Search results

1 – 10 of over 3000
Article
Publication date: 1 May 2005

Yoshiharu Asakura, Gen Okuyama, Yoshitaka Nakayama, Kazutoshi Usui and Yukikazu Nakamoto

A unified application management framework for Linux and Java applications on mobile phones is presented. Although Java‐based applications for mobile phones are in strong demand…

Abstract

A unified application management framework for Linux and Java applications on mobile phones is presented. Although Java‐based applications for mobile phones are in strong demand, the complexity of interaction between these platform independent programs and the core functionality of mobile phones has made software development difficult. The unified framework presented here provides uniform application state management and inter‐application communication between Java based and operating‐system specific applications, allowing native Linux applications to be directly replaced with the equivalent Java application. The framework is described in detail and a trial implementation of the system is evaluated.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 December 1998

L. Labuschagne and J.H.P. Eloff

Using new concepts, such as those on which Java is based, it is now possible to define a new framework within which risk analyses can be performed on electronic communications. In…

653

Abstract

Using new concepts, such as those on which Java is based, it is now possible to define a new framework within which risk analyses can be performed on electronic communications. In order truly to be effective, risk analyses must be done in real time, owing to the dynamic nature of open, distributed public networks. The strength of these public networks lies in the many routes available for a message to travel from point A to point B, thus ensuring that the message will be delivered. These many routes, however, also constitute the biggest security weakness in public networks, as it is impossible proactively to determine the route a message will follow. In a bid to compensate for the said weakness, this article will be devoted to a discussion on a framework in terms of which Real‐time Risk Analysis (RtRA) can, henceforth, be performed to determine a risk value for a communications session, rather than for the network components used on routes that need to be fixed and known in advance, as for conventional risk analysis. A communication session is defined as the transfer of data between two hosts; for example, exchanging e‐mail messages over open, distributed public networks RtRA produces a risk value that can be used to determine the appropriate countermeasures with which to minimise the risk associated with a communication session.

Details

Information Management & Computer Security, vol. 6 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 2004

Wang Shaofeng

This paper mainly discusses the author's prototype implementation of Java‐based electronic publishing system (JEPS) that facilitates the creation and delivery of electronic…

2276

Abstract

This paper mainly discusses the author's prototype implementation of Java‐based electronic publishing system (JEPS) that facilitates the creation and delivery of electronic documents with Java technology. JEPS packages the document and viewer in a Java applet. The documents can be viewed on any computer platform with the identical content and style. This paper describes the framework of JEPS and compares JEPS with other Web publishing technologies such as PDF and XML. This paper concludes by considering the potential opportunities and prospects that JEPS provides in the area of electronic publishing over the Internet.

Details

The Electronic Library, vol. 22 no. 4
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 7 November 2016

Maria Consuelo Franky, Jaime A. Pavlich-Mariscal, Maria Catalina Acero, Angee Zambrano, John C. Olarte, Jorge Camargo and Nicolás Pinzón

This purpose of this paper is to present ISML-MDE, a model-driven environment that includes ISML, a platform-independent modeling language for enterprise applications; ISML-GEN, a…

Abstract

Purpose

This purpose of this paper is to present ISML-MDE, a model-driven environment that includes ISML, a platform-independent modeling language for enterprise applications; ISML-GEN, a code generation framework to automatically generate code from models; and LionWizard, a tool to automatically integrate different components into a unified codebase.

Design/methodology/approach

The development comprises five stages: standardizing architecture; refactoring and adapting existing components; automating their integration; developing a modeling language; and creating code generators. After development, model-to-code ratios in ISML-MDE are measured for different applications.

Findings

The average model-to-code ratio is approximately 1:4.6 when using the code generators from arbitrary models. If a model transformation is performed previously to the code generation, this ratio raises to 1:115. The current validation efforts show that ISML properly supports several DSL essential characteristics described by Kahraman and Bilgen (2015).

Research limitations/implications

ISML-MDE was tested on relatively small applications. Further validation of the approach requires measurement of development times and their comparison with previous similar projects, to determine the gains in productivity.

Originality/value

The value of ISML-MDE can be summarized as follows: ISML-MDE has the potential to significantly reduce development times, because of an adequate use of models and transformations. The design of ISML-MDE addresses real-world development requirements, obtained from a tight interaction between the researchers and the software development company. The underlying process has been thoroughly documented and it is believed it can be used as a reference for future developments of MDE tools under similar conditions.

Details

International Journal of Web Information Systems, vol. 12 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 29 February 2004

Giancarlo Fortino and Wilma Russo

The convergence of multimedia, virtual reality and the Internet is promoting low‐cost multimedia virtual environments which are easily accessible to large network communities…

Abstract

The convergence of multimedia, virtual reality and the Internet is promoting low‐cost multimedia virtual environments which are easily accessible to large network communities. These environments, which facilitate usability and enhance user experience, are very suitable for supporting user‐oriented application domains such as e‐learning and entertainment. This paper presents a multimedia virtual environment, namely the Virtual Video Gallery, an advanced, distributed media on‐demand system which is browsable through a virtual world. By taking a virtual walk inside the gallery, the user can interactively select, preview, watch and control multimedia sessions. While the user‐centred design of the system relies on UML‐based modelling techniques, system implementation is obtained by the integration of Java, VRML and Web‐based technologies. In order to evaluate the user‐oriented effectiveness of the Virtual Video Gallery and compare it to currently available Internet‐based MoD systems, the usability testing of the system was established for deriving both summative and formative usability data.

Details

Interactive Technology and Smart Education, vol. 1 no. 1
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 10 June 2014

Tran Khanh Dang, Tuyen Thi Kim Le, Anh Tuan Dang and Ha Duc Son Van

The paper aims to propose a flexible framework to support X-STROWL model. Extensible access control markup language (XACML) is an international standard used for access control in…

Abstract

Purpose

The paper aims to propose a flexible framework to support X-STROWL model. Extensible access control markup language (XACML) is an international standard used for access control in distributed systems. However, XACML and its existing extensions are not sufficient to fulfill sophisticated security requirements (e.g. access control based on user’s roles, context-aware authorizations and the ability of reasoning). Remarkably, X-STROWL, a generalized extension of XACML for spatiotemporal role-based access control (RBAC) model with reasoning ability, is a comprehensive model that overcomes these shortcomings. It mainly focuses on the architecture design as well as the implementation and evaluation of proposed framework and the comparison with others.

Design/methodology/approach

Based on the concept of X-STROWL model, the paper reviewed a large amount of open sources implementing XACML with defined criteria and chose the most suitable framework to be extended for the implementation. The paper also presented a case study used to evaluate the research result.

Findings

Holistic enterprise-ready application security framework – architecture framework (HERAS-AF) is chosen as the most suitable framework to be extended to implement X-STROWL model. Extending HERAS-AF to support spatiotemporal aspect and other contextual conditions as well as the way to integrate security in the access request, together with ability of reasoning for hierarchical roles, are striking features that make the proposed framework able to meet more sophisticated security requirements in comparison with others.

Research limitations/implications

Due to the research content, the performance of proposed framework is not the focused issue of this work.

Originality/value

The proposed framework is a crucial contribution of our research to provide a holistic, extensible and intelligent authorization decision engine.

Details

International Journal of Web Information Systems, vol. 10 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 August 2005

Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka and Shinichi Honiden

A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is…

Abstract

A general framework for mobile Web services ‐ which are Web services with the ability to migrate from one host to another ‐ is proposed. In this framework, a mobile Web service is composed of a combination of a BPEL process description, service components to be carried, and migration behavior descriptions using simple but expressive rules. The semantics of the descriptions are defined using Mobile Ambients, namely, a formal model of concurrent mobile processes. With this framework, it is thus possible to add or change migration behaviors without having to modify the BPEL process.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 16 October 2007

Almut Herzog and Nahid Shahmehri

This paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these…

Abstract

Purpose

This paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these user decisions as a security policy.

Design/methodology/approach

This work is an exploratory study. The authors hypothesised that existing tools for runtime set‐up of security policies are not sufficient. As this proved true, as shown in earlier work, they apply usability engineering with user studies to advance the state‐of‐the‐art.

Findings

Little effort has been spent on how security policies can be set up by the lay users for whom they are intended. This work identifies what users want and need for a successful runtime set‐up of security policies.

Practical implications

Concrete and verified guidelines are provided for designers who are faced with the task of delegating security decisions to lay users.

Originality/value

The devised guidelines focus specifically on the set‐up of runtime security policies and therefore on the design of alert windows.

Details

Information Management & Computer Security, vol. 15 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 18 July 2008

Hsu‐Hui Lee and Mark Stamp

The purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of…

Abstract

Purpose

The purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of software agents. Privacy‐related decisions are made based on Platform for Privacy Preferences Project (P3P) information collected by the agents.

Design/methodology/approach

Based on P3P information collected and user preferences, the software agents play a role in the decision‐making process. This paper presents the design of the agent‐based privacy‐enhancing model and considers the benefits and utility of such an approach.

Findings

It is argued that the approach is feasible and it provides an effective solution to the usability limitations associated with P3P.

Research limitations/implications

The paper focuses primarily on usability issues related to P3P. Consequently, some of the ancillary security‐related issues that arise are not covered in detail. Also the paper does not cover the development of an appropriate ontology in significant detail.

Practical implications

Based on this analysis and extensive testing of the prototype, it is believed that the privacy‐enhancing model presented provides a sound basis for privacy protection on the web. While the emphasis here is on resolving the usability problems associated with P3P, a few straightforward enhancements to the implementation would make it a genuinely practical tool.

Originality/value

The usability of the P3P framework is generally considered its weak point. The paper provides a practical solution to this usability problem. One is not aware of any comparable work.

Details

Information Management & Computer Security, vol. 16 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 2004

Yan Han

Digital content management system is a software system that provides preservation, organization and dissemination services for digital collections. By adapting the systems…

9286

Abstract

Digital content management system is a software system that provides preservation, organization and dissemination services for digital collections. By adapting the systems analysis process, the University of Arizona Library analyzed its needs and developed content management system requirements for finding a suitable information system that addresses the increasing needs of digital content management. Dozens of commercial and open source candidates were examined to match against the requirements. This article provides detailed analysis of three major players (Greenstone, Fedora, and DSpace) in key areas of digital content management: preservation, metadata, access, and system features based on the needs of the University of Arizona Library. This paper describes the process used to analyze and evaluate potential candidates and includes results of analysis to illuminate the process.

Details

Library Hi Tech, vol. 22 no. 4
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of over 3000