139 research outputs found

    Application and Education of \u27Multiple Risk Communicator\u27

    Get PDF
    Non

    Proposal and Implementation of SSH Client System Using Ajax

    Get PDF
    Abstract. Technology called Ajax gives web applications the functionality and operability of desktop applications. In this study, we propose and implement a Secure Shell (SSH) client system using Ajax, independent of the OS or Java execution environment. In this system, SSH packets are generated on a web browser by using JavaScript and a web server works as a proxy in communication with an SSH server to realize end-to-end SSH communication. We implemented a prototype program and confirmed by experiment that it runs on several web browsers and mobile phones. This system has enabled secure SSH communication from a PC at an Internet cafe or any mobile phone. By measuring the processing performance, we verified satisfactory performance for emergency use, although the speed was unsatisfactory in some cases with mobile phone. The system proposed in this study will be effective in various fields of E-Business

    HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery

    Get PDF
    These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve this problem, providers encrypt data, and the owner of the computer performs decoding in the memory for encrypted data. The computer owner can be limited to performing only certain processing of data and to observing only the final results. As an implementation that uses existing technology to realize this solution, the processing of data contained in a smart card was considered, but such an implementation would not be practical due to issues related to computer capacity and processing speed. Accordingly, the authors present the concept of PC-based High Grade AntiTamper Equipment (HiGATE), which allows data to be handled without revealing the data content to administrators or users. To verify this concept, an eDiscovery application on a prototype was executed and the results are reported here

    HiGate (High Grade Anti‐Tamper Equipment) Prototype and Application to e‐Discovery

    Get PDF
    These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve this problem, providers encrypt data, and the owner of the computer performs decoding in the memory for encrypted data. The computer owner can be limited to performing only certain processing of data and to observing only the final results. As an implementation that uses existing technology to realize this solution, the processing of data contained in a smart card was considered, but such an implementation would not be practical due to issues related to computer capacity and processing speed. Accordingly, the authors present the concept of PC-based High Grade Anti-Tamper Equipment (HiGATE), which allows data to be handled without revealing the data content to administrators or users. To verify this concept, an e-Discovery application on a prototype was executed and the results are reported here. Keyword: Anti-Tamper, e-Discovery, Bitlocker, APIHoo

    IMPLEMENTING BOOT CONTROL FOR WINDOWS VISTA

    Get PDF
    Abstract A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts. This paper describes an enhanced version of Dig-Force2, which uses a TPM and a white list to provide boot control functionality for Windows Vista systems. In addition, the paper presents the results of security and performance evaluations of the boot control system

    Organizing Active Learning Models in Science Classes (2)

    Get PDF
    The purpose of this study is to organize active learning models in science classes. Through classroom practice from elementary school to upper secondary school, we observed the followings: 1) the "reciprocal of internalization and externalization," which means collaborative and cooperative learning, is the key to active learning in science lessons; 2) by creating a "subject skeleton," teachers can gain clarity regarding the promotion of deep learning and organize active learning models in science classes

    Interploidy gene flow involving the sexual-asexual cycle facilitates the diversification of gynogenetic triploid Carassius fish

    Get PDF
    クローン繁殖フナは稀に有性生殖をしながら繁栄 --遺伝的に多様なクローンフナが存在する謎を解明--. 京都大学プレスリリース. 2021-11-19.Asexual vertebrates are rare and at risk of extinction due to their restricted adaptability through the loss of genetic recombination. We explore the mechanisms behind the generation and maintenance of genetic diversity in triploid asexual (gynogenetic) Carassius auratus fish, which is widespread in East Asian fresh waters and exhibits one of the most extensive distribution among asexual vertebrates despite its dependence on host sperm. Our analyses of genetic composition using dozens of genetic markers and genome-wide transcriptome sequencing uncover admixed genetic composition of Japanese asexual triploid Carassius consisting of both the diverged Japanese and Eurasian alleles, suggesting the involvement of Eurasian lineages in its origin. However, coexisting sexual diploid relatives and asexual triploids in Japan show regional genetic similarity in both mitochondrial and nuclear markers. These results are attributed to a unique unidirectional gene flow from diploids to sympatric triploids, with the involvement of occasional sexual reproduction. Additionally, the asexual triploid shows a weaker population structure than the sexual diploid, and multiple triploid lineages coexist in most Japanese rivers. The generated diversity via repeated interploidy gene flow as well as an increased establishment of immigrants is assumed to offset the cost of asexual reproduction and might contribute to the successful broad distribution of this asexual vertebrate
    corecore