162 research outputs found

    Three Factor Authentication Using Java Ring and Biometrics

    Get PDF
    Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure

    Three Factor Authentication Using Java Ring and Biometrics

    Get PDF
    Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure

    Telecommunications: Networks and Technologies, Algebraic Coding and Data Security

    Get PDF
    Сборник содержит статьи, тематика которых посвящена научно-теоретическим разработкам в области сетей телекоммуникаций, информационной безопасности, алгебраического кодирования и обработки изображений. Предназначен для научных сотрудников в области телекоммуникаций, преподавателей, аспирантов, магистрантов и студентов технических вузов

    Influence of network effects on the diffusion of information systems: the case of open source

    Get PDF
    Doutoramento em GestãoIn the actual world with the importance of the Information Systems in the socio¬economic infrastructure, becomes relevant the study of this market. This thesis tried it, on the supply side through the feedback of some of the main software suppliers and on the demand side through the study of a sample of companies. The subject of study was the Operating Systems and Office Suites for personal computers and the analysis of competition between Open Source Software and Proprietary Software, although the thesis hypotheses and conclusions may extend to other software categories. On the market supply side we concluded that in the competition between two business models, Open Source Software and Proprietary Software, both can create innovation and ensure the survival in the market of the companies that use these business models. On the demand side, we concluded that in this market factors other than brand image, product features or price have influence in the purchasing decision. Factors like network effects, switching costs or lock-in have influence in the buying decision protecting the incumbent and decreasing the market competition level, making it difficult for the competitive alternatives based only on offer and price to gain market share to the incumbent.No mundo actual a importância dos Sistemas de Informação na infra-estrutura sócio-económica torna relevante o estudo deste mercado. Esta tese procurou fazê-lo tanto do lado da oferta, através do feedback de alguns dos principais fornecedores de software, como da procura, através do estudo de uma amostra de empresas. Foram objecto de estudo os Sistemas Operativos e Office Suites para computadores pessoais e a análise da concorrência entre o Software Open Source e o Software Proprietário, embora as hipóteses e conclusões da tese possam estender-se a outras categorias de software. Do lado da oferta concluiu-se que na competição entre dois modelos de negócio, Software Open Source e o Software Proprietário, ambos podem criar inovação e garantir a sobrevivência no mercado das empresas que se baseiam nos mesmos. Do lado da procura concluiu-se que neste mercado outros factores para além da imagem de marca, características do produto ou preço têm influência nas decisões de compra. Factores como o efeito de rede, custos de mudança ou lock-in influenciam a decisão de compra protegendo o incumbente e diminuindo o nível concorrencial do mercado, tornando mais difícil às alternativas concorrenciais conquistarem mercado ao incumbente apenas com base na oferta e preço

    An application service provider infrastructure for shared workspaces in Internet-based collaborative design

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Architecture; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2000.Includes bibliographical references (leaves 103-107).For architectural, engineering and construction projects involving transient 'virtual organizations' composed of non-collocated team-members, the adoption of concurrent design principles is seen as vital. An important aspect of concurrent design is the need for an effective communications infrastructure between team members. Traditionally, such communication has been handled through person-to-person meetings, however the complexity of modern projects has grown and as a result, reliance on new information and communications technologies is becoming increasingly necessary. Hence, within a concurrent design setting, there is the need for an integrated information and collaboration environment that will create a persistent shared workspace to support interaction between project personnel throughout all phases of the project. This research explores computer-supported mechanisms for enhancing distributed design collaboration. The goal of this thesis is to develop a set of requirements, system architecture and an early system prototype to facilitate computer-supported collaboration among distributed teams. The prototype will consist of a persistent shared workspace system built from the integration of complementary collaborative applications. These applications are the CAIRO system, developed at the Massachusetts Institute of Technology and the VNC system developed at the Olivetti Research Laboratory.by Jaime Solari.S.M

    Information resources management, 1984-1989: A bibliography with indexes

    Get PDF
    This bibliography contains 768 annotated references to reports and journal articles entered into the NASA scientific and technical information database 1984 to 1989

    The rise of open source licensing : a challenge to the use of intellectual property in the software industry

    Get PDF
    Open source software – from Linux to Firefox and MySQL database – has changed software business as we knew it. New start-ups have challenged industry heavyweights from Microsoft to Oracle with innovative copyright licensing strategies and courageous anti-patent policies. Almost every major software company has been forced to react to the commodification trend. The overall argument of the book is that open source licensing has indeed changed the ways the software industry thinks of and actually uses intellectual property. The thesis further argues that the implications of open source to the management of intellectual property are twofold. First, intellectual property infringement risks must be taken more seriously when open source software is used. This is because open source increases the negative effects from the continuous expansion of intellectual property rights. Second, "Internet-businesses" are finally breaking through into software markets. This means that the value of intellectual property increases from sharing but also becomes more complex to appropriate. Finally, this book argues that open source can have relevant implications on intellectual property rights policy. First, openness balances commercial regulation. Open licensing systems have proved how potential drawbacks from overregulation can be fixed without state intervention. Second, open source also emphasizes a more material study of intellectual property rights. When a substantial number of right holders in a given industry decide not to enforce their core intellectual property rights – relying on economic-rational arguments – the premises of the policy discussion can be seen in a new light.reviewe

    Management: A bibliography for NASA managers

    Get PDF
    This bibliography lists 706 reports, articles, and other documents introduced into the NASA scientific and technical information system in 1984. Entries, which include abstracts, are arranged in the following categories: human factors and personnel issues; management theory and techniques; industrial management and manufacturing; robotics and expert systems; computers and information management; research and development; economics, costs, and markets; logistics and operations management; reliability and quality control; and legality, legislation, and policy. Subject, personal author, corporate source, contract number, report number, and accession number indexes are included

    The Missing Link: An Introduction to Web Development and Programming

    Get PDF
    Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and standards. Navigating a project from concept to completion often requires more than mastery of one or two complementing languages, meaning today’s developers need both breadth, and depth, of knowledge to be effective. This text provides the developer with an understanding of the various elements of web development by focusing on the concepts and fundamentals through the examples within, providing a foundation that allows easier transition to other languages and a better understanding of how to approach their work. The reader will be introduced to topics in a manner that follows most project development methods, from initial conceptualization and design through front end development, back end development, and introducing additional concepts like accessibility and security, while focusing on responsive design techniques. Each section of the text includes opportunities to practice the material and assess increased knowledge after examining the topics.https://knightscholar.geneseo.edu/oer-ost/1016/thumbnail.jp
    corecore