25,014 research outputs found

    Intrusion detection mechanisms for VoIP applications

    Get PDF
    VoIP applications are emerging today as an important component in business and communication industry. In this paper, we address the intrusion detection and prevention in VoIP networks and describe how a conceptual solution based on the Bayes inference approach can be used to reinforce the existent security mechanisms. Our approach is based on network monitoring and analyzing of the VoIP-specific traffic. We give a detailed example on attack detection using the SIP signaling protocol

    Securing a Healthy Future: The Commonwealth Fund State Scorecard on Child Health System Performance, 2011

    Get PDF
    Ranks states on twenty indicators of healthcare access, affordability, prevention and treatment, potential for healthy lives, and health system equity for children. Examines the need for targeted initiatives and policy implications for better performance

    Blocking Java Applets at the Firewall

    Full text link
    This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet

    Enhancing Data Security by Making Data Disappear in a P2P Systems

    Get PDF
    This paper describes the problem of securing data by making it disappear after some time limit, making it impossible for it to be recovered by an unauthorized party. This method is in response to the need to keep the data secured and to protect the privacy of archived data on the servers, Cloud and Peer-to-Peer architectures. Due to the distributed nature of these architectures, it is impossible to destroy the data completely. So, we store the data by applying encryption and then manage the key, which is easier to do as the key is small and it can be hidden in the DHT (Distributed hash table). Even if the keys in the DHT and the encrypted data were compromised, the data would still be secure. This paper describes existing solutions, points to their limitations and suggests improvements with a new secure architecture. We evaluated and executed this architecture on the Java platform and proved that it is more secure than other architectures.Comment: 18 page

    Assessment of Haiti’s electricity sector

    Full text link
    INTRODUCTION: This report summarizes the current state of the electricity sector in Haiti, to form a knowledge base from which to subsequently evaluate options for how best to increase electricity access in Haiti. Accordingly, this report summarizes the results of an extensive review of the publicly-available information on the electricity sector in Haiti, supplemented by targeted interviews with selected individuals known to be knowledgeable about electricity in Haiti based on their recent involvement in assessing the sector or in pursuing/supporting development opportunities. [TRUNCATED
    • …
    corecore