10 research outputs found

    Developing a Framework to Implement Public Key Infrastructure Enabled Security in XML Documents

    No full text
    This paper concentrates on proposing a framework to implement the PKI enables security in XML documents, by defining a common framework and processing rules that can be shared across applications using common tools, avoiding the need for extensive customization of applications to add security. The Framework reuses the concepts, algorithms and core technologies of legacy security systems while introducing changes necessary to support extensible integration with XML. This allows interoperability with a wide range of existing infrastructures and across deployments. Currently no strict security models and mechanisms are available that can provide specification and enforcement of security policies for XML documents. Such models are crucial in order to facilitate a secure dissemination of XML documents, containing information of different sensitivity levels, among (possibly large) user communities

    Design Considerations for Implementing Security in Web Services

    No full text
    The rapid growth in XML and increasing use of World Wide Web allow users to use internet as a platform for document sharing and hosting embedded with certain security features. XML is becoming most prevalent means through which documents and data are encoded for distribution among users on the web. Currently no strict security models and mechanisms are available that can provide specification and enforcement of security policies for XML documents. Such models are crucial in order to facilitate a secure dissemination of XML documents, containing information of different sensitivity levels, among (possibly large) user communities. This paper concentrates on proposing key design considerations to implement the PKI enables security in XML documents, by defining a component model and processing rules that can be shared across applications using common tools, avoiding the need for extensive customisation of applications to add security. The considerations reuses the concepts, algorithms and core technologies of legacy security systems while introducing changes necessary to support extensible integration with XML. This allows interoperability with a wide range of existing infrastructures and across deployments

    Impact of Deceptive Marketing on Consumers Behavior: A Case of Cellular Industry of Pakistan

    Get PDF
    The research study discusses the relationship between deceptive marketing and consumer behavior regarding the telecommunication industry of Pakistan. As Pakistan is the third largest telecommunication emerging market in the world so, the factors that affect the reaction of consumers are important.  Many customers who use different cellular networks are deceived through false marketing and deceptive features shown in the advertising. The factors that are considered deceptive according to the consumers are examined, that are incorrect interpretation, financial and emotional loss and misleading claims to determine consumer behavior. Moreover, the reaction to these factors is also considered when the customer is exposed to deception in marketing. Keywords: Deceptive marketing, Consumers behavior, incorrect interpretation, financial and emotional loss, misleading claims and cellular industry

    Substantial and sustained reduction in under-5 mortality, diarrhea, and pneumonia in Oshikhandass, Pakistan : Evidence from two longitudinal cohort studies 15 years apart

    Get PDF
    Funding Information: Study 1 was funded through the Applied Diarrheal Disease Research Program at Harvard Institute for International Development with a grant from USAID (Project 936–5952, Cooperative Agreement # DPE-5952-A-00-5073-00), and the Aga Khan Health Service, Northern Areas and Chitral, Pakistan. Study 2 was funded by the Pakistan US S&T Cooperative Agreement between the Pakistan Higher Education Commission (HEC) (No.4–421/PAK-US/HEC/2010/955, grant to the Karakoram International University) and US National Academies of Science (Grant Number PGA-P211012 from NAS to the Fogarty International Center). The funding bodies had no role in the design of the study, data collection, analysis, interpretation, or writing of the manuscript. Publisher Copyright: © 2020 The Author(s).Peer reviewedPublisher PD

    Developing a Framework to Implement Security in Web Services

    No full text
    Recent advancement in XML and increasing use of World Wide Web allow users to use internet as a document sharing and hosting system, with certain security features. Currently no guidelines are available for developers to enforce security policies for XML and Web Services. It is crucial in order to facilitate a secure dissemination of XML documents, containing information of different sensitivity levels, among (possibly large) user communities. The paper concentrates on developing a framework and proposing design considerations to implement the PKI enables security in XML documents and web services, by defining a component model and processing rules that can be shared across applications using common tools, avoiding the need for extensive customisation of applications to add security. This allows interoperability with a wide range of existing infrastructures and across deployments

    नासिरा शर्मा के कथा साहित्य में संवेदना एवं शिल्प

    No full text
    उपसंहार के रूप में लिखा जाए तों लेखिका मानव – मात्र की समस्याओं , विम्बनाओं , भावनाओं एवं संवेदनाओं की अभिव्यंजित करती हैं । जिसमें कभी वे अन्य महिला लेखिकाओं की भांती एक सामान्य से मानव की समस्या को लेकर लेखनी चलाती हैं । वो कभी वर्ग विशेष की ऐसी समस्या को लेती हैं जो विशेष होकर भी सामान्य हो सकती हैं । कई स्थलों पर जगह , धर्म , आदि का भी उल्लेख नहीं किया हैं । वास्तव में लेखिका यही कहना चाहती हैं कि वह एक मानव की बात कर रही हैं , जो संसार के किसी भी कोने में स्थित व्यक्ति की हो सकती हैं

    From Faskh to Khula: Transformation of Muslim Women’s Right to Divorce in Pakistan (1947-2017)

    No full text
    corecore