25,014 research outputs found
Intrusion detection mechanisms for VoIP applications
VoIP applications are emerging today as an important component in business
and communication industry. In this paper, we address the intrusion detection
and prevention in VoIP networks and describe how a conceptual solution based on
the Bayes inference approach can be used to reinforce the existent security
mechanisms. Our approach is based on network monitoring and analyzing of the
VoIP-specific traffic. We give a detailed example on attack detection using the
SIP signaling protocol
Securing a Healthy Future: The Commonwealth Fund State Scorecard on Child Health System Performance, 2011
Ranks states on twenty indicators of healthcare access, affordability, prevention and treatment, potential for healthy lives, and health system equity for children. Examines the need for targeted initiatives and policy implications for better performance
Blocking Java Applets at the Firewall
This paper explores the problem of protecting a site on the Internet against hostile external Java applets while allowing trusted internal applets to run. With careful implementation, a site can be made resistant to current Java security weaknesses as well as those yet to be discovered. In addition, we describe a new attack on certain sophisticated firewalls that is most effectively realized as a Java applet
Enhancing Data Security by Making Data Disappear in a P2P Systems
This paper describes the problem of securing data by making it disappear
after some time limit, making it impossible for it to be recovered by an
unauthorized party. This method is in response to the need to keep the data
secured and to protect the privacy of archived data on the servers, Cloud and
Peer-to-Peer architectures. Due to the distributed nature of these
architectures, it is impossible to destroy the data completely. So, we store
the data by applying encryption and then manage the key, which is easier to do
as the key is small and it can be hidden in the DHT (Distributed hash table).
Even if the keys in the DHT and the encrypted data were compromised, the data
would still be secure. This paper describes existing solutions, points to their
limitations and suggests improvements with a new secure architecture. We
evaluated and executed this architecture on the Java platform and proved that
it is more secure than other architectures.Comment: 18 page
Assessment of Haiti’s electricity sector
INTRODUCTION:
This report summarizes the current state of the electricity sector in Haiti, to form a
knowledge base from which to subsequently evaluate options for how best to
increase electricity access in Haiti.
Accordingly, this report summarizes the results of an extensive review of the
publicly-available information on the electricity sector in Haiti, supplemented by
targeted interviews with selected individuals known to be knowledgeable about
electricity in Haiti based on their recent involvement in assessing the sector or in
pursuing/supporting development opportunities. [TRUNCATED
- …