364 research outputs found

    On Possible Cryptographic Optimization of Mobile Healthcare Application

    Get PDF
    The paper deals with a possible SOA based m-healthcare online system with secure mobile communication between patients and medical professionals with medical and insurance organizations. An example of an Android-based secure mobile client application is presented which can be used in the described secure m-healthcare model and it is experimentally evaluated. In the paper, we focus on possible optimization of cryptographic algorithms implemented in the secure Android mobile client application. The presented experimental results justify that security operations related to X.509v3 digital certificate generation and XML/WSS digital signature creation/verification are feasible on some current smart phones and justify the use of the proposed optimization techniques for implemented cryptographic algorithms

    Data Ingredients: smart disclosure and open government data as complementary tools to meet policy objectives. The case of energy efficiency.

    Get PDF
    Open government data are considered a key asset for eGovernment. One could argue that governments can influence other types of data disclosure, as potential ingredients of innovative services. To discuss this assumption, we took the example of the U.S. 'Green Button' initiative – based on the disclosure of energy consumption data to each user – and analysed 36 energy-oriented digital services reusing these and other data, in order to highlight their set of inputs. We find that apps suggesting to a user a more efficient consumption behaviour also benefit from average retail electricity cost/price information; that energy efficiency 'scoring' apps also need, at least, structured and updated information on buildings performance; and that value-added services that derive insights from consumption data frequently rely on average energy consumption information. More in general, most of the surveyed services combine consumption data, open government data, and corporate data. When setting sector-specific agendas grounded on data disclosure, public agencies should therefore consider (contributing) to make available all three layers of information. No widely acknowledged initiatives of energy consumption data disclosure to users are being implemented in the EU. Moreover, browsing EU data portals and websites of public agencies, we find that other key data ingredients are not supplied (or, at least, not as open data), leaving room for possible improvements in this arena

    POTC model for Safe and Secure Cyber Communication as well as Transactions

    Get PDF
    We are currently living in an age, where the use of the Internet has become second nature to millions of people. Not only business but all types of organization is depend on the Internet. More and more home users are practice the huge benefit of the Internet. However, this dependency and use of the Internet bring new and dangerous risks. This is due to increasing attempts from unauthorised third parties to compromise private information for their own benefit – the whole wide area of cyber crime. Cyber crime is also increase in cases of unawareness about online fraud and risks. Therefore it is essential that all users understand the risks of using Internet, the importance of securing their personal information and the consequences if it is not used properly. Hackers target home users due to this vulnerability. Due to improper development of website security and loopholes hackers can easily take benefit. This paper specify current frauds and proposes a POTC model, which provide guideline to home users as well as developer. POTC model proposes a way to improve information security awareness among home users and developer by presenting some information security steps

    Domain Computing: The Next Generation of Computing

    Get PDF
    Computers are indispensable in our daily lives. The first generation of computing started the era of human automation computing. These machine’s computational resources, however, were completely centralized in local machines. With the appearance of networks, the second generation of computing significantly improved data availability and portability so that computing resources could be efficiently shared among the networks. The service-oriented third generation of computing provided functionality by breaking down applications into services, on-demand computing through utility and cloud infrastructures, as well as ubiquitous accesses from wide-spread geographical networks. Services as primary computing resources are far spread from lo- cal to worldwide. These services loosely couple applications and servers, which allows services to scale up easily with higher availability. The complexity of locating, utilizing and optimizing computational resources becomes even more challenging as these resources become more available, fault-tolerant, scalable, better per- forming, and spatially distributed. The critical question becomes how do applications dynamically utilize and optimize unique/duplicate/competitive resources at runtime in the most efficient and effective way without code changes, as well as providing high available, scalable, secured and easy development services. Domain computing proposes a new way to manage computational resources and applications. Domain computing dy- namically manages resources within logic entities, domains, and without being bound to physical machines so that application functionality can be extended at runtime. Moreover, domain computing introduces domains as a replacement of a traditional computer in order to run applications and link different computational resources that are distributed over networks into domains so that a user can greatly improve and optimize the resource utilization at a global level. By negotiating with different layers, domain computing dynamically links different resources, shares resources and cooperates with domains at runtime so applications can more quickly adapt to dynamically changing environments and gain better performance. Also, domain computing presents a new way to develop applications which are resource stateless based. In this work, a prototype sys- tem was built and the performance of its various aspects has been examined, including network throughput, response time, variance, resource publishing and subscription, and secured communications

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    A Mobile based casual labourers management and payment solution

    Get PDF
    Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Mobile Telecommunication and Innovation at (MSc.MTI) at Strathmore UniversityCasual workers or casual labourers are workers who have an explicit or implicit contract of employment which is not expected to continue for more than a short period of time, and whose duration is to be determined by the specific terms of employment or specific task to be carried out. In the management of these casual labourers, the data collected has replication of data records including the daily or weekly registration of names, national id, and phone numbers. These records are also very prone to change because casual labourers are labour brokers, who can move from one employer to another without notice or any legal approval making calculation of wages very cumbersome and dynamic. There is also a high insecurity risk of theft in paying cash to the casuals in these workers in the remote working sites. The developed prototype has used agile methodology coming up with a web and mobile component. The web component handles project and task definition, reporting and user management. The mobile component allows for field data collection. Service Oriented Architecture was used, so as to allow connections to payment and SMS gateways. The developed prototype also got an overall acceptance rating of 80% using usability testing and 75% on functional testing

    An architecture for user preference-based IoT service selection in cloud computing using mobile devices for smart campus

    Get PDF
    The Internet of things refers to the set of objects that have identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social environments and user context. Interconnected devices communicating to each other or to other machines on the network have increased the number of services. The concepts of discovery, brokerage, selection and reliability are important in dynamic environments. These concepts have emerged as an important field distinguished from conventional distributed computing by its focus on large-scale resource sharing, delivery and innovative applications. The usage of Internet of Things technology across different service provisioning environments has increased the challenges associated with service selection and discovery. Although a set of terms can be used to express requirements for the desired service, a more detailed and specific user interface would make it easy for the users to express their requirements using high-level constructs. In order to address the challenge of service selection and discovery, we developed an architecture that enables a representation of user preferences and manipulates relevant descriptions of available services. To ensure that the key components of the architecture work, algorithms (content-based and collaborative filtering) derived from the architecture were proposed. The architecture was tested by selecting services using content-based as well as collaborative algorithms. The performances of the algorithms were evaluated using response time. Their effectiveness was evaluated using recall and precision. The results showed that the content-based recommender system is more effective than the collaborative filtering recommender system. Furthermore, the results showed that the content-based technique is more time-efficient than the collaborative filtering technique

    AGNI: an API for the control of automomous service robots

    Get PDF
    With the continuum growth of Internet connected devices, the scalability of the protocols used for communication between them is facing a new set of challenges. In robotics these communications protocols are an essential element, and must be able to accomplish with the desired communication. In a context of a multi-­‐‑agent platform, the main types of Internet communication protocols used in robotics, mission planning and task allocation problems will be revised. It will be defined how to represent a message and how to cope with their transport between devices in a distributed environment, reviewing all the layers of the messaging process. A review of the ROS platform is also presented with the intent of integrating the already existing communication protocols with the ServRobot, a mobile autonomous robot, and the DVA, a distributed autonomous surveillance system. This is done with the objective of assigning missions to ServRobot in a security context
    corecore