5,664 research outputs found
A Framework for M-Commerce Implementation in Nigeria
The Internet has brought about the concept of grobalilation, which has
revolutionized the way business is transacted all over the world. The E-comnterce
is of particular interest, though widely used but still has some security challenges
in terms of transparency and confidentiality of transactiorts. This papei focuses
on M-contnrcrce as an extensiott to E-commerce hnplementatiott with the Bankiltg
industry proposed as core implementation consideration in ortler to guarantee
high level security. We have reviewed some cqses of onlilrc frauds and eliscussed
tlte emerging critical issues afficting software development of M-cornmerce
applicatiotts. Afranrcworkfor M-commerce implementationis therefore,proposed
for countries such as Nigeria, Romania and Indonesia where cases of online
scam are alanning
Delay Tolerant Networking over the Metropolitan Public Transportation
We discuss MDTN: a delay tolerant application platform built on top of the Public Transportation System (PTS) and able to provide service access while exploiting opportunistic connectivity. Our solution adopts a carrier-based approach where buses act as data collectors for user requests requiring Internet access. Simulations based on real maps and PTS routes with state-of-the-art routing protocols demonstrate that MDTN represents a viable solution for elastic nonreal-time service delivery. Nevertheless, performance indexes of the considered routing policies show that there is no golden rule for optimal performance and a tailored routing strategy is required for each specific case
Improvement of DHRA-DMDC Physical Access Software DBIDS Using Cloud Computing Technology: a Case Study
The U.S government has created and been executing an Identity and Management (IdM) vision to support a global, robust, trusted and interoperable identity management capability that provides the ability to correctly identify individuals and non-person entities in support of DoD mission operations. Many Directives and Instructions have been issued to standardize the process to design, re-designed new and old systems with latest available technologies to meet the visions requirements. In this thesis we introduce a cloud-based architecture for the Defense Biometric Identification System (DBIDS), along with a set of DBIDS Cloud Services that supports the proposed architecture. This cloud-based architecture will move DBIDS in the right direction to meet Dod IdM visions and goals by decoupling current DBIDS functions into DBIDS core services to create interoperability and flexibility to expand future DBIDS with new requirements. The thesis will show its readers how DBIDS Cloud Services will help Defense Manpower Data Center (DMDC) easily expanding DBIDS functionalities such as connecting to other DMDC services or federated services for vetting purposes. This thesis will also serve as a recommendation of a blue-print for DBIDS architecture to support new generation of DBIDS application. This is a step closer in moving DMDC Identity Enterprise Solution toward DoD IdM realizing vision and goals. The thesis also includes a discussion of how to utilize virtualized DBIDS workstations to address software-deployment and maintenance issues to resolve configuration and deployment issues which have been costly problems for DMDC over the years.http://archive.org/details/improvementofdhr109457379Civilian, Department of Defens
Service Monitoring for a Mobile Money System
Mobile applications are gaining more and more market share and virtually everyone today has smartphones. This reality is no different in Africa, where the use of mobile payment systems has grown and allowed people without access to bank accounts to use their phones to perform banking operations.
Currently, WIT Software provides these countries with a Mobile Money System solution providing a Backend and Mobile Application, that allows users to make and receive payments, lend money and pay into mortgages, check statements, and transactions’ history. Still, another important aspect is the availability and functionality so that users can use it without interruption.
In this way, was proposed to design a monitoring platform that will allow users to perceive the health status of the total system from the users' side, to detect problems either in applications, servers or even in network components that may be running. Prevent the correct functioning of this system that allows millions of people to have their bank account associated with their mobile phone number.
This report describes all the work carried out for nine months at the company WIT Software, which involves the design and implementation of a Monitoring Platform for a Mobile Payments System
Recommended from our members
Internet security for mobile computing
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks. For instance, when paying a bill at a store with NFC mobile payment, navigating through a city operating GPS on a smartphone, or dictating the temperature at a household with a home automation device. These activities seem routine, yet, when vulnerabilities are present they can leave holes for hackers to access bank accounts, pinpoint a user’s recent location, or tell when someone is not at home. The awareness of the end user cannot be trusted. Device vendors and developers must provide safeguards.
An ongoing issue is that the present security standards are outdated and were never envisioned with mobile devices in mind. It can be suggested that security is only idling the progress of mobile computing. Still, many application developers and IT professionals do not adopt security standards fast enough to keep up-to-date with known vulnerabilities.
The main goals of the next generation of security standards, TLS, will provide developers with greater security efficiency and improved mobile throughput. These proposed capabilities of the TLS protocol will streamline mobile computing into the forefront of security practices. The analysis of this report demonstrates concepts on the direction mobile security, usability, and performance from a development standpoint.Electrical and Computer Engineerin
- …