start applications using the OSP library. Integrates the OpenSourcePhysics .jar library files and the Python classes generated by Jython during compiling time with jythonc.

2008-11-13

394

A Web application to improve emotional awareness in high-functioning autistics  

E-print Network

The web application built here is based on the idea of presenting scenarios to users, using text, and having the users choose likely emotions that match the scenarios. Taken for granted by most neurotypical people, ...

Sonuyi, Temitope O

2006-01-01

395

Dependently Typed Web Client Applications FRP in Agda in HTML5  

E-print Network

Dependently Typed Web Client Applications FRP in Agda in HTML5 Alan Jeffrey Alcatel-Lucent Bell developed a compiler back end, foreign function inter- face, and library bindings for FRP, and for HTML5 [15

Jeffrey, Alan

396

C# - Connecting a Mobile Application to Oracle Server via Web Services  

E-print Network

This article is focused on mobile development using Visual Studio 2005, web services and their connection to Oracle server, willing to help programmers to realize simple and useful mobile applications.

Ilea, Daniela

2009-01-01

397

Code Splitting for Network Bound Web 2.0 Applications Benjamin Livshits  

E-print Network

Ding, University of Rochester Abstract Modern Web 2.0 applications such as Gmail, Live Maps, MySpace without Gmail, Live Maps, RedFin, MySpace, NetFlix, and other similarly ubiquitous appli- cations. All

Livshits, Ben

398

Proportional Delay Differentiation Service in Web Application Servers: A Feedback Control Approach  

Microsoft Academic Search

As more and more business applications become Web-enabled, service differentiation becomes an important issue for database-driven e-commerce Websites to meet different requirements of clients. This paper presents a feedback control approach to provide proportional delay differentiation (PDD) service in Web application servers handling dynamic HTTP requests. To achieve this goal, an approximate linear time-invariant model of the database connection pool

Wenping Pan; Dejun Mu; Hangxing Wu; Qilu Sun

2008-01-01

399

An Implementation of a Secure Web Client Using SPKI/SDSI Certificates  

E-print Network

; Acknowledgments First and foremost, I'd like to thank my entire family for their love and support throughout my of crypto and security, but more than that, he's a great guy! I don't know where I'd be without the help

400

Benchmarking the Security of Web Serving Systems Based on Known Vulnerabilities  

Microsoft Academic Search

This paper proposes a methodology and a tool to evaluate the security risk presented when using software components or systems. The risk is estimated based on known vulnerabilities existing on the software components. An automated tool is used to extract and aggregate information on vulnerabilities reported by users and available on public databases (e.g., OSVDB and NVD). This tool generates

Naaliel Mendes; Joao Duraes; Henrique Madeira

2011-01-01

401

InkTag: Secure Applications on an Untrusted Operating System  

PubMed Central

InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes. PMID:24429939

Hofmann, Owen S.; Kim, Sangman; Dunn, Alan M.; Lee, Michael Z.; Witchel, Emmett

2014-01-01

402

Application of telecom planar lightwave circuits for homeland security sensing  

NASA Astrophysics Data System (ADS)

Over the past decade, a massive effort has been made in the development of planar lightwave circuits (PLCs) for application in optical telecommunications. Major advances have been made, on both the technological and functional performance front. Highly sophisticated software tools that are used to tailor designs to required functional performance support these developments. In addition extensive know-how in the field of packaging, testing, and failure mode and effects analysis (FMEA) has been built up in the struggle for meeting the stringent Telcordia requirements that apply to telecom products. As an example, silica-on-silicon is now a mature technology available at several industrial foundries around the world, where, on the performance front, the arrayed-waveguide grating (AWG) has evolved into an off-the-shelf product. The field of optical chemical-biological (CB) sensors for homeland security application can greatly benefit from the advances as described above. In this paper we discuss the currently available technologies, device concepts, and modeling tools that have emerged from the telecommunications arena and that can effectively be applied to the field of homeland security. Using this profound telecom knowledge base, standard telecom components can readily be tailored for detecting CB agents. Designs for telecom components aim at complete isolation from the environment to exclude impact of environmental parameters on optical performance. For sensing applications, the optical path must be exposed to the measurand, in this area additional development is required beyond what has already been achieved in telecom development. We have tackled this problem, and are now in a position to apply standard telecom components for CB sensing. As an example, the application of an AWG as a refractometer is demonstrated, and its performance evaluated.

Veldhuis, Gert J.; Elders, Job; van Weerden, Harm; Amersfoort, Martin

2004-03-01

403

A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications  

NASA Astrophysics Data System (ADS)

Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frdric; Litzistorf, Grald

404

The Data and Application Security and Privacy (DASPY) Challenge  

E-print Network

for Cyber Security Executive Director and Endowed Chair March 29, 2012 ravi.sandhu@utsa.edu www and Privacy (DASPY) Challenge . Ravi Sandhu Institute for Cyber Security 1 and Endowed Chair March 29, 2012 growing But not securable by academically taught cyber security not studied as a success story The ATM

Sandhu, Ravi

405

Section Course Term Credits Room Day Time 132D ALS4932 Fall 1 WEB WEB WEB  

E-print Network

Section Course Term Credits Room Day Time 132D ALS4932 Fall 1 WEB WEB WEB 1G73 FNR3131C Fall 3 DEGREE APPLICATIONS DUE September 13th CLASSES END December 4th WEB WEB WEB WEB Forest Operations Sager WEB Capinera WEB Turf and Ornamental Entomology Buss WEB Bennet Capinera Lutz STAFF Mac

Watson, Craig A.

406

World Wide WebWWWDeep Web Web Deep Web  

E-print Network

Deep Web Web World Wide WebWWWDeep Web Web Deep Web Deep Web Deep Web Deep Web Deep Web Deep Web Surface Web 21.3% Surface Web Deep Web [2] Deep Web Web Crawler Deep Web 1 Web Deep Web Deep Web Web Web WDB Web 1 WAMDM Technical Report (WAMDM-TR-2006-3) #12; PDF Deep

407

Development of a web application for water resources based on open source software  

NASA Astrophysics Data System (ADS)

This article presents research and development of a prototype web application for water resources using latest advancements in Information and Communication Technologies (ICT), open source software and web GIS. The web application has three web services for: (1) managing, presenting and storing of geospatial data, (2) support of water resources modeling and (3) water resources optimization. The web application is developed using several programming languages (PhP, Ajax, JavaScript, Java), libraries (OpenLayers, JQuery) and open source software components (GeoServer, PostgreSQL, PostGIS). The presented web application has several main advantages: it is available all the time, it is accessible from everywhere, it creates a real time multi-user collaboration platform, the programing languages code and components are interoperable and designed to work in a distributed computer environment, it is flexible for adding additional components and services and, it is scalable depending on the workload. The application was successfully tested on a case study with concurrent multi-users access.

Delipetrev, Blagoj; Jonoski, Andreja; Solomatine, Dimitri P.

2014-01-01

408

WebDeep Web Surface Web  

E-print Network

Web WebWeb WebWeb WebHTML Web WebDeep Web Surface Web " " Deep Web21 Dot-ComWebWeb2.0 WebWeb ""Web WebWeb Deep Web WebWeb SNS Web WebWeb 20017BrightPlanet.comDeep Web Web43,000-96,000Web7,500TB(Surface Web500) UIUCDeep Web2004Deep Web 307,000366,000-535,000 WebDeep Web "" Deep Web 1 Web Web #12

409

Development of a Secure Mobile GPS Tracking and Management System  

ERIC Educational Resources Information Center

With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend.

Liu, Anyi

2012-01-01

410

Web Machines : a new platform for application construction and execution  

E-print Network

In today's world, computer application platforms are becoming increasingly important in providing positive application end-user and developer experiences. While there are many successful application platforms available, ...

Bryant, Robert A., M. Eng. Massachusetts Institute of Technology

2009-01-01

411

Exploring Software Partitions for Fast Security Processing on a Multiprocessor Mobile SoC  

Microsoft Academic Search

The functionality of mobile devices, such as cell phones and personal digital assistants (PDAs), has evolved to include various applications where security is a critical concern (secure web transactions, mobile commerce, download and playback of protected audio\\/video content, connection to corporate private networks, etc.). Security mechanisms (e.g., secure communication protocols) involve cryptographic algorithms, and are often quite computationally intensive, challenging

Divya Arora; Anand Raghunathan; Srivaths Ravi; Murugan Sankaradass; Niraj K. Jha; Srimat T. Chakradhar

2007-01-01

412

17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...  

Code of Federal Regulations, 2011 CFR

17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 ...X-15AA-1, for application for registration as a national securities association or affiliated securities association. 249.801 Section 249.801...

2011-04-01

413

Scaling the Web Composing Web  

E-print Network

Scaling the Web Composing Web Services:A QoS View A n Internet application can invoke several ser- vices -- a stock-trading Web service, for example, could invoke a payment service, which could then invoke an authentication service. Such a scenario is called a composite Web service, and it can

Menascé, Daniel A.

414

Towards a Framework to Measure Security Expertise in Requirements Analysis  

E-print Network

cyber security risks report in 2011 presents many popular attacks against web applications, such as SQL-depth sources of security knowledge, information systems continue to be susceptible to known vulnerabilities systems, and unexpired, outdated passwords [2]. The lack of information system security is unlikely due

Breaux, Travis D.

415

Security Aspects of an Enterprise-Wide Network Architecture.  

ERIC Educational Resources Information Center

Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for

Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan

1999-01-01

416

Adaptation of web pages and images for mobile applications  

NASA Astrophysics Data System (ADS)

In this paper, we introduce our new visualization service which presents web pages and images on arbitrary devices with differing display resolutions. We analyze the layout of a web page and simplify its structure and formatting rules. The small screen of a mobile device is used much better this way. Our new image adaptation service combines several techniques. In a first step, border regions which do not contain relevant semantic content are identified. Cropping is used to remove these regions. Attention objects are identified in a second step. We use face detection, text detection and contrast based saliency maps to identify these objects and combine them into a region of interest. Optionally, the seam carving technique can be used to remove inner parts of an image. Additionally, we have developed a software tool to validate, add, delete, or modify all automatically extracted data. This tool also simulates different mobile devices, so that the user gets a feeling of how an adapted web page will look like. We have performed user studies to evaluate our web and image adaptation approach. Questions regarding software ergonomics, quality of the adapted content, and perceived benefit of the adaptation were asked.

Kopf, Stephan; Guthier, Benjamin; Lemelson, Hendrik; Effelsberg, Wolfgang

2009-02-01

417

Open Access and Semantic Web SW Applications for Open publishing  

Microsoft Academic Search

The Open Access movement, grown since the first Nineties and quickly developed in the last years, aims at enlarging the dissemination of scientific knowledge; based on the assumption that the Internet and the World Wide Web are able to offer the chance to constitute a global and interactive representation of human knowl- edge, including cultural heritage and the guarantee of

Michele Barbera; Francesca Di Donato

418

Environmental security planning : an application to the Longwood Medical Area  

E-print Network

The thesis is a study of the security problems due to street crime in the Longwood Medical Area of Boston. The first part of the thesis defines the theories and practices of environmental security .planning, the urban ...

Garmaise, Miriam Gail

1982-01-01

419

Possible Applications of Distributed, Networked Architectures to Port Security.  

National Technical Information Service (NTIS)

Agenda of the presentation: *Introduction *Basic Questions; *Applying Net-Centric Operations to Port Security; *Adaptation vs. Optimization; *Port Security Modeled as a Complex Network; *Important Complex Network Properties and Considerations; *Applicatio...

D. Garvey, D. A. Jarvis

2004-01-01

420

Security issues in healthcare applications using wireless medical sensor networks: a survey.  

PubMed

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

Kumar, Pardeep; Lee, Hoon-Jae

2012-01-01

421

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey  

PubMed Central

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

Kumar, Pardeep; Lee, Hoon-Jae

2012-01-01

422

Deep Web Web Deep Web Web  

E-print Network

Deep Web 100872 Deep Web Web Deep Web Web Web Deep Web Deep Web TP391 A Uncertain Schema Matching in Deep Web Integration Service JIANG Fang-Jiao MENG Xiao-Feng JIA Lin-Lin (School of Information, Renmin University of China, Beijing, 100872) Abstract: With increasing of Deep Web, providing

423

One Possible Model of Secure e\\/m-Government System  

Microsoft Academic Search

In this article, we describe a possible model of secure e\\/m-government system based on secure JAVA mobile application and SOA-Based e\\/m-government platform. The proposed model consists of additional external entities\\/servers, such as: PKI, XKMS, STS, UDDI and Time Stamping Authority. The main parts of the proposed model are secure JAVA mobile application and secure Web Service implemented on the SOA-based

Milan Markovic; Goran Dordevic

2010-01-01

424

The Data and Application Security and Privacy (DASPY) Challenge  

E-print Network

for Cyber Security Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu www.profsandhu.com www) Challenge . Ravi Sandhu Institute for Cyber Security 1 and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu www by academically taught cyber security not studied as a success story The ATM "Paradox" not studied as a success

Sandhu, Ravi

425

Research on Web Application of Struts Framework Based on MVC Pattern  

Microsoft Academic Search

\\u000a The paper introduces MVC design pattern briefly, then discusses the Struts framework based on J2EE MVC pattern and finally\\u000a gives the development procedure of how to design Web application with Struts framework. From this we can see that software\\u000a framework and component reuse can enhance the efficiency of software development, offer clear responsibilities between Web\\u000a page designers and software developers

Jing-mei Li; Guang-sheng Ma; Gang Feng; Yu-qing Ma

2006-01-01

426

DADOS-Survey: an open-source application for CHERRIES-compliant Web surveys  

Microsoft Academic Search

BACKGROUND: The Internet has been increasingly utilized in biomedical research. From online searching for literature to data sharing, the Internet has emerged as a primary means of research for many physicians and scientists. As a result, Web-based surveys have been employed as an alternative to traditional, paper-based surveys. We describe DADOS-Survey, an open-source Web-survey application developed at our institution that,

Anand Shah; Danny O Jacobs; Henrique Martins; Matthew Harker; Andreia Menezes; Mariana McCready; Ricardo Pietrobon

2006-01-01

427

A system for building clinical research applications using semantic web-based approach.  

PubMed

In this paper we present a system using Semantic Web by which applications can be effectively constructed for clinical research purposes. We are aware of the immense difficulties and variations involved in clinical research applications. With a purpose of mitigating some of these difficulties in the process of developing clinical research applications we are presenting an approach for building information systems based on Semantic Web. We have developed a working prototype using C-Map tools leveraging the underlying principles of Abstract Software Design Framework to convert domain knowledge into machine-actable information. PMID:20703749

Gurupur, Varadraj P; Tanik, Murat M

2012-02-01

428

Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices  

PubMed Central

After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

2014-01-01

429

Security mechanism based on hospital authentication server for secure application of implantable medical devices.  

PubMed

After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

Park, Chang-Seop

2014-01-01

430

The application of clustering to Web search engine tech-nology is a novel approach that offers structure to the  

E-print Network

The application of clustering to Web search engine tech- nology is a novel approach that offers studied in research labs; however, real user searching with clustering systems in operational Web of Vivisimo.com, which is a Web meta-search engine that dynamically clusters users' search results

Jansen, James

431

SecurityFocus  

NSDL National Science Digital Library

This news service from SecurityFocus is an excellent resource to learn about important computer security warnings and alerts. The Web site keeps track of many widely used software applications, while reporting known vulnerabilities as they are found. Viruses and worms are another key topic that receives significant attention. Several columns offer expert advice and tips to efficiently use and understand software for different platforms. Government security is covered in the news section, discussing federal practices and legislation related to the national network infrastructure. Because the articles have such a broad scope, the material can be useful for both home and business users.

1999-01-01

432

A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker  

Microsoft Academic Search

Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper

Ian Goldberg; David Wagner; Randi Thomas; Eric Brewer

1996-01-01

433

An Immunological Model of Distributed Detection and Its Application to Computer Security  

E-print Network

An Immunological Model of Distributed Detection and Its Application to Computer Security By Steven vii #12;#12;An Immunological Model of Distributed Detection and Its Application to Computer Security By Steven Andrew Hofmeyr Doctor of Philosophy Computer Science May 1999 #12;#12;An Immunological Model

Forrest, Stephanie

434

Design and Applications of a Secure and Decentralized Distributed Hash Table  

E-print Network

, creating many fake identities is cheap; (2) an attacker can subvert periodic routing table maintenanceDesign and Applications of a Secure and Decentralized Distributed Hash Table by Christopher T and Applications of a Secure and Decentralized Distributed Hash Table by Christopher T. Lesniewski-Laas Submitted

435

Application-aware Admission Control and Scheduling in Web Servers  

Microsoft Academic Search

This paper presents an architecture and algorithms for optimizing the performance of web services. For a given ser- vice, session-based admission control is combined with stage-wise request queuing, where the stages represent sub-tasks within ses- sions. The scheduling of requests is governed by generalized pro- cessor sharing. We present a performance model, relying on on- line estimation of parameters describing

Jakob Carlstriim; Raphael Rom

2002-01-01

436

31 CFR 354.0 - Applicability; maintenance of Sallie Mae Securities.  

Code of Federal Regulations, 2010 CFR

...Applicability; maintenance of Sallie Mae Securities. 354.0 Section 354.0 Money and Finance: Treasury Regulations Relating...STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) 354.0 Applicability; maintenance of Sallie Mae...

2010-07-01

437

Sujet de stage en NTIC Etude et implmentation d'une application web  

E-print Network

applications web mobiles. Sujet du stage Le sujet vise à développer un logiciel pour Smartphone (Iphone), XCode (Iphone SDK), temps réel embarqué. Les plus : avoir développé une application sur Iphone

Dobigeon, Nicolas

438

A Framework for Cross-platform Mobile Web Applications Using HTML5  

E-print Network

A Framework for Cross-platform Mobile Web Applications Using HTML5 Christos Bouras1,2 , Andreas subsequently in- creases dramatically the corresponding effort. With the emergence of HTML5 these issues can applications and also for the investigation and experimentation on the main features that HTML5 offers

Bouras, Christos

439

A versatile digital video engine for safeguards and security applications  

SciTech Connect

The capture and storage of video images have been major engineering challenges for safeguard and security applications since the video camera provided a method to observe remote operations. The problems of designing reliable video cameras were solved in the early 1980`s with the introduction of the CCD (charged couple device) camera. The first CCD cameras cost in the thousands of dollars but have now been replaced by cameras costing in the hundreds. The remaining problem of storing and viewing video images in both attended and unattended video surveillance systems and remote monitoring systems is being solved by sophisticated digital compression systems. One such system is the PC-104 three card set which is literally a ``video engine`` that can provide power for video storage systems. The use of digital images in surveillance systems makes it possible to develop remote monitoring systems, portable video surveillance units, image review stations, and authenticated camera modules. This paper discusses the video card set and how it can be used in many applications.

Hale, W.R.; Johnson, C.S. [Sandia National Labs., Albuquerque, NM (United States); DeKeyser, P. [Fast Forward Video, Irvine, CA (United States)

1996-08-01

440

Modulated digital images for biometric and other security applications  

NASA Astrophysics Data System (ADS)

There are, in general, two ways for an observer to deal with light that is incorrect in some way (e.g. which is partially out of focus). One approach is to correct the error (e.g. by using a lens to selectively bend the light). Another approach employs selective masking to block those portions of the light which are unwanted (e.g. out of focus). The principle of selective masking is used in a number of important industries. However it has not found widespread application in the field of optical security devices. This work describes the selective masking, or modulation, of digital images as a means of creating documents and transparent media containing overt or covert biometric and other images. In particular, we show how animation effects, flash-illumination features, color-shifting patches, information concealment devices, and biometric portraiture in various settings can be incorporated in transparent media like plastic packaging materials, credit cards, and plastic banknotes. We also demonstrate the application of modulated digital images to the preparation of optically variable diffractive foils which are readily customized to display biometric portraits and information. Selective masking is shown to be an important means of creating a diverse range of effects useful in authentication. Such effects can be readily and inexpensively produced without the need, for example, to fabricate lenses on materials which may not be conducive in this respect.

McCarthy, Lawry D.; Lee, Robert A.; Swiegers, Gerhard F.

2004-06-01

441

Applications of shape analysis to domestic and international security.  

SciTech Connect

The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

2002-01-01

442

Rapid response radiation sensors for homeland security applications  

NASA Astrophysics Data System (ADS)

The National Security Technologies, LLC, Remote Sensing Laboratory is developing a rapid response radiation detection system for homeland security field applications. The intelligence-driven system is deployed only when non-radiological information about the target is verifiable. The survey area is often limited, so the detection range is small; in most cases covering a distance of 10 meters or less suffices. Definitive response is required in no more than 3 seconds and should minimize false negative alarms, but can err on the side of positive false alarms. The detection system is rapidly reconfigurable in terms of size, shape, and outer appearance; it is a plug-and-play system. Multiple radiation detection components (viz., two or more sodium iodide scintillators) are used to independently "over-determine" the existence of the threat object. Rapid response electronic dose rate meters are also included in the equipment suite. Carefully studied threat signatures are the basis of the decision making. The use of Rad-Detect predictive modeling provides information on the nature of the threat object. Rad-Detect provides accurate dose rate from heavily shielded large sources; for example those lost in Mexico were Category 1 radiation sources (~3,000 Ci of 60Co), the most dangerous of five categories defined by the International Atomic Energy Agency. Taken out of their shielding containers, Category 1 sources can kill anyone who is exposed to them at close range for a few minutes to an hour. Whenever possible sub-second data acquisition will be attempted, and, when deployed, the system will be characterized for false alarm rates. Although the radiation detection materials selected are fast (viz., faster scintillators), their speed is secondary to sensitivity, which is of primary importance. Results from these efforts will be discussed and demonstrated.

Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul

2014-09-01

443

The Bioverse API and Web Application Michal Guerquin, Jason McDermott, Zach Frazier, and Ram Samudrala  

E-print Network

Chapter 22 The Bioverse API and Web Application Michal Guerquin, Jason McDermott, Zach Frazier.1007/978-1-59745-243-4_22 511 #12;an Application Programming Interface (API) that allows specific queries to be issued against the database and a web application that utilises the API to present the data in a browser to Internet users

Samudrala, Ram

444

Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Application  

E-print Network

Using Entrez Utilities Web Service with Apache Axis2 for Java Creating a Web Service Client Entrez Utilities Web Service using Axis2 for Java. Preinstalled Software You should have Apache Axis2.sh shell script file on Linux) in the bin directory of Axis2 installation. You will use it to generate Web

Levin, Judith G.

445

Designing and developing portable large-scale JavaScript web applications within the Experiment Dashboard framework  

E-print Network

Improvements in web browser performance and web standards compliance, as well as the availability of comprehensive JavaScript libraries, provides an opportunity to develop functionally rich yet intuitive web applications that allow users to access, render and analyse data in novel ways. However, the development of such large-scale JavaScript web applications presents new challenges, in particular with regard to code sustainability and team-based work. We present an approach that meets the challenges of large-scale JavaScript web application design and development, including client-side model-view-controller architecture, design patterns, and JavaScript libraries. Furthermore, we show how the approach leads naturally to the encapsulation of the data source as a web API, allowing applications to be easily ported to new data sources. The Experiment Dashboard framework is used for the development of applications for monitoring the distributed computing activities of virtual organisations on the Worldwide LHC Comp...

Andreeva, J; Karavakis, E; Kokoszkiewicz, L; Nowotka, M; Saiz, P; Tuckett, D

2012-01-01

446

A Web Service Infrastructure and its Application for Distributed Chemical Equilibrium Computation  

NSDL National Science Digital Library

W3C standardized Web Services are becoming an increasingly popular middleware technology used to facilitate the open exchange of data and perform distributed computation. In this paper we propose a modern alternative to commonly used software applications such as STANJAN and NASA CEA for performing chemical equilibrium analysis in a platform-independent manner in combustion, heat transfer, and fluid dynamics research. Our approach is based on the next generation style of computational software development that relies on loosely-coupled network accessible software components called Web Services. While several projects in existence use Web Services to wrap existing commercial and open-source tools to mine thermodynamic data, no Web Service infrastructure has yet been developed to provide the thermal science community with a collection of publicly accessible remote functions for performing complex computations involving reacting flows. This work represents the first effort to provide such an infrastructure where we have developed a remotely accessible software service that allows developers of thermodynamics and combustion software to perform complex, multiphase chemical equilibrium computation with relative ease. Coupled with the data service that we have already built, we show how the use of this service can be integrated into any numerical application and invoked within commonly used commercial applications such as Microsoft Excel and MATLAB® for use in computational work. A rich internet application (RIA) is presented in this work to demonstrate some of the features of these newly created Web Services.

Bhattacharjee, Subrata; Paolini, Christopher P.; Patterson, Mark

447

Social Applications: Exploring A More Secure Framework Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, Gorrell Cheek  

E-print Network

.lipford, mshehab, gcheek} @ uncc.edu ABSTRACT Online social network sites, such as MySpace, Facebook and others, Social Networking Applications, Web 2.0 1. INTRODUCTION Online social network sites such as Facebook, MySpace

Shehab, Mohamed

448

Application of the JDL data fusion process model for cyber security  

NASA Astrophysics Data System (ADS)

A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

Giacobe, Nicklaus A.

2010-04-01

449

Skyalert: A Web Application to Manage Astronomical Transients  

NASA Astrophysics Data System (ADS)

Skyalert.org is a web-based management system for collecting and disseminating observations about time-critical astronomical transients, and for adding annotations and intelligent machine-learning to those observations. The information is "pushed to subscribers, who may be either humans (email, text message etc) or they may be machines that control telescopes. Subscribers can prepare precise "trigger rules to decide which events should reach them and their robots, rules that may be based on sky position, or on the specific vocabulary of parameters that define a particular type of event. Each event has its own web page updated immediately when new information comes, with long-lived URLs and wiki capability. The subscriber has an account on the web, and builds the trigger-rules and watch-lists there, defining decision criteria about future events. As soon as the transient event is seen and causes trigger, a message can be pushed to the subscriber, email, IM, text-message, etc. Annotations can be fetched automatically and immediately from the archives, such as SDSS, DSS, NED, Simbad, or other Virtual Observatory resources. Other actions upon event arrival include immediate running of data mining or classification modules, based on the event and past data. Skyalert can also drive robotic telescopes through the HTN and dc3.org schedulers; it can evaluate joint trigger rules such as "magnitude difference from SDSS". Skyalert is a component system allowing pluggable custom data mining modules, distributed intelligence, and a central point of information for each transient. Our twin thrusts are automation of process, and discrimination of interesting events.

Graham, Matthew; Williams, R. D.; Djorgovski, S. D.; Drake, A. J.; Mahabal, A.

2009-05-01

450

Managing Web Data Managing Web Data  

E-print Network

Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

Davulcu, Hasan

451

Defense and homeland security applications of multi-agent simulations  

Microsoft Academic Search

Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to exam- ine national security issues. This paper summarizes three MAS national security studies conducted at the Naval Post- graduate School. The first example explores equipment and employment options for protecting critical infrastructure. The second case considers non-lethal weapons within the spectrum of force-protection options in a

Thomas W. Lucas; Susan M. Sanchez; Felix Martinez; Lisa R. Sickinger; Jonathan W. Roginski

2007-01-01

452

Defense and homeland security applications of multi-agent simulations  

Microsoft Academic Search

Department of defense and homeland security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS national security studies conducted at the Naval Postgraduate School. The first example explores equipment and employment options for protecting critical infrastructure. The second case considers non-lethal weapons within the spectrum of force-protection options in a maritime environment.

Thomas W. Lucas; Susan M. Sanchez; Felix Martinez; Lisa R. Sickinger; J. W. Roginski

2007-01-01

453

Secure authentication protocol for Internet applications over CATV network  

NASA Astrophysics Data System (ADS)

An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

Chin, Le-Pond

1998-02-01

454

Security  

ERIC Educational Resources Information Center

Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content

Technology & Learning, 2008

2008-01-01

455

76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...  

Federal Register 2010, 2011, 2012, 2013

...1974; Department of Homeland Security/ALL--032 Official Passport Application and...Department of Homeland Security/ ALL--032 Official Passport Application and...Washington, DC 20528. Instructions: All submissions received must include the...

2011-02-15

456

WebCIS: large scale deployment of a Web-based clinical information system.  

PubMed

WebCIS is a Web-based clinical information system. It sits atop the existing Columbia University clinical information system architecture, which includes a clinical repository, the Medical Entities Dictionary, an HL7 interface engine, and an Arden Syntax based clinical event monitor. WebCIS security features include authentication with secure tokens, authorization maintained in an LDAP server, SSL encryption, permanent audit logs, and application time outs. WebCIS is currently used by 810 physicians at the Columbia-Presbyterian center of New York Presbyterian Healthcare to review and enter data into the electronic medical record. Current deployment challenges include maintaining adequate database performance despite complex queries, replacing large numbers of computers that cannot run modern Web browsers, and training users that have never logged onto the Web. Although the raised expectations and higher goals have increased deployment costs, the end result is a far more functional, far more available system. PMID:10566471

Hripcsak, G; Cimino, J J; Sengupta, S

1999-01-01

457

An Environment for Web-based Interaction and Steering of High-Performance Scientific Applications  

Microsoft Academic Search

This paper presents an environment for Web-based interrogation, interaction and steering of high-performance parallel\\/distributed scientific applications. The architecture is composed of detachable thin-clients at the front-end, a netwo rk of Java interaction servers in the middle, and (a control network of sensors, actuators, interaction agents, and an application interaction proxy, superimposed on the application data-network, at the back-end. A key

Samian Kaur; Rajeev Muralidhar; Manish Parashar

2000-01-01

458

An Architecture for Web-Based Interaction and Steering of Adaptive Parallel\\/Distributed Applications  

Microsoft Academic Search

This paper presents an environment for Web-based interaction and steering of adaptive parallel\\/distributed scientific applications. The architecture is composed of detachable thin-clients at the front-end, a network of Java interaction servers i n the middle, and a control network of sensors, actuators, interaction agents, and an application interaction proxy, superimposed on the application data-network, at the back-end. There are three

Rajeev Muralidhar; Samian Kaur; Manish Parashar

2000-01-01

459

Advanced applications to security of IR smart microbolometers  

NASA Astrophysics Data System (ADS)

Advanced IR emitters and sensors are under development for high detection probability, low false alarm rate and identification capability of toxic gases. One of the most reliable technique to identify the gas species is Spectroscopy, especially in the infrared spectral range, where most of existing toxic compounds exhibit their stronger roto-vibrational absorption bands. Following the results obtained from simulations and analysis of expected absorption spectra, a compact non dispersive infrared multi-spectral system has been designed and developed for security applications. It utilizes a few square millimeters thermal source, a novel design multipass cell, and a smart architecture microbolometric sensor array coupled to a linear variable spectral filter to perform toxic gases detection and identification. This is done by means of differential absorption spectroscopic measurements in the spectral range of the LWIR (Long Wavelength Infrared) spectral region. Preliminary tests for sensitivity and selectivity are undergoing using mixtures of ammonia and ethylene. Detection capability down to tens of ppm has been demonstrated. Possible improvements owing to open path sensor or hollow-fiber based sensor implementation are also presented for future systems evolution.

Corsi, C.; Liberatore, N.; Mengali, S.; Mercuri, A.; Viola, R.; Zintu, D.

2007-10-01

460

Application of wireless sensor system on security network  

NASA Astrophysics Data System (ADS)

In this research we developed wireless sensor system for security application. We have used geophone to detect seismic signals which are generated by footsteps. Geophones are resonant devices. Therefore, vibration on the land can generate seismic waveforms which could be very similar to the signature by footstep. The signals from human footstep have weak signals to noise ratio and the signal strength is subject to the distance between the sensor and human. In order to detect weak signals from footstep, we designed and fabricated 2-stage amplification circuit which consists of active and RC filters and amplifiers. The bandwidth of filter is 0.7Hz-150Hz and the gain of amplifier is set to 1000. The wireless sensor system also developed to monitor the sensing signals at the remote place. The wireless sensor system consists of 3 units; a wireless sensor unit, a wireless receiver unit, and a monitoring unit. The wireless sensor unit transmits amplified signals from geophone with Zigbee, and the wireless receiver unit which has both Zigbee and Wi-Fi module receives signals from the sensor unit and transmits signals to the monitoring system with Zigbee and Wi-Fi, respectively. By using both Zigbee and Wi-Fi, the wireless sensor system can achieve the low power consumption and wide range coverage.

Oh, Sechang; Kwon, Hyeokjun; Yoon, Hargsoon; Varadan, Vijay K.

2010-04-01

461

Filtergraph: A Flexible Web Application for Instant Data Visualization of Astronomy Datasets  

NASA Astrophysics Data System (ADS)

Filtergraph is a web application being developed by the Vanderbilt Initiative in Data-intensive Astrophysics (VIDA) to flexibly handle a large variety of astronomy datasets. While current datasets at Vanderbilt are being used to search for eclipsing binaries and extrasolar planets, this system can be easily reconfigured for a wide variety of data sources. The user loads a flat-file dataset into Filtergraph which instantly generates an interactive data portal that can be easily shared with others. From this portal, the user can immediately generate scatter plots, histograms, and tables based on the dataset. Key features of the portal include the ability to filter the data in real time through user-specified criteria, the ability to select data by dragging on the screen, and the ability to perform arithmetic operations on the data in real time. The application is being optimized for speed in the context of very large datasets: for instance, plot generated from a stellar database of 3.1 million entries render in less than 2 seconds on a standard web server platform. This web application has been created using the Web2py web framework based on the Python programming language.

Burger, D.; Stassun, K. G.; Pepper, J. A.; Siverd, R. J.; Paegert, M. A.; De Lee, N. M.

2013-10-01

462

Hidden object detection: security applications of terahertz technology  

Microsoft Academic Search

Recent events have led to dramatic changes to the methods employed in security screening. For example, following the failed shoe bombing, it is now common for shoes to be removed and X-rayed at airport checkpoints. There is therefore an increasing focus on new technologies that can be applied to security screening, either to simplify or speed up the checking process,

William R. Tribe; David A. Newnham; Philip F. Taday; Michael C. Kemp

463

Verifying Search Results Over Web Collections  

E-print Network

Searching accounts for one of the most frequently performed computations over the Internet as well as one of the most important applications of outsourced computing, producing results that critically affect users' decision-making behaviors. As such, verifying the integrity of Internet-based searches over vast amounts of web contents is essential. We provide the first solution to this general security problem. We introduce the concept of an authenticated web crawler and present the design and prototype implementation of this new concept. An authenticated web crawler is a trusted program that computes a special "signature" $s$ of a collection of web contents it visits. Subject to this signature, web searches can be verified to be correct with respect to the integrity of their produced results. This signature also allows the verification of complicated queries on web pages, such as conjunctive keyword searches. In our solution, along with the web pages that satisfy any given search query, the search engine also ...

Goodrich, Michael T; Ohrimenko, Olga; Papamanthou, Charalampos; Tamassia, Roberto; Triandopoulos, Nikos; Lopes, Cristina Videira

2012-01-01

464

Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms  

NASA Astrophysics Data System (ADS)

The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

Fathirad, Iraj; Devlin, John; Jiang, Frank

2012-09-01

465

Prototype application for web 3D routing in building  

NASA Astrophysics Data System (ADS)

Current routing systems in GIS software mostly provide routes that allow the users to navigate between source and destination points in 2 dimensions. This paper describes the development of a web-based 3D routing system for a university campus using Open Source Software (OSS) and Open Specifications (OS). The system uses the advantages of interoperability and allows the integration and extension of different system components. A data model is described and the process of creating the data model and the migration of the data stored in dxf architectural drawings to the data model are explained. The paper also discusses the architecture and the interaction of the different prototype components such as 3D viewer, database, and programming languages. Furthermore, it describes customized tools that were developed to provide the users a simple interface to interact with the system through a standard internet browser.

Ehlers, Manfred; Hijazi, Ihab

2010-11-01

466

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2008; 1:375388  

E-print Network

John Wiley & Sons, Ltd. #12;typical example of a mobile health or m-health application is the ubiquitous delivery of medical data and implementations of mobile Electronic Health Records (EHR), accessible of secure web based m-health services utilizing XML based security models Demosthenes Vouyioukas*,y , George

Vouyioukas, Demosthenes

467

NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications  

NASA Technical Reports Server (NTRS)

The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.

Tompkins, F. G.

1984-01-01

468

Security Challenges for User-Oriented RFID Applications within the `Internet of Things'  

E-print Network

Security Challenges for User-Oriented RFID Applications within the `Internet of Things' G.P. HANCKE to be an important building block of the `Internet of Things' and examine how RFID, assisted by the deployment of NFC will need to address. Keywords: RFID, NFC, security, `Internet of Things', user-oriented architecture 1

Hancke, Gerhard

469

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission  

E-print Network

of climate change on human health and security. In this study, we contribute to these efforts and the growingNOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission Poster Presentation Title: Measuring El Niño and Climate Impacts

Miami, University of

470

NOAA, 2012 Climate Prediction Applications Science Workshop, Climate Services for National Security Challenges: Abstract Submission  

E-print Network

NOAA, 2012 Climate Prediction Applications Science Workshop, Climate Services for National Security Nations Framework Convention on Climate Change (UNFCCC) the nations of the world have pledged to limit for Understanding and Creating a Secure Future Presenter: Andrew P. Jones, Climate Interactive, Co-Director, 8

Miami, University of

471

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission  

E-print Network

and Climate Change Projections: Assessing National Security Implications and Impacts on Water and Natural. In its 2007 publication "National Security and the Threat of Climate Change," the CNA CorporationNOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National

Miami, University of

472

NOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National Security Challenges: Abstract Submission  

E-print Network

economic and global security implications of different climate change scenarios. A changing climate that are trained and equipped to serve as decisionmakers on issues of national and global security in a changingNOAA, 2012 Climate Prediction Applications Science Workshop (CPASW), Climate Services for National

Miami, University of

473

Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems  

E-print Network

Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David enabling the flexibility and independence of a multi-market environment. We propose Meteor as a security- plication (Meteorite) to demonstrate the technical feasibility of our proposal. The Meteor approach provides

Van Oorschot, Paul

474

Educators' Perceived Importance of Web 2.0 Technology Applications  

ERIC Educational Resources Information Center

This research study was designed to examine the degree of perceived importance of interactive technology applications among various groups of certified educators; the degree to which education professionals utilized interactive online technology applications and to determine if there was a significant difference between the different groups based

Pritchett, Christal C.; Wohleb, Elisha C.; Pritchett, Christopher G.

2013-01-01

475

Causes of Failure in Web Applications Soila Pertet and Priya Narasimhan  

E-print Network

: a single hour of downtime could cost a retailer thousands of dollars in lost sales. For example, during an estimated $25,000 per minute of downtime [1]. The true costs of downtime are much higher: lost, and lost employee productivity [2]. This report investigates the causes of failure in Web applications

476

FUSION FRAMES AND THEORETICAL APPLICATIONS: FOR THE FUSION FRAME WEB PAGE  

E-print Network

FUSION FRAMES AND THEORETICAL APPLICATIONS: FOR THE FUSION FRAME WEB PAGE PETER G. CASAZZA The deepest and most difficult question in Fusion Frame Theory is the construction of fusion frames with added that they do not show how to construct the frames. Recently, Casazza and Fickus [4] have developed a Fusion

Casazza, Pete

477

A Computational Intelligence Application for Environmental Measurements by a DSP-Based Smart Web-Sensor  

Microsoft Academic Search

In this paper the authors propose an intelligent and stand-alone measurement instrument for environmental monitoring and control applications. By an embedded computational intelligence technique, the instrument can acquire and test data according to available information. The projected system consists in a smart Web-sensor sensing the electromagnetic field exposure levels. The sensor equipment includes an isotropic magnetic field transducer, a GPRS

C. De Capua; Antonino Battaglia; Annalisa Liccardo; R. Morello

2006-01-01

478

Applying Concept Analysis to User-Session-Based Testing of Web Applications  

E-print Network

, Member, IEEE Computer Society, Sara Sprenkle, Emily Gibson, Lori Pollock, Member, IEEE Computer Society, consumers, and the government has created a great demand for reliable Web applications. One promising domain is becoming critical. Low reliability can result in serious detrimental effects for businesses

Sampath, Sreedevi

479

Development and application of a web-based programming learning system with LED display kits  

Microsoft Academic Search

This paper describes a new programming learning system. It consists of a Web-based flowchart application and Light Emitting Diode (LED) display kits. The LED kits produce various animations or static images according to a flow chart. The flowchart tool allows students to manipulate program elements through a Graphical User Interface (GUI). Survey results show that the proposed system makes learning

Seok-Ju Chun; Jungwoo Ryoo

2010-01-01

480

Structuring Integrated Web Applications for Fault Tolerance Alexander Romanovsky, Panos Periorellis Avelino F. Zorzo  

E-print Network

Structuring Integrated Web Applications for Fault Tolerance Alexander Romanovsky, Panos Periorellis in such a way that each operation on legacy components is transformed into an atomic action with a well their fault tolerance. 1. Introduction Many researchers and practitioners realise that, to build complex fault

Newcastle upon Tyne, University of

481

On Structuring Integrated Web Applications for Fault Tolerance Alexander Romanovsky, Panos Periorellis, Avelino F. Zorzo  

E-print Network

1 On Structuring Integrated Web Applications for Fault Tolerance Alexander Romanovsky, Panos is transformed into an atomic action with a well-defined interface. To accommodate a combined use of several of a wide range, as well as for providing their fault tolerance in a disciplined fashion. 1. Introduction

Newcastle upon Tyne, University of

482

Application and Test of Web-based Adaptive Polyhedral Conjoint Analysis John R. Hauser  

E-print Network

Application and Test of Web-based Adaptive Polyhedral Conjoint Analysis by Ely Dahan John R. Hauser and Management Science, E56-323, Sloan School of Management, Massachusetts Institute of Technology, 38 Memorial of Marketing and Management Science, E56-314, Sloan School of Management, Massachusetts Institute of Technology

Gabrieli, John

483

NeoGeography and Web 2.0: concepts, tools and applications  

Microsoft Academic Search

In this article, we explore the concepts and applications of Web 2.0 through the new media of NeoGeography and its impact on how we collect, interact and search for spatial information. We argue that location and space are becoming increasingly important in the information technology revolution. To this end, we present a series of software tools which we have designed

Andrew Hudson-Smith; Andrew Crooks; Maurizio Gibin; Richard Milton; Michael Batty

2009-01-01

484

Heterogeneous Data Source Access in Web Applications Using Intelligent Mobile Agents  

Microsoft Academic Search

In this paper we provide solution to improve the heterogeneous data source access in web application using the emerging intelligent mobile agent technology. Intelligent Mobile agents are the basis of an emerging technology that promises to make it very much easier to design, implement, and maintain network system. We found that mobile agents reduce network traffic, provide an effective mans

A. Martin; J. Madhusudhanan; P. SivaKumar; V. Jothi PremSanker

2007-01-01

485

Programming by a sample: rapidly creating web applications with d.mix  

Microsoft Academic Search

Source-code examples of APIs enable developers to quickly gain a gestalt understanding of a library's functionality, and they support organically creating applications by incre- mentally modifying a functional starting point. As an increasing number of web sites provide APIs, significant latent value lies in connecting the complementary repre- sentations between site and service in essence, enabling sites themselves to

Bjrn Hartmann; Leslie Wu; Kevin Collins; Scott R. Klemmer

2007-01-01

486

An Abstract Model for Testing MVC and Workflow Based Web Applications  

Microsoft Academic Search

In this paper, we examine the classes of faults found in web applications that use development frameworks based on the MVC design pattern and the workflow paradigm. Our findings reveal opportunities to adapt state-based and code-based testing methodologies to test these faults. To support our proposed testing methodology, we propose an abstract workflow graph model and show, using an example,

Marcel Karam; Walid Keirouz; Rafic Hage

2006-01-01

487

FoodFit: A Web Application to Illustrate Healthier Food and Physical Activity Choices  

E-print Network

FoodFit: A Web Application to Illustrate Healthier Food and Physical Activity Choices Meriyan Eren their lifestyles to include healthier food choices and more frequent physical activities. Lack of motivation your diet with physical activities - Familiar nutrition facts label, colorful bar plots and face

Toronto, University of

488

OpenCV WebCam Applications in an Arduino-based Rover  

E-print Network

OpenCV WebCam Applications in an Arduino-based Rover Valeria Loscr�i1 , Nathalie Mitton1 , Emilio Arduino-based Rovers with characteristics of re-programmability, modularity in terms of type and number them. In this paper, we build an Arduino-based platform, that presents some im- portant characteristics

Boyer, Edmond

489

Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domain Applications  

E-print Network

Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domain Applications Amelie about them. We propose a semantic-based approach to automatically combine, enrich and reason about M2M of a semantic-based approach to automatically enrich M2M data in section II. In section III, we present

Gesbert, David

490

Server Interface Descriptions for Automated Testing of JavaScript Web Applications  

E-print Network

. With this so-called Ajax style of structuring web applications, the server mostly acts as a central database seen from the client's point of view. The server interface comprises a collection of operations function goto_page(id, q) { 2 jQuery.ajax(GET_PAGE_URL + '?page=' + id + 3 '&query=' + q, 4 {'data

Su, Zhendong

491

Using Web2.0 Applications to Close the Digital Divide in Western Australia  

ERIC Educational Resources Information Center

The research reported in this paper documents the use of Web2.0 applications with six Western Australian schools that are considered to be regional and/or remote. With a population of two million people within an area of 2,525,500 square kilometres Western Australia has a number of towns that are classified as regional and remote. Each of the

Trinidad, Sue; Broadley, Tania

2008-01-01

492

Designing iCanFit: A Mobile-Enabled Web Application to Promote Physical Activity for Older Cancer Survivors  

PubMed Central

Background Most older cancer survivors (OCS) do not engage in regular physical activity (PA) despite well-known health benefits. With the increased use of mobile technologies among older adults, mobile tools may be an effective method to deliver PA promotion programs for OCS. Objective To document the process of designing an OCS-friendly mobile-enabled Web application of PA promotion program. Methods Mixed methods encompassing group discussions, individual interviews, and brief surveys with community leaders, OCS, cancer care providers, and software professionals were used in this formative research. Results The varied stakeholders welcomed the idea of developing an online tool to promote PA in OCS. Our formative research revealed several major barriers to regular PA including limited access to senior-friendly PA resources, lack of motivation and social support, and insufficient knowledge and skills on building safe and appropriate workout plans. This feedback was incorporated into the development of iCanFit, a mobile-enabled Web application, designed specifically for OCS. The iCanFit online tools allow users to locate PA resources, set and track goals for PA, network with peer OCS in a secure online space, and receive practical and evidence-informed healthy tips. Conclusions Our mixed-method formative research led to the design of iCanFit protocol to promote PA and well-being of OCS. The involvement of stakeholders is critical in the planning and design of the mobile application in order to enhance program relevance, appeal, and match with the needs of target users. PMID:23612053

Dahlke, Deborah Vollmer; Ory, Marcia; Hochhalter, Angela; Reynolds, Jana; Purcell, Ninfa Pena; Talwar, Divya; Eugene, Nola

2013-01-01

493

Secure electronic commerce communication system based on CA  

NASA Astrophysics Data System (ADS)

In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

Chen, Deyun; Zhang, Junfeng; Pei, Shujun

2001-07-01

494

Microholographic computer generated holograms for security applications: Microtags  

SciTech Connect

We have developed a method for encoding phase and amplitude in microscopic computer-generated holograms (microtags) for security applications. Eight-by-eight-cell and 12 x 12-cell phase-only and phase-and-amplitude microtag designs has been exposed in photoresist using the extreme-ultraviolet (13.4 nm) lithography (EUVL) tool developed at Sandia National Laboratories. Using EUVL, we have also fabricated microtags consisting of 150-nm lines arranged to form 300-nm-period gratings. The microtags described in this report were designed for readout at 632.8 nm and 442 nm. The smallest microtag measures 56 {mu}m x 80 {mu}m when viewed at normal incidence. The largest microtag measures 80 by 160 microns and contains features 0.2 {mu}m wide. The microtag design process uses a modified iterative Fourier-transform algorithm to create either phase-only or phase-and-amplitude microtags. We also report on a simple and compact readout system for recording the diffraction pattern formed by a microtag. The measured diffraction patterns agree very well with predictions. We present the results of a rigorous coupled-wave analysis (RCWA) of microtags. Microtags are CD modeled as consisting of sub-wavelength gratings of a trapezoidal profile. Transverse-electric (TE) and TM readout polarizations are modeled. The objective of our analysis is the determination of optimal microtag-grating design parameter values and tolerances on those parameters. The parameters are grating wall-slope angle, grating duty cycle, grating depth, and metal-coating thickness. Optimal microtag-grating parameter values result in maximum diffraction efficiency. Maximum diffraction efficiency is calculated at 16% for microtag gratings in air and 12% for microtag gratings underneath a protective dielectric coating, within fabrication constraints. TM-microtag gratings. Finally, we suggest several additional microtag concepts, such as two-dimensional microtags and pixel-code microtags.

Sweatt, W.C.; Warren, M.E.; Kravitz, S.H. [and others

1998-01-01

495

Secure positioning of wireless devices with application to sensor networks  

E-print Network

information in order to cheat on their locations. Malicious attackers can modify the measured positions present a security and performance analysis of SPINE through simulations. The organization of the rest

Capkun, Srdjan

496

A Provably Secure NybergRueppel Signature Variant with Applications  

E-print Network

secure, self­certified, identity­based scheme (SCID). SCID schemes combine some of the best features to change identifier strings) and ID­based ones (lower bandwidth requirements). The new SCID scheme matches

497

A Provably Secure Nyberg-Rueppel Signature Variant with Applications  

E-print Network

of a provably secure, self-certified, identity-based scheme (SCID). SCID schemes combine some of the best the need to change identifier strings) and ID-based ones (lower bandwidth requirements). The new SCID

Amir, Yair

498

Reviews of computing technology: Securing network applications, Kerberos and RSA  

SciTech Connect

This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

Johnson, S.M.

1992-06-01

499

3D Molecular Symmetry Shockwave; A Web Application for Interactive Visualization  

NSDL National Science Digital Library

3D Molecular Symmetry Shockwave is a Web-based application for interactive visualization and three-dimensional perception of molecular symmetry. The user interface is simple, and students learn how to use the program from the built-in help screens. The animation uses the Macromedia Shockwave browser plug-in, and requires a download of only 256 KB, allowing it to be used even with low bandwidth Internet connections. Its performance is comparable to a desktop application.

500

Web-based interactive visualization in a Grid-enabled neuroimaging application using HTML5.  

PubMed

Interactive visualization and correction of intermediate results are required in many medical image analysis pipelines. To allow certain interaction in the remote execution of compute- and data-intensive applications, new features of HTML5 are used. They allow for transparent integration of user interaction into Grid- or Cloud-enabled scientific workflows. Both 2D and 3D visualization and data manipulation can be performed through a scientific gateway without the need to install specific software or web browser plugins. The possibilities of web-based visualization are presented along the FreeSurfer-pipeline, a popular compute- and data-intensive software tool for quantitative neuroimaging. PMID:22942008

Siewert, Ren; Specovius, Svenja; Wu, Jie; Krefting, Dagmar

2012-01-01