84,317 research outputs found

    The Future of the Internet

    Get PDF
    Presents findings from a survey of technology leaders, scholars, industry officials, and analysts. Evaluates the network infrastructure's vulnerability to attack, and the Internet's impact on various institutions and activities in the coming decade

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    Dark clouds on the horizon:the challenge of cloud forensics

    Get PDF
    We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue

    A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

    Full text link
    The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both of academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs'users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing strategy for VANETs is still an open issue. In this paper, we present a comprehensive survey and classification of pseudonym changing strategies. We then discuss and compare them with respect to some relevant criteria. Finally, we highlight some current researches, and open issues and give some future directions

    Service Quality Assessment with LibQUAL+® in Challenging Times: LibQUAL+® at Cranfield University

    Get PDF
    Cranfield University is the UK’s only wholly postgraduate university focused on science, technology, engineering, and management. The University Library first implemented the LibQUAL+® survey methodology in 2003 as a member of the Society of College, National, and University Libraries (SCONUL) consortium.1 The successful pilot study was the first time the LibQUAL+® protocol was used outside North America. Since 2005 the survey has been used at Cranfield’s School of Defence and Security annually. Specializing in the teaching of defense science, technology, and management, the student population consists of 1,200 military and civilian students, 85% of whom study part-time away from the university campu

    Cash Tender Offers for Shares—A Reply to Chairman Cohen

    Get PDF
    In the past few years, the corporate takeover device of the cash tender offer has grown in frequency, and thus in importance. Concomitantly, legislation designed to sweep this relatively unregulated method of acquiring corporate control into the ambit of the SEC has been proffered. In response to the reasons which have been propounded in favor of such regulation, the author analyzes the pending legislation, appraises its likely consequences, and evaluates its objectives
    corecore