Search results for "Data security"
showing 10 items of 32 documents
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…
epiPATH: an information system for the storage and management of molecular epidemiology data from infectious pathogens.
2007
Abstract Background Most research scientists working in the fields of molecular epidemiology, population and evolutionary genetics are confronted with the management of large volumes of data. Moreover, the data used in studies of infectious diseases are complex and usually derive from different institutions such as hospitals or laboratories. Since no public database scheme incorporating clinical and epidemiological information about patients and molecular information about pathogens is currently available, we have developed an information system, composed by a main database and a web-based interface, which integrates both types of data and satisfies requirements of good organization, simple…
Computer Networks
2018
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
Implementing cloud ERP solutions: a review of sociotechnical concerns
2018
Abstract Cloud ERP solutions allow organizations of all sizes to support and coordinate key business processes by leveraging virtualization. Nevertheless, the implementation of cloud ERPs is not straightforward and there are significant issues that need to be taken into account when launching cloud ERP initiatives. To explore these issues, we conducted an in-depth systematic review of related research literature. We identified six key issues related to cloud ERP implementation: a) functionality fit, b) integration, c) data migration, d) organizational change, e) data security, and f) reliability. Furthermore, we mapped these issues to the different sizes of organizations. Based on this revi…
Encriptación óptica empleando llaves Weierstrass-Mandelbrot
2013
[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…
The security of mobile business applications based on mCRM
2020
A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…
Quality, Reliability, Security and Robustness in Heterogeneous Systems
2020
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.
Experiences from a wearable-mobile acquisition system for ambulatory assessment of diet and activity
2017
Public health trends are currently monitored and diagnosed based on large studies that often rely on pen-and-paper data methods that tend to require a large collection campaign. With the pervasiveness of smart-phones and -watches throughout the general population, we argue in this paper that such devices and their built-in sensors can be used to capture such data more accurately with less of an effort. We present a system that targets a pan-European and harmonised architecture, using smartphones and wrist-worn activity loggers to enable the collection of data to estimate sedentary behavior and physical activity, plus the consumption of sugar-sweetened beverages. We report on a unified pilot…
Lua Code: Security Overview and Practical Approaches to Static Analysis
2017
Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the rise in the last couple of years. Simple design and efficient usage of resources combined with its performance make it attractive for production web applications even to big organizations such as Wikipedia, CloudFlare and GitHub. In addition to this, Lua is one of the preferred choices for programming embedded and IoT devices. This context allows to assume a large and growing Lua codebase yet to be assessed. This growing Lua codebase could be potentially driving production servers and extremely large number of devices, some perhaps with mission-critical function for example i…