1,390 research outputs found

    Intelligent XML Tag Classification Techniques for XML Encryption Improvement

    Get PDF
    Flexibility, friendliness, and adaptability have been key components to use XML to exchange information across different networks providing the needed common syntax for various messaging systems. However excess usage of XML as a communication medium shed the light on security standards used to protect exchanged messages achieving data confidentiality and privacy. This research presents a novel approach to secure XML messages being used in various systems with efficiency providing high security measures and high performance. system model is based on two major modules, the first to classify XML messages and define which parts of the messages to be secured assigning an importance level for each tag presented in XML message and then using XML encryption standard proposed earlier by W3C [3] to perform a partial encryption on selected parts defined in classification stage. As a result, study aims to improve both the performance of XML encryption process and bulk message handling to achieve data cleansing efficiently

    Studi Awal Penggunaan Algoritma C4.5 dan Logika Fuzzy pada Klasifikasi Enkripsi Transaksi Keuangan Bebasis XML

    Get PDF
    XML (eXtensible Markup Language) telah digunakan secara luas dalam transportasi data baik dalam transaksi kebutuhan umum hingga transaksi keuangan. Penggunaan XML yang meningkat dalam pesan transaksi keuangan menciptakan ketertarikan yang selaras dengan protokol keamanan yang terintegrasi untuk melindungi pesan XML dalam pertukarannya dengan cara yang efisien namun kuat. Lembaga keuangan melakukan transaksi setiap harinya membutuhkan pengamananan pesan XML dalam skala besar. Mengamankan pesan yang besar akan menimbulkan masalah kinerja dan sumberdaya. Oleh karena itu, sebuah pendekatan dibutuhkan untuk mengamankan dan mengenkripsi bagian tertentu dari dokumen XML, sintaks dan membuat batasan yang merepresentasikan bagian yang harus diamankan. Dalam penelitiaan ini penulis mengajukan pendekatan untuk mengamankan transaksi keuangan dengan Logika Fuzzy dan algoritma C4.5 untuk optimasi rule fuzzy. Pada fase klasifikasi fuzzy, sebuah nilai dipasang pada atribut yang dinamakan "Importance Level". Nilai yang diberikan pada atribut tersebut mengindikasikan sensitifitas data untuk setiap tag XML. Algoritma C4.5 digunakan untuk mengurangi ketergantungan terhadap expert dalam pemilihan rule yang bertujuan untuk menyederhanakan rule dan meningkatkan performa komputasi Penelitain ini juga akan menerapkan pengklasifikasian enkripsi isi pesan XML dengan mengenkripsi elemen yang dipilih saja (element-wise), yang telah ditetapkan pada fase klasifikasi. Proses enkripsi menggunakan kunci simestris berupa algoritma AES dengan besaran kunci yang berbeda. Kunci 128bit digunakan pada tag yang diklasifikasikan sebagai elemen yang ditandai sebagai "Medium" sedangkan kunci 256-bit pada tag "High

    THE NORMALIZATION OF FINANCIAL DATA EXCHANGE OVER THE INTERNET: ADOPTING INTERNATIONAL STANDARD XBRL

    Get PDF
    The development of a common syntax for EDI (Electronic Data Interchange), XML (eXtensible Markup Language), opened new formalization perspectives for interorganizational data exchanges over the Internet. Many of the organizations involved in the normalizaEDI, IAS/IFRS norms, financial reporting, XBRL, taxonomies specifications, document instance, strategic alignment, XBRL platform.

    A Generic Approach for Developing and Executing Electronic Questionnaires on the iOS Platform

    Get PDF
    The creation of questionnaires is a very time-consuming and costly task when developing a study. In most cases they are created in a paper-based form. However, this paper-based approach leaves less scope for interaction with the participant to motivate them when filling in the questionnaire. Moreover, data collection and subsequent evaluation is very cumbersome because all data has to be transferred manually to electronic worksheets. To deal with these issues, this master’s thesis presents a concept and implementation of an electronic questionnaire application to solve the mentioned problems. Thereby, different generic approaches are introduced and compared with each other. In general, questions and answers are determined using an XML document. In addition, a generic XML schema is provided to validate the specified questionnaires during the creation. When running such a questionnaire, user interface elements like textfields, checkboxes, radiobuttons or sliders are automatically generated by the application. Moreover, the results of completed questionnaires can be viewed and exported for later analysis. Requirements and styleguides for an iOS specific application development are determined an discussed. The theoretical characterization ends in a practical part whereby a possible scenario for the utilization of the electronic questionnaire application is shown. In addition, the steps to create, deploy and enact such an electronic questionnaire are discussed

    Technology Options to Support the Implementation of Knowledge Management

    Full text link
    Company is more aware that knowledge management is one of the important factors because it gives competitive advantages for them. Knowledge is intellectual asset that is owned by individual or company. Knowledge becomes very useful if it is documented or stored, organized, shared to others and can be understood and applied. Knowledge Management System (KMS) is made to manage knowledge. KMS does identifying process, capturing, organizing and disseminating knowledge. Technology is one of three model of KM that supports the implementation of KM. This time there are various options of technology that support the KM implementation for companies. In this research, there are various options or types of technology that can be used to support the implementation of knowledge management

    Approaches to creating anonymous patient database

    Get PDF
    Health care providers, health plans and health care clearinghouses collect patient medical data derived from their normal operations every day. These patient data can greatly benefit the health care organization if data mining techniques are applied upon these data sets. However, individual identifiable patient information needs to be protected in accordance with Health Insurance Portability and Accountability Act (HIPAA), and the quality of patient data also needs to be ensured in order for data mining tasks achieve accurate results. This thesis describes a patient data transformation system which transforms patient data into high quality and anonymous patient records that is suitable for data mining purposes.;This document discusses the underlying technologies, features implemented in the prototype, and the methodologies used in developing the software. The prototype emphasizes the patient privacy and quality of the patient data as well as software scalability and portability. Preliminary experience of its use is presented. A performance analysis of the system\u27s behavior has also been done
    • 

    corecore