9 research outputs found

    An object-based decentralized resource manager for heterogeneous computing environments

    No full text
    Ph.D. - Doctoral Progra

    Architectural design of an access control system for enterprise networks

    No full text
    Client computers in enterprise networks have the potential to be the source of serious security problems, especially when their hardware and software components are out of physical administrative control. Besides, services in the network may have client configuration requirements. We propose a system composed of a policy management and enforcement server and client agents, which authenticates the client users and checks their computer configurations before allowing their access to services. The information modeling within the design is based on common information model. Web services are used for communication, following the related specifications in Web based enterprise management

    Türk üniversiteleri'nin uluslararası internet bilgisayar ağına bağlanması

    No full text
    internet, uluslararası platformda yaklaşık 3 milyon bilgisayarı bağlayan eğitim, araştırma, kamu ve özel sektör kuruluşlarına hizmet veren bir ağdır. Günümüzde en gelişkin ağ olma özelliğine sahip olan Internet)in ülke içinde yaygınlaştırılmasının getireceği yararlar sayısızdır, internet'in dünyadaki gelişme hızının artarak devam edeceği öngörülmektedir. Ülkemizin bu gelişim eğrisini yakalayabilmesi amacıyla ilk efaapta, üniversitelerimizin internet ağına dahil olması için "Türk Üniversiteleri'nin Uluslararası Internet Bilgisayar Ağına Bağlanması" adıyla bir proje başlatılmıştır

    An architecture for end-to-end and inter-domain trusted mail delivery service

    No full text
    Common methods of e-mail delivery over the Internet is vulnerable to some significant security risks. In this study, a "Trusted Mail Gateway" aiming at reliable and trusted end-to-end e-mail delivery is presented. The designed Trusted Mail Gateway provides a domain with the basic security services that are message integrity, confidentiality, non-repudiation, origin authentication and availability while the message (e-mail) is being delivered through the Internet. It generates S/MIME digital signatures and performs S/MIME encryption on behalf of the domain using secret key cryptography and public-key techniques and generating Cryptographic Message Syntax (CMS) data to provide origin authenticity, integrity and confidentiality. It applies anti-virus control and protection, spam filtering and content check to both incoming mails to the domain and outgoing mails from the domain to prevent attacks against availability. Trusted Mail Gateway also provides intra-domain security. It keeps e-mail messages in corresponding mailboxes as encrypted messages. Trusted Mail Gateway processes all the mails passing through and records processing results in database as notary information. Moreover, it establishes trust relations with other registered trusted domains and exchanges notary information with them via a secure channel.A viscometer technique based on the measurement of the torque required to turn a propeller inserted into milk powders and a penetration test based on the measurement of force required to penetrate milk powder compacts were used to characterize stickiness and cake formation in whole and skim milk powders. These simple techniques were suitable for determining the sticky point temperature (SPT) of the milk powders. Furthermore, the techniques provided useful information regarding the sticking behavior of the milk powders prior to the SPT. The stickiness and cake formation in the whole and skim milk powders were quite different due to the significant variation in the surface composition of these powders. Effects Of Moisture content, applied load, temperature, and time on the stickiness of the milk powders were also established

    Security on Mobile Phones with Lightweight Cryptographic Message Syntax

    No full text
    Cryptographic Message Syntax (CMS) is a standard for protecting messages cryptographically. Using CMS, messages can be protected in different content types such as signed-data, enveloped-data, digested-data and authenticated-data. CMS is architected around certificate based key management and symmetric cryptography. In this article, a lightweight CMS envelope is proposed for the mobile phones which have limited memory and processing power, in order to provide the privacy of the data either stored on them or exchanged by means of multimedia messaging (MMS) and e-mail. A sample prototype is implemented on mobile phone which makes use of the proposed lightweight CMS. The prototype is compared with standard CMS in terms of application size and performance. The application size decreases approximately by 35% and the envelope preparation duration and resolution is much shorter with lightweight CMS in comparison to standard CMS

    Security on mobile phones with lightweight cryptographic message syntax

    No full text
    Cryptographic Message Syntax (CMS) is a standard for protecting messages cryptographically. Using CMS, messages can be protected in different content types such as signed-data, enveloped-data, digested-data and authenticated-data. CMS is architected around certificate based key management and symmetric cryptography. In this article, a lightweight CMS envelope is proposed for the mobile phones which have limited memory and processing power, in order to provide the privacy of the data either stored on them or exchanged by means of multimedia messaging (MMS) and e-mail. A sample prototype is implemented on mobile phone which makes use of the proposed lightweight CMS. The prototype is compared with standard CMS in terms of application size and performance. The application size decreases approximately by 35% and the envelope preparation duration and resolution is much shorter with lightweight CMS in comparison to standard CMS

    Design of a Log Server for Distributed and Large-Scale Server Environments

    No full text
    Collection, storage and analysis of multiple hosts' audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale computing environments. To ease these tasks, and to provide a central management facility, a software-suit, named as "LogHunter " has been developed. Log-Hunter is a secure distributed log server system which involves log collection and consolidation in a large-scale environment having multiple hosts that keeps at least one audit trail. This architecture also eases the inspection and monitoring of the audit trails generated on multiple hosts. By consolidating all the audit trails on a centralized server, it significantly reduces the manpower requirement, and also provides secure log storage for inspection of log entries as it becomes necessary. This paper presents the functional specifications, architecture and some preliminary performance results of the Log-Hunter
    corecore