Search results
1 – 10 of over 3000Yoshiharu Asakura, Gen Okuyama, Yoshitaka Nakayama, Kazutoshi Usui and Yukikazu Nakamoto
A unified application management framework for Linux and Java applications on mobile phones is presented. Although Java‐based applications for mobile phones are in strong demand…
Abstract
A unified application management framework for Linux and Java applications on mobile phones is presented. Although Java‐based applications for mobile phones are in strong demand, the complexity of interaction between these platform independent programs and the core functionality of mobile phones has made software development difficult. The unified framework presented here provides uniform application state management and inter‐application communication between Java based and operating‐system specific applications, allowing native Linux applications to be directly replaced with the equivalent Java application. The framework is described in detail and a trial implementation of the system is evaluated.
Details
Keywords
L. Labuschagne and J.H.P. Eloff
Using new concepts, such as those on which Java is based, it is now possible to define a new framework within which risk analyses can be performed on electronic communications. In…
Abstract
Using new concepts, such as those on which Java is based, it is now possible to define a new framework within which risk analyses can be performed on electronic communications. In order truly to be effective, risk analyses must be done in real time, owing to the dynamic nature of open, distributed public networks. The strength of these public networks lies in the many routes available for a message to travel from point A to point B, thus ensuring that the message will be delivered. These many routes, however, also constitute the biggest security weakness in public networks, as it is impossible proactively to determine the route a message will follow. In a bid to compensate for the said weakness, this article will be devoted to a discussion on a framework in terms of which Real‐time Risk Analysis (RtRA) can, henceforth, be performed to determine a risk value for a communications session, rather than for the network components used on routes that need to be fixed and known in advance, as for conventional risk analysis. A communication session is defined as the transfer of data between two hosts; for example, exchanging e‐mail messages over open, distributed public networks RtRA produces a risk value that can be used to determine the appropriate countermeasures with which to minimise the risk associated with a communication session.
Details
Keywords
This paper mainly discusses the author's prototype implementation of Java‐based electronic publishing system (JEPS) that facilitates the creation and delivery of electronic…
Abstract
This paper mainly discusses the author's prototype implementation of Java‐based electronic publishing system (JEPS) that facilitates the creation and delivery of electronic documents with Java technology. JEPS packages the document and viewer in a Java applet. The documents can be viewed on any computer platform with the identical content and style. This paper describes the framework of JEPS and compares JEPS with other Web publishing technologies such as PDF and XML. This paper concludes by considering the potential opportunities and prospects that JEPS provides in the area of electronic publishing over the Internet.
Details
Keywords
Maria Consuelo Franky, Jaime A. Pavlich-Mariscal, Maria Catalina Acero, Angee Zambrano, John C. Olarte, Jorge Camargo and Nicolás Pinzón
This purpose of this paper is to present ISML-MDE, a model-driven environment that includes ISML, a platform-independent modeling language for enterprise applications; ISML-GEN, a…
Abstract
Purpose
This purpose of this paper is to present ISML-MDE, a model-driven environment that includes ISML, a platform-independent modeling language for enterprise applications; ISML-GEN, a code generation framework to automatically generate code from models; and LionWizard, a tool to automatically integrate different components into a unified codebase.
Design/methodology/approach
The development comprises five stages: standardizing architecture; refactoring and adapting existing components; automating their integration; developing a modeling language; and creating code generators. After development, model-to-code ratios in ISML-MDE are measured for different applications.
Findings
The average model-to-code ratio is approximately 1:4.6 when using the code generators from arbitrary models. If a model transformation is performed previously to the code generation, this ratio raises to 1:115. The current validation efforts show that ISML properly supports several DSL essential characteristics described by Kahraman and Bilgen (2015).
Research limitations/implications
ISML-MDE was tested on relatively small applications. Further validation of the approach requires measurement of development times and their comparison with previous similar projects, to determine the gains in productivity.
Originality/value
The value of ISML-MDE can be summarized as follows: ISML-MDE has the potential to significantly reduce development times, because of an adequate use of models and transformations. The design of ISML-MDE addresses real-world development requirements, obtained from a tight interaction between the researchers and the software development company. The underlying process has been thoroughly documented and it is believed it can be used as a reference for future developments of MDE tools under similar conditions.
Details
Keywords
Giancarlo Fortino and Wilma Russo
The convergence of multimedia, virtual reality and the Internet is promoting low‐cost multimedia virtual environments which are easily accessible to large network communities…
Abstract
The convergence of multimedia, virtual reality and the Internet is promoting low‐cost multimedia virtual environments which are easily accessible to large network communities. These environments, which facilitate usability and enhance user experience, are very suitable for supporting user‐oriented application domains such as e‐learning and entertainment. This paper presents a multimedia virtual environment, namely the Virtual Video Gallery, an advanced, distributed media on‐demand system which is browsable through a virtual world. By taking a virtual walk inside the gallery, the user can interactively select, preview, watch and control multimedia sessions. While the user‐centred design of the system relies on UML‐based modelling techniques, system implementation is obtained by the integration of Java, VRML and Web‐based technologies. In order to evaluate the user‐oriented effectiveness of the Virtual Video Gallery and compare it to currently available Internet‐based MoD systems, the usability testing of the system was established for deriving both summative and formative usability data.
Details
Keywords
Tran Khanh Dang, Tuyen Thi Kim Le, Anh Tuan Dang and Ha Duc Son Van
The paper aims to propose a flexible framework to support X-STROWL model. Extensible access control markup language (XACML) is an international standard used for access control in…
Abstract
Purpose
The paper aims to propose a flexible framework to support X-STROWL model. Extensible access control markup language (XACML) is an international standard used for access control in distributed systems. However, XACML and its existing extensions are not sufficient to fulfill sophisticated security requirements (e.g. access control based on user’s roles, context-aware authorizations and the ability of reasoning). Remarkably, X-STROWL, a generalized extension of XACML for spatiotemporal role-based access control (RBAC) model with reasoning ability, is a comprehensive model that overcomes these shortcomings. It mainly focuses on the architecture design as well as the implementation and evaluation of proposed framework and the comparison with others.
Design/methodology/approach
Based on the concept of X-STROWL model, the paper reviewed a large amount of open sources implementing XACML with defined criteria and chose the most suitable framework to be extended for the implementation. The paper also presented a case study used to evaluate the research result.
Findings
Holistic enterprise-ready application security framework – architecture framework (HERAS-AF) is chosen as the most suitable framework to be extended to implement X-STROWL model. Extending HERAS-AF to support spatiotemporal aspect and other contextual conditions as well as the way to integrate security in the access request, together with ability of reasoning for hierarchical roles, are striking features that make the proposed framework able to meet more sophisticated security requirements in comparison with others.
Research limitations/implications
Due to the research content, the performance of proposed framework is not the focused issue of this work.
Originality/value
The proposed framework is a crucial contribution of our research to provide a holistic, extensible and intelligent authorization decision engine.
Details
Keywords
Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka and Shinichi Honiden
A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is…
Abstract
A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is composed of a combination of a BPEL process description, service components to be carried, and migration behavior descriptions using simple but expressive rules. The semantics of the descriptions are defined using Mobile Ambients, namely, a formal model of concurrent mobile processes. With this framework, it is thus possible to add or change migration behaviors without having to modify the BPEL process.
Details
Keywords
Almut Herzog and Nahid Shahmehri
This paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these…
Abstract
Purpose
This paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these user decisions as a security policy.
Design/methodology/approach
This work is an exploratory study. The authors hypothesised that existing tools for runtime set‐up of security policies are not sufficient. As this proved true, as shown in earlier work, they apply usability engineering with user studies to advance the state‐of‐the‐art.
Findings
Little effort has been spent on how security policies can be set up by the lay users for whom they are intended. This work identifies what users want and need for a successful runtime set‐up of security policies.
Practical implications
Concrete and verified guidelines are provided for designers who are faced with the task of delegating security decisions to lay users.
Originality/value
The devised guidelines focus specifically on the set‐up of runtime security policies and therefore on the design of alert windows.
Details
Keywords
The purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of…
Abstract
Purpose
The purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of software agents. Privacy‐related decisions are made based on Platform for Privacy Preferences Project (P3P) information collected by the agents.
Design/methodology/approach
Based on P3P information collected and user preferences, the software agents play a role in the decision‐making process. This paper presents the design of the agent‐based privacy‐enhancing model and considers the benefits and utility of such an approach.
Findings
It is argued that the approach is feasible and it provides an effective solution to the usability limitations associated with P3P.
Research limitations/implications
The paper focuses primarily on usability issues related to P3P. Consequently, some of the ancillary security‐related issues that arise are not covered in detail. Also the paper does not cover the development of an appropriate ontology in significant detail.
Practical implications
Based on this analysis and extensive testing of the prototype, it is believed that the privacy‐enhancing model presented provides a sound basis for privacy protection on the web. While the emphasis here is on resolving the usability problems associated with P3P, a few straightforward enhancements to the implementation would make it a genuinely practical tool.
Originality/value
The usability of the P3P framework is generally considered its weak point. The paper provides a practical solution to this usability problem. One is not aware of any comparable work.
Details
Keywords
Digital content management system is a software system that provides preservation, organization and dissemination services for digital collections. By adapting the systems…
Abstract
Digital content management system is a software system that provides preservation, organization and dissemination services for digital collections. By adapting the systems analysis process, the University of Arizona Library analyzed its needs and developed content management system requirements for finding a suitable information system that addresses the increasing needs of digital content management. Dozens of commercial and open source candidates were examined to match against the requirements. This article provides detailed analysis of three major players (Greenstone, Fedora, and DSpace) in key areas of digital content management: preservation, metadata, access, and system features based on the needs of the University of Arizona Library. This paper describes the process used to analyze and evaluate potential candidates and includes results of analysis to illuminate the process.
Details