13 research outputs found

    Developing a Framework to Implement Public Key Infrastructure Enabled Security in XML Documents

    No full text
    This paper concentrates on proposing a framework to implement the PKI enables security in XML documents, by defining a common framework and processing rules that can be shared across applications using common tools, avoiding the need for extensive customization of applications to add security. The Framework reuses the concepts, algorithms and core technologies of legacy security systems while introducing changes necessary to support extensible integration with XML. This allows interoperability with a wide range of existing infrastructures and across deployments. Currently no strict security models and mechanisms are available that can provide specification and enforcement of security policies for XML documents. Such models are crucial in order to facilitate a secure dissemination of XML documents, containing information of different sensitivity levels, among (possibly large) user communities

    Design Considerations for Implementing Security in Web Services

    No full text
    The rapid growth in XML and increasing use of World Wide Web allow users to use internet as a platform for document sharing and hosting embedded with certain security features. XML is becoming most prevalent means through which documents and data are encoded for distribution among users on the web. Currently no strict security models and mechanisms are available that can provide specification and enforcement of security policies for XML documents. Such models are crucial in order to facilitate a secure dissemination of XML documents, containing information of different sensitivity levels, among (possibly large) user communities. This paper concentrates on proposing key design considerations to implement the PKI enables security in XML documents, by defining a component model and processing rules that can be shared across applications using common tools, avoiding the need for extensive customisation of applications to add security. The considerations reuses the concepts, algorithms and core technologies of legacy security systems while introducing changes necessary to support extensible integration with XML. This allows interoperability with a wide range of existing infrastructures and across deployments

    Impact of Deceptive Marketing on Consumers Behavior: A Case of Cellular Industry of Pakistan

    Get PDF
    The research study discusses the relationship between deceptive marketing and consumer behavior regarding the telecommunication industry of Pakistan. As Pakistan is the third largest telecommunication emerging market in the world so, the factors that affect the reaction of consumers are important.  Many customers who use different cellular networks are deceived through false marketing and deceptive features shown in the advertising. The factors that are considered deceptive according to the consumers are examined, that are incorrect interpretation, financial and emotional loss and misleading claims to determine consumer behavior. Moreover, the reaction to these factors is also considered when the customer is exposed to deception in marketing. Keywords: Deceptive marketing, Consumers behavior, incorrect interpretation, financial and emotional loss, misleading claims and cellular industry

    Substantial and sustained reduction in under-5 mortality, diarrhea, and pneumonia in Oshikhandass, Pakistan : Evidence from two longitudinal cohort studies 15 years apart

    Get PDF
    Funding Information: Study 1 was funded through the Applied Diarrheal Disease Research Program at Harvard Institute for International Development with a grant from USAID (Project 936–5952, Cooperative Agreement # DPE-5952-A-00-5073-00), and the Aga Khan Health Service, Northern Areas and Chitral, Pakistan. Study 2 was funded by the Pakistan US S&T Cooperative Agreement between the Pakistan Higher Education Commission (HEC) (No.4–421/PAK-US/HEC/2010/955, grant to the Karakoram International University) and US National Academies of Science (Grant Number PGA-P211012 from NAS to the Fogarty International Center). The funding bodies had no role in the design of the study, data collection, analysis, interpretation, or writing of the manuscript. Publisher Copyright: © 2020 The Author(s).Peer reviewedPublisher PD

    Prospects and challenges of teaching Science in response to Covid-19 pandemic

    No full text
    Science instructional practices around the world raise concerns. The situation in Pakistan is even grave where various studies highlight the use of direct instruction that promotes rote learning. Whereas the national curriculum of science suggests inquiry-based approaches for teaching science. Meanwhile there was this stark disparity between intended curriculum and actual science practices, Pakistan like every other place was hit by COVID-19. Teachers in the urban settings transitioned from face-to-face classrooms to various forms of instruction with initially no idea and gradually learnt to teach science in this newer uncertain time. Because this sudden transition was a result of a unique health crisis and for this Pakistani schools were barely prepared. This study focused on exploring the efforts that science teachers made in teaching science to elementary grade students during the COVID 19 era.. A qualitative case study was employed to explore the science instructional practices of teachers during the pandemic using semi-structured interviews, lesson plans and worksheets as its key data sources. This case study also showed the potential of online teaching where science teachers used various online resources to support students’ learning. Results also provides hope for meaningful integration of technology for science teaching and learning even in the face -to-face science classrooms. Having said that, the study found that hands-on science activities were badly compromised during online science instruction during COVID-19

    Developing a Framework to Implement Security in Web Services

    No full text
    Recent advancement in XML and increasing use of World Wide Web allow users to use internet as a document sharing and hosting system, with certain security features. Currently no guidelines are available for developers to enforce security policies for XML and Web Services. It is crucial in order to facilitate a secure dissemination of XML documents, containing information of different sensitivity levels, among (possibly large) user communities. The paper concentrates on developing a framework and proposing design considerations to implement the PKI enables security in XML documents and web services, by defining a component model and processing rules that can be shared across applications using common tools, avoiding the need for extensive customisation of applications to add security. This allows interoperability with a wide range of existing infrastructures and across deployments

    नासिरा शर्मा के कथा साहित्य में संवेदना एवं शिल्प

    No full text
    उपसंहार के रूप में लिखा जाए तों लेखिका मानव – मात्र की समस्याओं , विम्बनाओं , भावनाओं एवं संवेदनाओं की अभिव्यंजित करती हैं । जिसमें कभी वे अन्य महिला लेखिकाओं की भांती एक सामान्य से मानव की समस्या को लेकर लेखनी चलाती हैं । वो कभी वर्ग विशेष की ऐसी समस्या को लेती हैं जो विशेष होकर भी सामान्य हो सकती हैं । कई स्थलों पर जगह , धर्म , आदि का भी उल्लेख नहीं किया हैं । वास्तव में लेखिका यही कहना चाहती हैं कि वह एक मानव की बात कर रही हैं , जो संसार के किसी भी कोने में स्थित व्यक्ति की हो सकती हैं
    corecore