140 research outputs found

    Etransactions in the Australian supply chain setting

    Get PDF
    Many sectors of the Australian economy have, in recent years, undertaken an analysis of their supply chain structures. Each sector has determined the underlying technologies to be recommended for use on the basis of past practice in that sector and, in some cases, international practice in the sector. In this article, the authors examine the current role of e-transactions within the context of Australian supply chains. Our analysis indicates that there is a bifurcation of technical choices along the demarcations of XML and EDI business solutions. For instance, while Mining and Finance have gone the XML route, Wholesale and Retail Trade, along with Transport and Storage have chosen EDI. Moreover, the Health sector appears to be leaning towards keeping both options open to its organizations. We argue that two factors will need to be considered which will be affected greatly by this parting of the ways on the technology issue. One is the concept of ‘design for supply chain’ which involves demand generation through joint development of new products and the flow of material across different supply chain entities. The second is the impact of the growth of global trade within international economic blocs. A natural conclusion is that Australian industry must support a merging of EDI and XML standards

    An effective and efficient testing methodology for correctness testing for file recovery tools

    Full text link
    We hereby develop an effective and efficient testing methodology for correctness testing for file recovery tools across different file systems. We assume that the tool tester is familiar with the formats of common file types and has the ability to use the tools correctly. Our methodology first derives a testing plan to minimize the number of runs required to identify the differences in tools with respect to correctness. We also present a case study on correctness testing for file carving tools, which allows us to confirm that the number of necessary testing runs is bounded and our results are statistically sound. <br /

    A characterization of finite linear spaces on v points, n2⩽v<(n+1)2, andb=n2+n+3 lines, n⩾10

    Get PDF
    AbstractCharacterizations of finite linear spaces on v points, n2⩽v<(n+1)2and b=n2+n+1 lines, and on v points, n2⩽v<(n+1)2 and b =n2+n+2 lines have been given by de Witte (unpublished), Stinson (1983) and Batten (1980). Here we extend such a characterization to include the case b=n2+n+3. We show that if n⩾10, then, if it is not a near-pencil, the space is an affine plane of order n less up to three points, with three additional ‘points at infinity’, and three lines, each of size two, on these points

    Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks

    Full text link
    Wireless sensor networks represent a new generation of real-time&nbsp; embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.<br /

    Teaching digital forensics to undergraduate students

    Full text link
    Digital forensics isn\u27t commonly a part of an undergraduate university degree, but Deakin University in Australia recently introduced the subject as part of an IT security course. As instructors, we\u27ve found that digital forensics complements our other security offerings because it affords insights into why and how security fails. A basic part of this course is an ethics agreement signed by students and submitted to the unit instructor. This agreement, approved by Deakin University\u27s legal office and consistent with Barbara Endicott-Popovsky\u27s approach, requires students to maintain a professional and ethical attitude to the subject matter and its applications. Assignments regularly cast students in the role of forensic professional. Our teaching team emphasizes throughout the course that professional conduct establishes credibility with employers and customers as well as colleagues, and is required to perform the job effectively. This article describes our experiences with this course.<br /

    Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks

    Full text link
    Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.<br /

    E-business security strategies for SMEs

    Full text link
    The major barriers to the Implementation of electronic commerce by businesses globally arc well understood. These comprise security and pnvacy issues, the lack of established regulations governing commercial behaviour and liability, and the lack of universally accepted standards. In this article. we focus on the security concerns of Australian SMEs. Medium, and especially small, enterprises are hindered in the implementation of communications security technology by a lack of expertize and a poor understandmg of the services and resources available to them. As a response to this situation, we examme the facilities avallable to Australian SMEs which help them to make reasonable e- secunty decisions as part of an overall e-busmess strategy. We demonstrate that there are sufficient resources at appropnate levels of availability to enable small and medium Australian enterprises to implement communicatlons security effectively.<br /

    Zero permission android applications - attacks and defenses

    Full text link
    Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties

    Permutations with a distinct difference property

    Get PDF
    The topic of this paper arose out of a consideration of Costas sequences, which are used in sonar and radar applications. These sequences have the defining property that all differences of elements the same distance apart, are different. Several infinite families of Costas sequences are known; but there are many existence questions for length greater-or-equal to 32. In this article, we restrict ourselves to sequences with the weaker property that all adjacent differences are different. We give a recursive construction for these, as well as building several infinite families.<br /
    • …
    corecore