Search results

1 – 10 of over 4000
Article
Publication date: 1 February 1996

Lawrence Dowler and Laura Farwell

In 1993, a proposal was made at Harvard College to renovate the principal undergraduate library (Lamont) to create a Gateway library. What do we mean by that phrase? A Gateway…

Abstract

In 1993, a proposal was made at Harvard College to renovate the principal undergraduate library (Lamont) to create a Gateway library. What do we mean by that phrase? A Gateway library, as we define it, is a transition from a traditional library (characterized, perhaps a little unfairly, as a passive storehouse of the scholarly output of printed texts and space for their study) to the emerging world of digital information and distributed computing, sometimes whimsically portrayed as a network of astonishing resources available over broadband networks from anywhere in the world. Specific predictions about how information technology will change and affect libraries is premature, in part, because we do not fully understand how it will affect universities, of which libraries are a necessary and integral part. The Gateway, then, represents a transition between two learning cultures—print and digital—and tries to bridge the gap between the traditional library and what it might become as higher education metamorphoses.

Details

Reference Services Review, vol. 24 no. 2
Type: Research Article
ISSN: 0090-7324

Article
Publication date: 28 October 2014

Arijit Ukil, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal and Tulika Bose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained…

1507

Abstract

Purpose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process.

Design/methodology/approach

This paper proposes a lightweight security scheme in CoAP using Advanced Encryption Standard (AES) 128 symmetric key algorithm. The paper presents an object security (payload embedded)-based robust authentication mechanism with integrated key management. The paper introduces few unique modifications to CoAP header to optimize security operation and minimize communication cost.

Findings

It is resilient to number of security attacks like replay attack, meet-in-the-middle attack and secure under chosen plaintext attack. This scheme is generic in nature, applicable for gamut of IoT applications. The paper proves efficacy of our proposed scheme for vehicle tracking application in emulated laboratory setup. Specifically, it compares with DTLS-enabled CoAP to establish the lightweight feature of our proposed solution.

Research limitations/implications

This paper mainly focuses on implementing in-vehicle tracking systems as an IoT application and used CoAP as the application protocol.

Practical implications

Such a lightweight security scheme would provide immense benefit in IoT systems so that resource constraint-sensing devices and nodes can be made secure. This would impact IoT eco systems to a large extent.

Originality/value

Such kind of security suite that provides both robustness and lightweight feature is hitherto not known to the authors, particularly in CoAP for IoT applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 1989

Wendelin Detemple

It has taken about twenty years to develop and implement the wide range of public databases offered via host services today. In most cases the information available is…

Abstract

It has taken about twenty years to develop and implement the wide range of public databases offered via host services today. In most cases the information available is bibliographic, factual or numeric, but full text databases are becoming more and more important. To improve their services, some vendors have added sophisticated graphics and front end features to their bibliographic and numeric databases. These improvements have been applied both at the host site, with the host systems handling the bulk of data and graphics processing, and to PC and workstation software, where sophisticated graphics and text processing packages adapted to host‐specific output formats are required. Future developments are expected in three main areas: (1) host based menu‐driven systems which do not require sophisticated user hardware; (2) menu and front end interfaces on gateway and mailbox services which allow easy access to many databases, albeit with limited search capabilities; (3) PC or front end computer based systems which already have good retrieval interaction and input/output processing features, but require more expensive hardware and software at the user's site. In the future, PC based systems are expected to utilise expert systems, both to support the retrieval of information online and to enhance the quality of the retrieved information by sophisticated post‐processing features. The developments in user support features and advanced search input/output environments which have hitherto been implemented for non full text databases now need to be introduced to enhance full text retrieval.

Details

Online Review, vol. 13 no. 2
Type: Research Article
ISSN: 0309-314X

Article
Publication date: 1 February 1991

Gordon Dyer

The purpose of this article is to describe some recent experiences at the United Kingdom Open University (UKOU) in setting up computer‐mediated communication (CMC) support for…

Abstract

The purpose of this article is to describe some recent experiences at the United Kingdom Open University (UKOU) in setting up computer‐mediated communication (CMC) support for housebound disabled or otherwise isolated students. The driving force behind this experiment was the important role that CMC has as an educational tool; it empowers and reduces isolation of remote learners. This feature of CMC has received little attention, for, hitherto its application within education has been linked mainly to its use as a teaching aid. Educators concerned with the issue of widening access to higher education may be interested in learning about the OU project and its outcomes. The note first describes the context of this application, by reviewing the multimedia approach to home‐based, parttime, distance education used by the UKOU. The key lessons learned from the use of CMC as an educational tool since 1988 are summarized. The current housebound student project is then described, both in terms of the design stages through to implementation of network activity and interim evaluation and review. Finally, some key points for others interested in implementing a similar scheme are summarized.

Details

Internet Research, vol. 1 no. 2
Type: Research Article
ISSN: 1066-2243

Content available
Article
Publication date: 1 April 2006

27

Abstract

Details

Library Hi Tech News, vol. 23 no. 4
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 21 October 2013

Dev K. Dutta

The purpose of this paper is to offer a conceptual understanding of the role played by social capital when firms engage in collaborative partnerships to develop their innovative…

Abstract

Purpose

The purpose of this paper is to offer a conceptual understanding of the role played by social capital when firms engage in collaborative partnerships to develop their innovative capability, especially under environmental turbulence.

Design/methodology/approach

The paper is theoretical in nature, drawing conceptual insights from two complementary theories: the resource-based view of the firm and institutional theory.

Findings

Social capital plays a beneficial role by enhancing the innovative capability of firms, but only up to a point. The paper argues social capital has both positive and negative effects and follows a non-linear relationship with innovative capability. Further, this relationship is also affected by the level of environmental turbulence faced by the firm.

Originality/value

By conceptualizing social capital as a double-edged sword in terms of its impact on firm innovative capability, the paper offers insights for managerial action and practice.

Details

American Journal of Business, vol. 28 no. 2
Type: Research Article
ISSN: 1935-5181

Keywords

Content available
116

Abstract

Details

Anti-Corrosion Methods and Materials, vol. 61 no. 5
Type: Research Article
ISSN: 0003-5599

Content available
Article
Publication date: 1 March 2000

David F. Kohl

111

Abstract

Details

Library Hi Tech News, vol. 17 no. 3
Type: Research Article
ISSN: 0741-9058

Open Access
Article
Publication date: 18 April 2023

Solomon Hopewell Kembo, Patience Mpofu, Saulo Jacques, Nevil Chitiyo and Brighton Mukorera

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before…

Abstract

Purpose

Coronavirus Disease 2019 (COVID-19) necessitated the need for “Hospital-at-home” improvisations that involve wearable technology to classify patients within households before visiting health institutions. Do-It-Yourself wearable devices allow for the collection of health data leading to the detection and/or prediction of the prevalence of the disease. The sensitive nature of health data requires safeguards to ensure patients’ privacy is not violated. The previous work utilized Hyperledger Fabric to verify transmitted data within Smart Homes, allowing for the possible implementation of legal restrictions through smart contracts in the future. This study aims to explore privacy-enhancing authentication schemes that are operated by multiple credential issuers and capable of integration into the Hyperledger ecosystem.

Design/methodology/approach

Design Science Research is the methodology that was used in this study. An architecture for ABC-privacy was developed and evaluated.

Findings

While the privacy-by-design architecture enhances data privacy through edge and fog computing architecture, there is a need to provide an additional privacy layer that limits the amount of data that patients disclose. Selective disclosure of credentials limits the number of information patients or devices divulge.

Originality/value

The evaluation of this study identified Coconut as the most suitable attribute-based credentials scheme for the Smart Homes Patients and Health Wearables use case Coconut user-centric architecture Hyperledger integration multi-party threshold authorities public and private attributes re-randomization and unlinkable revelation of selective attribute revelations.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Content available
Article
Publication date: 1 December 1999

40

Abstract

Details

Library Hi Tech News, vol. 16 no. 12
Type: Research Article
ISSN: 0741-9058

1 – 10 of over 4000