361,256 research outputs found

    Design and implementation of the node identity internetworking architecture

    Get PDF
    The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications. The basic principles of the original Internet architecture include end-to-end addressing, global routeability and a single namespace of IP addresses that unintentionally serves both as locators and host identifiers. The commercial success and widespread use of the Internet have lead to new requirements, which include internetworking over business boundaries, mobility and multi-homing in an untrusted environment. Our approach to satisfy these new requirements is to introduce a new internetworking layer, the node identity layer. Such a layer runs on top of the different versions of IP, but could also run directly on top of other kinds of network technologies, such as MPLS and 2G/3G PDP contexts. This approach enables connectivity across different communication technologies, supports mobility, multi-homing, and security from ground up. This paper describes the Node Identity Architecture in detail and discusses the experiences from implementing and running a prototype

    TRENDS IN ELECTRONIC COMMERCE SECURITY: A MANAGERIAL BRIEF AND TEACHING NOTE

    Get PDF
    The Internet and similar networks provide new infrastructures for communications and commerce. These open networks interconnect computers across many different organizations with dramatically lower communications and distributed applications development costs. This motivates businesses to transfer commercial activity from closed private networks to open networks like the Internet. However, open network architectures are vulnerable to a number of different security threats. While many different hardware and software solutions exist to secure transactions over the Internet, greater consensus is required by companies and consumers on the processes, organizations and application of existing technical solutions for secure electronic commerce. Greater consensus on security among trading parties will lower the costs of electronic commerce and accelerate its deployment on the Internet.Information Systems Working Papers Serie

    An Analysis of Internet Banking Service Quality Affecting Customer Satisfaction with a focus on United Commercial Bank Limited in Bangladesh

    Get PDF
    Banking industry around the world has transformed swiftly over the last decade and still undergoing through a rapid transformation. With rapid growth and extensive use of the Internet in the marketing practices of firms, service quality delivery through electronic platforms for electronic commerce becomes one of the most critical issues for marketers in the service sector. One of such uses of electronic platforms is Internet Banking in banking industry. This empirical research study focuses on investigating the relationship between Service Quality and Customer Satisfaction in Internet Banking provided by UCBL (United Commercial Bank Limited). A significant positive relationship exists between Service Quality and Customer Satisfaction in the internet banking. The findings showed that Ease of Use, Security/Privacy, Reliability and Responsiveness have positive effects on customer satisfaction among users of Internet Banking of UCBL. Keywords: Internet Banking, Bangladesh, Customer Satisfaction, Service Quality, United Commercial Bank

    Genetic Algorithms: A Technique For Cryptography Real Time Data Transmission

    Get PDF
    The growing adoption of Internet for business applications has exposed users to unwanted risks andattacks. Now more than ever, we find individuals/corporate houses exchanging critical informationover the Internet. However, a lack of security infrastructure makes this information exchangevulnerable to outside intervention. To meet these challenges, businesses are opting for modernsecurity measures, such as e-security. E-security measures are designed to preserve theconfidentiality and integrity of the usersĂŠ data on the Internet.We introduce a new approach for esecurityapplications using the concept of genetic algorithms with pseudorandom sequence toencrypt and decrypt data stream. The feature of such an approach includes high data security andhigh feasibility for easy integration with commercial multimedia transmission applications. Anexperiment is performed in which several images are encrypted and decrypted. The experimentalresults show that the proposed technique achieved high throughput rate that is fast enough for realtime data protection

    Reliability, availability and security of wireless networks in the community

    Get PDF
    Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Wireless networking has rapidly increased in popularity over recent years. There has also been a change in the use of the internet by users. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. Both home users and industry are sending increasingly sensitive information through these wireless networks as online delivery of banking, commercial and governmental services becomes more widespread. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. This paper reviews wireless network protocols, investigates issues of reliability, availability and security when using wireless networks. The paper, by use of a case study, illustrates the issues and importance of implementing secured wireless networks, and shows the significance of the issue. The paper presents a discussion of the case study and a set of recommendations to mitigate the threat
    • …
    corecore