198 research outputs found
Secure Architectures for Mobile Applications
The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet)secure architecture, m-application, smart-cards, 3G Mobile
Security Issues of the Digital Certificates within Public Key Infrastructures
The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.digital certificates, certificates authority, ASN.1 DER/BER, PKI
Characteristics of the Audit Processes for Distributed Informatics Systems
The paper contains issues regarding: main characteristics and examples of the distributed informatics systems and main difference categories among them, concepts, principles, techniques and fields for auditing the distributed informatics systems, concepts and classes of the standard term, characteristics of this one, examples of standards, guidelines, procedures and controls for auditing the distributed informatics systems. The distributed informatics systems are characterized by the following issues: development process, resources, implemented functionalities, architectures, system classes, particularities. The audit framework has two sides: the audit process and auditors. The audit process must be led in accordance with the standard specifications in the IT&C field. The auditors must meet the ethical principles and they must have a high-level of professional skills and competence in IT&C field.informatics audit, characteristic, distributed informatics system, standard
University 4.4 â A Development Strategy for Education and Research Centers
Due to increased demand for qualified human resources, for 'new & rare skills', for software solutions, reliable products and services in the field of applied informatics, there are large available financial funds that can be accessed by Informatics and Cybernetics schools. Edu-cational and research departments must capitalize funds provided by the Europe-an/international institutions and private companies, by supporting the creation of spin-off en-tities that will conduct technology transfer projects. These funds must be used to increase the quality of teaching and to improve research results by assuring the financial needs and tech-nical resources of teachers (project based payments), students (scholarships projects) and the community (public available projects). The presented strategy, University 4.4 describes four development directions for a four years period. It has been developed by Catalin Boja, Razvan Bologa, Marius Popa and Cristian Toma and since November 2011 it represents the assumed development strategy of The Department of Economic Informatics and Cybernetics (DICE) from The Bucharest University of Economic Studies.University, Research, Strategy, Education, Informatics, Cybernetics, Department, DICE
Advanced Signal Processing and Command Synthesis for Memory-Limited Complex Systems
This paper presents advanced signal processing methods and command synthesis for memory-limited complex systems. For accurate measurements performed on limited time interval, some specific methods should be added. For signal processing, a robust filtering and sampling procedure performed on a specific working interval is required, so as the influence of low-amplitude and high-frequency fluctuations to be diminished. This study shows that such a signal processing method for the case of memory-limited complex systems requires the use of certain differentiation/integration procedures performed by oscillating systems, so as robust results suitable for efficient command synthesis to be available. A brief comparison with uncertainty aspects in modern physics (where quantum aspects can be considered as features of complex systems) is also presented
E-Commerce Project Management Implementation
The term eBusiness and eCommerce have many definition in IT fields. One of them is that the eBusiness is the integration of a company's business including products, procedures, and services over the Internet [ANIT00]. Ussualy and in practice a company turns its business into an eBusiness when it integrates the marketing, sales, accounting, manufacturing, and operations with web site activities. An eBusiness uses the Internet as a resource for all business activities.e-commerce, e-business, accounting, sales, manufacturing
E-Commerce Project Management Implementation
It is defined the informatics application interface concept and it is presented the role of this one in software using. There are pointed out the interface characteristics and the factors which lead to their efficiency. The software interfaces are classified on the base of many criteria. There are defined evaluation indicators for interface complexity that build the picture regarding operation facility of informatics application and their adaptation to new problem requirements.complexity, interface, entity
Secure Electronic Cards in Public Services
The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient's medical history and payment for private medical services. The security issue is a very important one as the patient's history is confidential and the payment has to be safe.public services, mobile, security, m-application, smart card
Secure Distributed Databases Using Cryptography
The computational encryption is used intensively by different databases management systems for ensuring privacy and integrity of information that are physically stored in files. Also, the information is sent over network and is replicated on different distributed systems. It is proved that a satisfying level of security is achieved if the rows and columns of tables are encrypted independently of table or computer that sustains the data. Also, it is very important that the SQL - Structured Query Language query requests and responses to be encrypted over the network connection between the client and databases server. All this techniques and methods must be implemented by the databases administrators, designer and developers in a consistent security policy.databases, encryption, cryptography, digital signature
- âŠ