{"title":"A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory","authors":"I. Józwiak, A. Liber, K. Marczak","doi":"10.1109/ICCGI.2007.2","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.2","url":null,"abstract":"Software piracy is the illegal reproduction and distribution of software applications, whether for business or personal use. Globally, businesses and consumers will spend $300 billion on PC software over the next four years, according to International Data Corporation (IDC) estimates. Given the current market growth by country and current country-level piracy rates, during the same four-year period, we can expect almost $200 billion worth of PC software to be pirated. Protecting application against not authorized copying using program solutions is impossible. If there is a possibility to start program, there is also a possibility to crack it. Cracking means that application can be used without being registered or to the application there is a mechanism added which enables to obviate implemented there protections (for example: generator of serials codes). The device protection of software (dongles) has existed on the market for many years and it has functioned as devices protecting the software against not authorized copying and usage. For the application to work without device's key, the intruder has to modify it or emulate the presence of device's key. The dissertation presents tools and techniques used to break devices' protection of software with memory. The issue of software protection against not authorized copying, using devices' solutions is not a popular subject of scientific publications. The dissertations provides information about the applied methods and techniques of breaking the hypothetical construction of device's protection used the constructed electronic devices. The research is the introduction to designing the hardware protection of programmes resistant to well-known methods of breaking through safety of electronic devices' keys.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Pentikousis, R. Aguero, R. Giaffreda, A. Galis, E. Hepworth
{"title":"Information Management for Dynamic Networks","authors":"K. Pentikousis, R. Aguero, R. Giaffreda, A. Galis, E. Hepworth","doi":"10.1109/ICCGI.2007.28","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.28","url":null,"abstract":"The proliferation of mobile devices and the bundling of several network access technologies in a single product have increased considerably the communication environment complexity. There has been a certain drive for allowing end users to be \"best- connected\" anywhere, anytime, which places an additional set of stringent requirements on the already over-engineered domain of mobile computing. This rapidly increasing computational complexity is reinforced by the mounting number of wirelessly connected mobile devices and, therefore, network solutions are sought after with several self-X properties (self-configuration, - adaptation, and -management, to name a few). Such networks will require services that reliably cater the latest information aiming at simplifying and fostering autonomic decision-making. We introduce the dynamic networks information service infrastructure (DNISI), an application of the information service architecture developed in the ambient networks project. We present how DNISI supports both enhanced mobility management and context-aware communications in today's pervasive networking environments by providing the means for gathering, correlating, and managing cross-layer and cross-domain information. Finally, we explain how service platform components and end-users applications can benefit in the near-term.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Bicycle Demonstration on the Tour De France","authors":"A. Dhraief, N. Montavont, R. Kuntz, M. Tsukada","doi":"10.1109/ICCGI.2007.23","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.23","url":null,"abstract":"In this paper, we describe the E-bicycle demonstration held within the Tour De France. It was performed by the Nautilus6 working group in order to see the impact and usage of new IPv6 mobility protocols in the real life. We report our experience of settting an IPv6 mobile network demonstration where a E-car and two E-bicycles are communicating together while being in motion. The scenario involves network mobility managed by NEMO Basic support and optimized group communication via Xcast6. We finally put forward the results of the demonstration and give recommendations for future deployment.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134185125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of a Learning Management System for Adaptivity Purposes","authors":"E. Popescu, P. Trigano, C. Bǎdicǎ","doi":"10.1109/ICCGI.2007.24","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.24","url":null,"abstract":"Adaptive Web-based educational systems are a continuously growing area of research. However, despite the relatively numerous approaches, adaptivity from the point of view of student learning styles is not properly addressed. We therefore plan to create a framework for devising and deploying university courses that will take into account not only student's knowledge level but also his/her cognitive traits, interests and motivation. A first step towards achieving our objective is the choice of an existing LMS, suitable for being extended into an adaptive one. The netUniversite platform proved to be a successful candidate.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116265401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid Development of Enhanced Services Using Application Programming Interfaces","authors":"D. Adamopoulos","doi":"10.1109/ICCGI.2007.51","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.51","url":null,"abstract":"In the highly competitive telecommunications environment of today a service provider must continually evolve its network and enable new revenue-generating services faster and more cost effectively than the competition. These services should create value for the end users by satisfying all their functional requirements in an efficient manner, and they should be delivered with simplicity and ease of provisioning. This paper focuses on the transition from a requirements capture and analysis phase to a service analysis phase in the framework of an object- oriented service creation methodology, by considering the internal structure and the functionality of a telematic service. After the examination of the main activities that take place in the service analysis phase and the identification of the main artifacts that are produced during them, the overall service development process is highlighted, and the paper attempts to validate, through several service creation experiments, not only the service analysis phase, but also the overall service creation methodology. Finally, the validation results are discussed and further evaluation actions are briefly outlined.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Optimization of a DHT-Based Discovery Science","authors":"P. Karwaczyriski, J. Mocnik","doi":"10.1109/ICCGI.2007.58","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.58","url":null,"abstract":"Discovery in large, highly dynamic service oriented systems cannot be realized by traditional means, i.e. with a centralized index. Instead, distributed data structures are used, with a distributed hash table deployed on an overlay network being a typical example. The efficiency of overlay networks built on top of the IP network commonly suffers from the mismatch between the topologies of the overlay and the underlying IP network, resulting in unnecessary traffic and increased latencies. Substantial improvement can be achieved by optimizing the logical links between overlay nodes. In this paper, we propose a new method for self-optimization of a pervasive, DHT-based discovery service. Our method has no need for active measurement of inter-node latencies, thus minimizing network traffic costs of node insertion and topology maintenance. We verify our method by means of analysis of a large data sets of latency measurements between arbitrary nodes on the Internet, proving correlation among common IP prefix length of communicating nodes and latency.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Fernández, Juan C. Pelaez, Maria Mercedes Larrondo-Petrie
{"title":"Security Patterns for Voice over IP Networks","authors":"E. Fernández, Juan C. Pelaez, Maria Mercedes Larrondo-Petrie","doi":"10.4304/JSW.2.2.19-29","DOIUrl":"https://doi.org/10.4304/JSW.2.2.19-29","url":null,"abstract":"Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. We give an overview of VoIP and provide UML models of some aspects of its infrastructure, including architectures and basic use cases. We present some security patterns that describe mechanisms that can control many of the possible attacks and which could be used to design secure systems.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121111212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}