152,172 research outputs found
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet
Catching the next wave : the use of the Internet by justice and development voluntary organisations and people organisations : a thesis presented in partial fulfilment of the requirements for the degree of Master of Philosophy in Development Studies at Massey University
This thesis examines the extent to which third world organisations have participated in the shaping, control and benefits of development theory and practice. It concludes that development theory has been a creation of the first world acting upon the third world which is often perceived as powerless to help itself. Modernisation theory, development theory, alternative theories and neo-liberalism are all theories that developed out of the first world experience of development. Development theory has not been shaped by the third world rather it has been manipulated and controlled from within the first world. The very poor of the poorest countries have not benefited from development theory. Participation, also perceived as empowerment, has been lauded by development practitioners as the new panacea for development ills. Even though such participation is not so evident in reality, third world organisations are becoming more participatory, especially where first world organisations have changed their role from funder and provider to solidarity partners and advocators (within their own country). This thesis examined the potential of the Internet to increase the participation of third world organisations in voicing their justice and development issues to the first world. The Internet is only a participatory tool when used in a participatory environment. Its use will not necessarily ensure greater participation, of the third world, in development issues. As yet the Internet's potential is largely unrealised. This thesis conducted descriptive research into the extent that third world organisations use the Internet to further their justice and development objectives. The research found that third world use of the Internet was low compared to first world use of the Internet. This thesis recommends that the use of email subscription lists and World Wide Web sites by grassroots organisations from within third world countries is a unique opportunity to promote the third world perception of development issues to the first world
On Constructing Persistent Identifiers with Persistent Resolution Targets
Persistent Identifiers (PID) are the foundation referencing digital assets in
scientific publications, books, and digital repositories. In its realization,
PIDs contain metadata and resolving targets in form of URLs that point to data
sets located on the network. In contrast to PIDs, the target URLs are typically
changing over time; thus, PIDs need continuous maintenance -- an effort that is
increasing tremendously with the advancement of e-Science and the advent of the
Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are
subject of PID assignment. This paper presents a new approach of embedding
location independent targets into PIDs that allows the creation of
maintenance-free PIDs using content-centric network technology and overlay
networks. For proving the validity of the presented approach, the Handle PID
System is used in conjunction with Magnet Link access information encoding,
state-of-the-art decentralized data distribution with BitTorrent, and Named
Data Networking (NDN) as location-independent data access technology for
networks. Contrasting existing approaches, no green-field implementation of PID
or major modifications of the Handle System is required to enable
location-independent data dissemination with maintenance-free PIDs.Comment: Published IEEE paper of the FedCSIS 2016 (SoFAST-WS'16) conference,
11.-14. September 2016, Gdansk, Poland. Also available online:
http://ieeexplore.ieee.org/document/7733372
TechNews digests: Jan - Mar 2010
TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month
Repository Replication Using NNTP and SMTP
We present the results of a feasibility study using shared, existing,
network-accessible infrastructure for repository replication. We investigate
how dissemination of repository contents can be ``piggybacked'' on top of
existing email and Usenet traffic. Long-term persistence of the replicated
repository may be achieved thanks to current policies and procedures which
ensure that mail messages and news posts are retrievable for evidentiary and
other legal purposes for many years after the creation date. While the
preservation issues of migration and emulation are not addressed with this
approach, it does provide a simple method of refreshing content with unknown
partners.Comment: This revised version has 24 figures and a more detailed discussion of
the experiments conducted by u
A user-oriented network forensic analyser: the design of a high-level protocol analyser
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how these applications/artefacts are being used. Whilst some studies and tools are beginning to achieve object extraction, results to date are limited to basic objects. No research has focused upon analysing network traffic to understand the nature of its use – not simply looking at the fact a person requested a webpage, but how long they spend on the application and what interactions did they have with whilst using the service (e.g. posting an image, or engaging in an instant message chat). This additional layer of information can provide an investigator with a far more rich and complete understanding of a suspect’s activities. To this end, this paper presents an investigation into the ability to derive high-level application usage characteristics from low-level network traffic meta-data. The paper presents a three application scenarios – web surfing, communications and social networking and demonstrates it is possible to derive the user interactions (e.g. page loading, chatting and file sharing ) within these systems. The paper continues to present a framework that builds upon this capability to provide a robust, flexible and user-friendly NFAT that provides access to a greater range of forensic information in a far easier format
- …