J. Res. Pract. Inf. Technol.最新文献

筛选
英文 中文
Analysing the Woo-Lam Protocol Using CSP and Rank Functions 利用CSP和秩函数分析Woo-Lam协议
J. Res. Pract. Inf. Technol. Pub Date : 2006-02-01 DOI: 10.5220/0002557000030012
S. Shaikh, V. Bush
{"title":"Analysing the Woo-Lam Protocol Using CSP and Rank Functions","authors":"S. Shaikh, V. Bush","doi":"10.5220/0002557000030012","DOIUrl":"https://doi.org/10.5220/0002557000030012","url":null,"abstract":"Designing security protocols is a challenging and deceptive exercise. Even small protocols providing straightforward security goals, such as authentication, have been hard to design correctly, leading to the presence of many subtle attacks. Over the years various formal approaches have emerged to analyse security protocols making use of different formalisms. Schneider has developed a formal approach to modelling security protocols using the process algebra CSP (Communicating Sequential Processes). He introduces the notion of rank functions to analyse the protocols. We demonstrate an application of this approach to the Woo-Lam protocol. We describe the protocol in detail along with an established attack on its goals. We then describe Schneider’s rank function theorem and use it to analyse the protocol. ACM Classification: C.2.2 (Communication/Networking and Information Technology – Network Protocols – Protocol Verification), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Query rewriting using views in the presence of inclusion dependencies 在包含依赖项存在的情况下使用视图进行查询重写
J. Res. Pract. Inf. Technol. Pub Date : 2003-11-07 DOI: 10.1145/956699.956729
Qingyuan Bai, Jun-Hyeok Hong, M. McTear, Hui Wang
{"title":"Query rewriting using views in the presence of inclusion dependencies","authors":"Qingyuan Bai, Jun-Hyeok Hong, M. McTear, Hui Wang","doi":"10.1145/956699.956729","DOIUrl":"https://doi.org/10.1145/956699.956729","url":null,"abstract":"Query rewriting using views is an essential issue in data integration. A number of algorithms, e.g., the bucket algorithm, the inverse rules algorithm, the SVB algorithm and the MiniCon algorithm, have been proposed to address this issue. These algorithms can be divided into two categories: bucket-based algorithms and inverse rule-based algorithms. Some inverse rule-based algorithms have considered the problem of query rewriting in the presence of inclusion dependencies. However, there has been no bucket-base algorithm so far for the problem. All the previous bucket-based algorithms may miss query rewritings in the presence of inclusion dependencies. In this paper, we extend the MiniCon algorithm to the presence of inclusion dependencies. In the MiniCon algorithm, a view can be used in a non-redundant rewriting of a query only if at least one subgoal in the query is covered by a subgoal in the view. In the presence of inclusion dependencies, when no subgoal in a view directly covers the query subgoal we can apply the chase procedure and rule to the subgoals of the query or view that contains the chase reachable subgoals to get a revised query or view. The condition required by the MiniCon algorithm is then satisfied. We can therefore avoid the problem of missing rewritings with the previous bucket-based algorithms. We prove that our extended algorithm can find the maximally-contained rewriting of a conjunctive query using a set of conjunctive views in the presence of inclusion dependencies. Our extension of the MiniCon algorithm does not involve a significant increase in computational complexity and our new algorithm remains scalable.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
E-Business Innovations and Change Management 电子商务创新与变革管理
J. Res. Pract. Inf. Technol. Pub Date : 2003-07-01 DOI: 10.4018/978-1-59140-138-4
Mohini Singh, D. Waddell
{"title":"E-Business Innovations and Change Management","authors":"Mohini Singh, D. Waddell","doi":"10.4018/978-1-59140-138-4","DOIUrl":"https://doi.org/10.4018/978-1-59140-138-4","url":null,"abstract":"From the Publisher: \u0000Demonstrating how organizations around the world are capitalizing on new technologies such as the Internet and the World Wide Web to develop e-business, this book shows how evolving e-business models, integrated solutions, and improved technological infrastructure are continuously changing the way business is conducted. This discusses the ways in which the e-business revolution brings new ways of dealing with customers and business partners, new revenue streams, new ways of processing information, and new organization structures. In addition, advice is provided on developing new skill sets, electronic supply chains, new standards and policies, new collaborations and adaptable business strategies. \u0000 \u0000About the Author: \u0000Mohini Singh is a lecturer in the School of Business Information Technology at RMIT University and the director of the electronic commerce research unit. He serves as reviewer for The Journal of Electronic Commerce Research and on the editorial advisory boards of The Journal of Education Computing Research and The Cross Cultural Management and International Journal. Dianne Waddell is an associate professor and the director of graduate management programs at Edith Cowan University. She is the author of Organization Development and Change and E-Business","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An Attribute-Based Delegation Model and Its Extension 基于属性的委托模型及其扩展
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.5220/0002560401460159
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
{"title":"An Attribute-Based Delegation Model and Its Extension","authors":"Chunxiao Ye, Zhongfu Wu, Yunqing Fu","doi":"10.5220/0002560401460159","DOIUrl":"https://doi.org/10.5220/0002560401460159","url":null,"abstract":"In existing delegation models, delegation security entirely depends on delegators and security administrators, for delegation constraint in these models is only a prerequisite condition. This paper proposes an Attribute-Based Delegation Model (ABDM) with an extended delegation constraint consisting of both delegation attribute expression (DAE) and delegation prerequisite condition (CR). In ABDM, a delegatee must satisfy delegation constraint (especially DAE) when assigned to a delegation role. With delegation constraint, a delegator can restrict the delegatee candidates more strictly. ABDM relieves delegators and security administrators of security management work in delegation. In ABDM, a delegator is not allowed to temporarily delegate permissions to a person who does not satisfy the delegation constraint. To guarantee its flexibility and security, an extension of ABDM named ABDMX is proposed. In ABDMX, a delegator can delegate some high level permissions to low level delegatee candidates temporarily, but not permanently.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Return On Security Investment (ROSI) - A Practical Quantitative Modell 证券投资回报率(ROSI)——一个实用的定量模型
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.5220/0002580202390252
Wes Sonnenreich, Jason Albanese, B. Stout
{"title":"Return On Security Investment (ROSI) - A Practical Quantitative Modell","authors":"Wes Sonnenreich, Jason Albanese, B. Stout","doi":"10.5220/0002580202390252","DOIUrl":"https://doi.org/10.5220/0002580202390252","url":null,"abstract":"Organizations need practical security benchmarking tools in order to plan effective security strategies. This paper explores a number of techniques that can be used to measure security within an organization. It proposes a new benchmarking methodology that produces results that are of strategic importance to both decision makers and technology implementers. The approach taken reflects a work-in-progress that is a combination of practical experience and direct research.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 245
A UML 2.0/OCL Extension for Designing Secure Data Warehouses 设计安全数据仓库的UML 2.0/OCL扩展
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.5220/0002577302170228
R. Villarroel, E. Fernández-Medina, M. Piattini, J. Trujillo
{"title":"A UML 2.0/OCL Extension for Designing Secure Data Warehouses","authors":"R. Villarroel, E. Fernández-Medina, M. Piattini, J. Trujillo","doi":"10.5220/0002577302170228","DOIUrl":"https://doi.org/10.5220/0002577302170228","url":null,"abstract":"At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were developed, its complexity would hinder its success. The solution, therefore, would be an approach in which techniques and models defined by the most accepted model standards were extended by integrating the necessary security aspects that at this moment in time are not covered by the existing methodologies. In this paper, we will focus on solving confidentiality problems in the conceptual modelling of data warehouses by defining a profile using the UML 2.0 extensibility mechanisms. In addition, we define an OCL extension that allows us to specify the security constraints of the elements in conceptual modelling of data warehouses and we apply this profile to an example.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133658673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
A Multi-Dimensional Classification for Users of Security Patterns 安全模式用户的多维分类
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.5220/0001741300890098
M. VanHilst, E. Fernández, F. A. Braz
{"title":"A Multi-Dimensional Classification for Users of Security Patterns","authors":"M. VanHilst, E. Fernández, F. A. Braz","doi":"10.5220/0001741300890098","DOIUrl":"https://doi.org/10.5220/0001741300890098","url":null,"abstract":"This paper presents a classification for security patterns that addresses the needs of users. The approach uses a matrix defined by dividing the problem space along multiple dimensions, and allows patterns to occupy regions, defined by multiple cells in the matrix. It supports filtering for narrow or wide pattern selection, allows navigation along related axes of concern, and identifies gaps in the problem space that lack pattern coverage. Results are preliminary but highlight differences with existing classifications.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Controlled Sharing of Personal Content Using Digital Rights Management 使用数字版权管理的个人内容控制共享
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.5220/0002573101730185
Claudine Conrado, M. Petkovic, M. V. D. Veen, W. V. D. Velde
{"title":"Controlled Sharing of Personal Content Using Digital Rights Management","authors":"Claudine Conrado, M. Petkovic, M. V. D. Veen, W. V. D. Velde","doi":"10.5220/0002573101730185","DOIUrl":"https://doi.org/10.5220/0002573101730185","url":null,"abstract":"This paper describes a system which allows controlled distribution of personal digital content by users. The system extends an existing Digital Rights Management system for the protection of commercial copyrighted content by essentially allowing users to become content providers. This fact, however, makes the system vulnerable to illegal content distribution, i.e., distribution by users who do not own the content. To solve this problem a solution is proposed which involves the compulsory registration with a trusted authority of a user’s personal content. During registration, the association between user identity and content is securely recorded by the authority, but users have the possibility to remain anonymous towards any other party. Moreover, in case the initial content identification fails and content is illegally registered, the authority can ensure user accountability.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Who needs a 'Killer App'? Two Perspectives on Content in Residential Broadband Networks 谁需要“杀手级应用”?住宅宽带网络内容的两种观点
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.32920/ryerson.14639022.v1
C. Middleton
{"title":"Who needs a 'Killer App'? Two Perspectives on Content in Residential Broadband Networks","authors":"C. Middleton","doi":"10.32920/ryerson.14639022.v1","DOIUrl":"https://doi.org/10.32920/ryerson.14639022.v1","url":null,"abstract":"This paper describes the deployment of a residential broadband network by relating two parallel but contrasting stories. Story 1 considers network providers' search for a killer application to drive demand for broadband networks, while Story 2 suggests that consumers have already found a killer application in e-mail and basic connectivity. It appears that residential broadband networks are currently being developed with a Story 1 perspective in mind. Story 2 should be assessed in the context of its historical persistence and significance. The implications for future development of residential broadband networks are considered when both stories are accepted as plausible.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling Tinmith系统-展示移动增强现实建模的新技术
J. Res. Pract. Inf. Technol. Pub Date : 1900-01-01 DOI: 10.1145/563997.563994
W. Piekarski, B. Thomas
{"title":"The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling","authors":"W. Piekarski, B. Thomas","doi":"10.1145/563997.563994","DOIUrl":"https://doi.org/10.1145/563997.563994","url":null,"abstract":"This paper presents user interface technology, using a glove based menuing system and 3D interaction techniques. It is designed to support applications that allow users to construct simple models of outdoor structures. The construction of models is performed using various 3D virtual reality interaction techniques, as well as using real time constructive solid geometry, to allow users to build up shapes with no prior knowledge of the environment. Previous work in virtual environments has tended to focus mostly on selection and manipulation, but not starting from an empty world. We demonstrate our user interface with the Tinmith-Metro application, designed to capture in city models and street furniture.","PeriodicalId":309011,"journal":{"name":"J. Res. Pract. Inf. Technol.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信