23,354 research outputs found
A Security Pattern for Cloud service certification
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding
the security, privacy, governance and compliance of the data and software services offered through it. However, the task of verifying security
properties in services running on cloud is not trivial. We notice the provision and security of a cloud service is sensitive. Because of the
potential interference between the features and behavior of all the inter-dependent services in all layers of the cloud stack (as well as dynamic
changes in them). Besides current cloud models do not include support for trust-focused communication between layers. We present a
mechanism to implement cloud service certification process based on the usage of Trusted Computing technology, by means of its Trusted Computing Platform (TPM) implementation of its architecture. Among many security security features it is a tamper proof resistance built in device and provides a root of trust to affix our certification mechanism. We present as a security pattern the approach for service certification based on the use TPM.Universidad de Málaga. Campus de Excelencia Internacional AndalucĂa Tec
Rethinking affordance
n/a – Critical survey essay retheorising the concept of 'affordance' in digital media context. Lead article in a special issue on the topic, co-edited by the authors for the journal Media Theory
Online Mobile Phone Recharge System in Nigeria
An e-portal system that allows mobile phone users to recharge their phones online
without necessary purchasing any recharge card is proposed. With this e-portal system,
users simply provide the amount to be loaded on the specified phone number and some
series of validation are performed before finally recharging the phone with the specified
amount. This e-portal system also eliminates the burden of generating random numbers as
recharge cards and the subsequent huge database accompanied with the storage of these
randomly generated numbers. Mobile service providers are still faced with the challenges
of inefficient bandwidth utilization and congestion in the transmission channel. One of the
main reasons for this congestion is the toll placed on the network by the need to
reload/recharge phone credits in order to enable calls. The solution proposed in this paper is
meant to improve bandwidth utilization by taking the process of recharging off the mobile
clients
Effect of Values and Technology Use on Exercise: Implications for Personalized Behavior Change Interventions
Technology has recently been recruited in the war against the ongoing obesity
crisis; however, the adoption of Health & Fitness applications for regular
exercise is a struggle. In this study, we present a unique demographically
representative dataset of 15k US residents that combines technology use logs
with surveys on moral views, human values, and emotional contagion. Combining
these data, we provide a holistic view of individuals to model their physical
exercise behavior. First, we show which values determine the adoption of Health
& Fitness mobile applications, finding that users who prioritize the value of
purity and de-emphasize values of conformity, hedonism, and security are more
likely to use such apps. Further, we achieve a weighted AUROC of .673 in
predicting whether individual exercises, and we also show that the application
usage data allows for substantially better classification performance (.608)
compared to using basic demographics (.513) or internet browsing data (.546).
We also find a strong link of exercise to respondent socioeconomic status, as
well as the value of happiness. Using these insights, we propose actionable
design guidelines for persuasive technologies targeting health behavior
modification
- …