103 research outputs found
Policy based runtime verification of information flow.
Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this thesis belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. The methodology of the proposed approach is made up of eight work packages. One addresses the research background and the research project requirements. Six are scientific research work packages. The last work package concentrates on the thesis writing up. There is currently no monitoring mechanism for controlling information flow during runtime that support behaviour configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behaviours or modify the way that information flows while the program is executing. One of the motivations for this research is the information flow policy in the hand of the end user. The main objective of this research is to develop a usable security mechanism for controlling information flow within a software application during runtime. Usable security refers to enabling users to manage their systems security without defining elaborate security rules before starting the application. Our aim is to provide usable security that enables users to manage their systems' security without defining elaborate security rules before starting the application. Security will be achieved by an interactive process in which our framework will query the user for security requirements for specific pieces of information that are made available to the software and then continue to enforce these requirements on the application using a novel runtime verification technique for tracing information flow. The main achievement of this research is a usable security mechanism for controlling information flow within a software application during runtime. Security will be achieved by an interactive process to enforce user requirements on the application using runtime verification technique for tracing information flow. The contributions are as following. Runtime Monitoring: The proposed runtime monitoring mechanism ensures that the program execution is contains only legal flows that are defined in the information flow policy or approved by the user. Runtime Management: The behaviour of a program that about to leak confidential information will be altered by the monitor according to the user decision. User interaction control: The achieved user interaction with the monitoring mechanism during runtime enable users to change the program behaviours while the program is executing.Libyan Embass
Information Quality Characteristics for M-Learning Applications
This research study investigates the potential to apply a quality analysis process for mobile learning (M-learning) software applications in accordance to a defined set of information quality characteristics in attempt to increase the level of quality in the mobile learning systems. This empirical study is conducted on widely accepted and used M-learning application form both close source and open source systems comprising a known reasonable amount of MLOC, medium-scale. Four M-learning applications were selected for conducting this study including Moodle, Blackboard, Edmodo and Schoology. The systems are statically analyzed and examined to determine if it meets the proposed quality characteristics or not. For each system the features and techniques used with respect to the defined characteristics are determined and tabulated. This study focuses mainly on particular information quality characteristics include maintainability, reusability, testability, and security. The data shows that the approach is applicable and effective but needs further formalization and improvement to be effectively implemented. New ideas are additionally proposed for future work to include other dimensions of the M-learning application quality characteristics such as availability, reliability, performance, usability, and functionality. This empirical study is part of funded research project investigating the development, adoption and dissemination of M-learning in Oman
Examining the roles of students’ beliefs and security concerns for using smartwatches in higher education
Do Learners’ Characteristics Matter? An Exploration of Mobile-learning Adoption in Self-directed Learning
This paper aims to identify individual characteristics that motivate learners to use mobile-learning. It sheds light on our current knowledge by a) examining an m-learning adoption model which accounts for learners’ characteristics (learning style and personal innovativeness) in addition to previously studied mobile platform characteristics and b) considering the context in which learning occurs (formal and informal). A framework has been introduced and empirically tested. Results suggest that individuals’ learning style and perceived playfulness influence m-learning usage in both learning situations; while performance expectancy and personal innovativeness are only influential in specific learning contexts. This study highlights the role of learners’ characteristics in m-learning adoption and emphasizes the importance of distinguishing between various types of m-learning. This multi-disciplinary research enriches m-learning literature and offers practical implications for educators using mobile technologies as well as developers of virtual learning platforms
The Technical, Non-technical Issues and the Challenges of Migration to Free and Open Source Software
Abstract Interest has been raised over software that has been developed not by dedicated software companies but by groups of independent programmers with different level of experience who collaborate over the Internet and offer the fruits of their labor free. Open source software communities have successfully developed many software pieces and suggest Free Open Source Software (FOSS) as a solution for a lot of computing problems, although most computer users only use proprietary applications. Many proprietary software users claim that open source software invites problems, such as, generating software codes that could be vulnerable to hackers and prone to errors. This paper presents an overview of the real issues and challenges for the migration to free and open source software (FOSS) and suggests some important criteria for assessing migration issues and challenges. Migratory problems may be divided into technical and nontechnical issues and challenges. The technical issues and challenges include performance, technical infrastructure, usability, integrity, support availability, security, information flow control, data migration, flexibility and ease of use and management and maintenance of OSS, whereas the non-technical issues and challenges include organizational culture, human factors (staff skills) and legal issues
Role of CD2 associated protein in podocyte differentiation
The glomerular ultrafiltration barrier contains highly terminally differentiated podocytes with major processes and foot processes interlinked by ultrathin slit diaphragms. A number of molecules that are associated with nephrosis and podocyte damage have been described and these discoveries have given insight into the mechanisms that lead to podocyte injury. One of these molecules is CD2-associated protein (CD2AP), which is a crucial protein for slit- diaphragm assembly and function. In spite of the fact that CD2AP knockout causes nephrotic syndrome in mice and the heterozygous +/- mouse is prone to proteinuria, little is known about the relevance of this molecule in human renal pathology. In this thesis I studied the effect of a disease causing CD2AP mutation on the human podocyte phenotype. I identified the dramatic effects of the CD2AP mutation on the morphology of the cells and on the expression of mesenchymal, epithelial and other markers. I found that in contrast to wild type podocytes, CD2AP mutant podocytes acquired the characteristics of dedifferentiated cells. I compared the phenotypic characteristics of the CD2AP mutant podocytes with podocytes carrying mutations in the transcription factor WTI which is essential for normal nephrogenesis. Surprisingly, this study detected a similar de-differentiated phenotype in the CD2AP mutant podocytes to that seen in podocytes carrying a mutation in the WTl gene. In view of these phenotypic similarities I studied whether there is a functional link between CD2AP and WTI which confer these similarities in cellular phenotype. CD2AP is also known to bind to WTIP (WTl interacting protein), a molecule that binds WTI and can shuttle to the nucleus during podocyte injury. In this study, I found that WTIP might provide the functional link between CD2AP and WTl. In addition, in this study I have established the first conditionally immortalized human glomerular mesangial cell line with unique migratory properties, which will be an important adjunct in studies of representative glomerular cells, as well as in eo-culture studies. Overall this thesis demonstrates that there are clear implications for a novel role for CD2AP in the development and progression of glomerular disease. This thesis also discusses a novel conditionally immortalized human mesangial cell line that represents a new tool for the study of human mesangial cell biology in vitro.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
M-learning in Education: Omani Undergraduate Students Perspective
AbstractThe purpose of this research is to analyze and evaluate students’ knowledge and awareness about M-learning. This empirical study includes 56 university students from computer engineering and science departments in University of Sultan Qaboos. This study consists of two parts. The first part involved study overview presentation and students’ discussion about M-learning. The second part included survey study that consists of three phases: General information, M-learning knowledge and M-learning perception. Based on the study survey questions regarding the knowledge, acceptance and use of M-learning, the students respond are analyzed and evaluated. The study initial findings indicated good M-learning awareness and acceptance level and show students positive attitude that reflect students interesting in the use of mobile devices as learning tools
- …
