11 research outputs found

    A Genetic Programming Approach to Geometrical Digital Content Modeling in Web Oriented Applications

    Get PDF
    The paper presents the advantages of using genetic techniques in web oriented problems. The specific area of genetic programming applications that paper approaches is content modeling. The analyzed digital content is formed through the accumulation of targeted geometrical structured entities that have specific characteristics and behavior. The accumulated digital content is analyzed and specific features are extracted in order to develop an analysis system through the use of genetic programming. An experiment is presented which evolves a model based on specific features of each geometrical structured entity in the digital content base. The results show promising expectations with a low error rate which provides fair approximations related to analyzed geometrical structured entities.Genetic Algorithm, Genetic Programming, Fitness, Geometrical Structured Entities, Analysis

    THE ANALYSIS OF INFORMATICS SECURITY COSTS IN CITIZEN ORIENTED APPLICATIONS

    Get PDF
    The paper highlights the analysis of informatics security costs for the citizen oriented applications. The citizen oriented informatics applications are defined. The differences brought by these when compared with the traditional applications are described. Structures of citizen oriented informatics applications are presented. A few common citizen oriented applications are discussed. The special security requirements of the citizen oriented applications are discussed. Ways of increasing the security of the applications are given.security, cost, estimation, citizen orientation, distributed applications

    BAYESIAN APPROACH TO RISK ASSESSMENT IN KNOWLEDGE BASED AUTHENTICATION

    Get PDF
    Knowledge is quantified according to [1] as expertise and skills acquired by a person, the theoretical understanding of a specific subject or facts and information with respect to a specific field or domain. According to [2] knowledge is information possessed by an individual which can be used in profit generating activities. Knowledge in the context of KBA is represented by common information known by the individual who will be used to confirm his identity. According to [1] authentication is the act of establishing or confirming something or someone as authentic. Considering access control, authentication is the process through which the identity of an individual is established through the use of a diverse set of credentials.risk assessment, knowledge

    Audit Techniques for Service Oriented Architecture Applications

    Get PDF
    The Service Oriented Architecture (SOA) approach enables the development of flexible distributed applications. Auditing such applications implies several specific challenges related to interoperability, performance and security. The service oriented architecture model is described and the advantages of this approach are analyzed. We also highlight several quality attributes and potential risks in SOA applications that an architect should be aware when designing a distributed system. Key risk factors are identified and a model for risk evaluation is introduced. The top reasons for auditing SOA applications are presented as well as the most important standards. The steps for a successful audit process are given and discussed.Service Oriented Architecture, Audit, Quality Attributes, Interoperability, Performance, Security

    Optimum Criteria for Developing Defined Structures

    Get PDF
    Basic aspects concerning distributed applications are presented: definition, particularities and importance. For distributed applications linear, arborescent, graph structures are defined with different versions and aggregation methods. Distributed applications have associated structures which through their characteristics influence the costs of the stages in the development cycle and the exploitation costs transferred to each user. The complexity of the defined structures is analyzed. The minimum and maximum criteria are enumerated for optimizing distributed application structures

    Aspects Concerning the Optimization of Authentication Process for Distributed Applications

    No full text
    There will be presented the types of distributed applications. The quality characteristics for distributed applications will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed. We will propose an algorithm for the optimization of authentication process. For the application “Evaluation of TIC projects” the algorithm proposed will be applied

    Audit Techniques for Service Oriented Architecture Applications

    No full text
    The Service Oriented Architecture (SOA) approach enables the development of flexible distributed applications. Auditing such applications implies several specific challenges related to interoperability, performance and security. The service oriented architecture model is described and the advantages of this approach are analyzed. We also highlight several quality attributes and potential risks in SOA applications that an architect should be aware when designing a distributed system. Key risk factors are identified and a model for risk evaluation is introduced. The top reasons for auditing SOA applications are presented as well as the most important standards. The steps for a successful audit process are given and discussed

    Aspects Concerning the Optimization of Authentication Process for Distributed Applications

    No full text
    There will be presented the types of distributed applications. The quality characteristics for distributed applications will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed. We will propose an algorithm for the optimization of authentication process. For the application “Evaluation of TIC projects” the algorithm proposed will be applied.optimization; security; authentication; distributed application.
    corecore