Journal articles on the topic 'Certificats SSL'

To see the other types of publications on this topic, follow the link: Certificats SSL.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Certificats SSL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (July 2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.

Full text
Abstract:
This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network connection. The results of an experimental study allow the authors to state with a high degree of probability that Tor network certificates can be identified in the data stream between the client and server of the specified network by their size, which is between 400 and 600 bytes. The list of features of the Tor network certificates is intended to develop software or add-ons to existing ones, which is used to block access of Internet users to Darknet resources or to limit the use of the Tor anonymous network service. Based on data on the distinguishing features of Tor network certificates, an algorithm is proposed for blocking access to the Internet for users of the Tor Bundle.
APA, Harvard, Vancouver, ISO, and other styles
2

Minakhvatov, Bulat Rafkatovich, and Vladislav Aleksandrovich Strigunov. "SSL CERTIFICATE." Problemy sovershenstvovaniya organizatsii proizvodstva i upravleniya promyshlennymi predpriyatiyami: Mezhvuzovskii sbornik nauchnykh trudov, no. 1 (2021): 217–22. http://dx.doi.org/10.46554/op-mie-2021.1-pp.217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cueva Hurtado, Mario E., and Diego Javier Alvarado Sarango. "Análisis de Certificados SSL/TLS gratuitos y su implementación como Mecanismo de seguridad en Servidores de Aplicación." Enfoque UTE 8, no. 1 (February 24, 2017): 273–86. http://dx.doi.org/10.29019/enfoqueute.v8n1.128.

Full text
Abstract:
La seguridad en la capa de aplicación (SSL), proporciona la confidencialidad, integridad y autenticidad de los datos, entre dos aplicaciones que se comunican entre sí. El presente artículo es el resultado de haber implementado certificados SSL / TLS gratuitos en servidores de aplicación, determinando las características relevantes que debe tener un certificado SSL/TLS, la Autoridad certificadora que lo emita. Se realiza un análisis de las vulnerabilidades en los servidores web y se establece un canal cifrado de comunicaciones con el fin de proteger de ataques como hombre en el medio, phising y mantener la integridad de la información que es trasmitida entre el cliente y servidor.
APA, Harvard, Vancouver, ISO, and other styles
4

Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.

Full text
Abstract:
Abstract TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstrating three novel active attacks against TLS Client Certificate Authentication that are successful despite the defenses. Additionally, we show these attacks work against all known instances of TLS Client Certificate Authentication, including smart cards like those widely deployed by the Estonian government as part of their Digital ID program. Our attacks include in-path man-in-the-middle versions as well as a more powerful on-path attack that can be carried out without full network control.
APA, Harvard, Vancouver, ISO, and other styles
5

Lapshichyov, Vitaly V., and Oleg B. Makarevich. "Detection and identification method of the tor bundle use." Informatization and communication, no. 3 (May 5, 2020): 17–20. http://dx.doi.org/10.34219/2078-8320-2020-11-3-17-20.

Full text
Abstract:
This paper presents the result of author’s research aimed at developing a detecting and identifying method of the Tor Bundle use in data transmission networks, in particular, on the Internet. Based on these characteristics, an algorithm has been developed that allows legitimate blocking of user access to a global network by a popular anonymizer. The subject of the study was an SSL/TLS encryption certificate, which is transmitted by the Tor network server to the user of the Tor Bundle and which contains the set of data necessary for its identification during the implementation of the TLS “handshake”. In the course of the study of the certificates features, several distinguishing features were identified, namely: the name of the subject and issuer of the certificate, which is a random set of letters and numbers; port used when connecting to an anonymous network; certificate size. Based on the data received, a method is proposed that allows the provider’s server to block the connection during which a certificate with certain characteristics is transmitted.
APA, Harvard, Vancouver, ISO, and other styles
6

Sebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (March 22, 2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.

Full text
Abstract:
It is essential to maintain a ratio between privacy protection and knowledge discovery. Internet users depend daily on SSL/HTPS for secure communication on internet. Over the years, many attacks on the certificate trust model it uses have been evolved. Mutual SSL authentication shared verification alludes to two parties validating each other through checking the digital certificate so that both sides are guaranteed of the other’s identity. In technical terms, it alludes to a client (web program or client application) authenticate themselves to the server (server application) and that server likewise confirming itself to the client through checking the general public key certificate issued by trusted Certificate Authorities (CA). Since confirmation depends on computerized Certificate, certification authorities, for example, Verisign or Microsoft Declaration Server are a critical part of mutual authentication process. From an abnormal state perspective, the way toward authenticating and setting up an encrypted channel using certificate-based mutual SSL authentication.
APA, Harvard, Vancouver, ISO, and other styles
7

Park, Jun-Cheol. "Cookie-Based Identification of the Public Keys of TLS/SSL Certificates." Journal of Korean Institute of Communications and Information Sciences 41, no. 1 (January 31, 2016): 101–3. http://dx.doi.org/10.7840/kics.2015.41.1.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Rajesh, and K. Rekha. "Strengthening SSL Security with attribute certificate." EAI Endorsed Transactions on Cloud Systems 3, no. 11 (April 11, 2018): 154465. http://dx.doi.org/10.4108/eai.11-4-2018.154465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fedkova, N. A., and D. A. Fedkov. "Development of PowerShell Scripts for Automating Windows OS Administration Processes. Automating the Process of Creating and Distributing SSL Certificates to Servers." Vestnik NSU. Series: Information Technologies 20, no. 1 (May 17, 2022): 81–96. http://dx.doi.org/10.25205/1818-7900-2022-20-1-81-96.

Full text
Abstract:
The article describes the process of automating Windows administration, in particular, automating the process of creating and distributing SSL certificates to servers. The built-in command shell PowerShell is used for development. Theoretical aspects of the subject are given: the concept of SSL certificates, the purpose of Vault storage and Consul service. The results of development in the form of code listings are presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Meyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (January 1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Au, Andrew C. H., Brenda H. S. Lam, Y. C. Kwan, and Angus K. K. Tung. "Pressure Calibration of Quarter-Inch Working Standard Microphones by Comparison." NCSLI Measure 14, no. 1 (2022): 40–48. http://dx.doi.org/10.51843/measure.14.1.7.

Full text
Abstract:
The Standards and Calibration Laboratory (SCL) in Hong Kong has developed a system for calibration of quar-ter-inch working standard (WS3) microphones which automates the measurement process and generates digital calibration certificates (DCCs) to meet the growing demand for microphone calibration services in Hong Kong. This paper describes (i) the method of determining the pressure sensitivity of a microphone combination unit from 20 Hz to 20 kHz by the comparison technique in accordance with the International Standard IEC 61094-5, (ii) the measurement model and uncertainty evaluation, and (iii) the automatic system which facilitates the calibration process and generation of a digital calibration certificate.
APA, Harvard, Vancouver, ISO, and other styles
12

Xu, Da Wei. "The Implementation of Mobile Agent System Based X.509 Certificate." Advanced Materials Research 403-408 (November 2011): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1270.

Full text
Abstract:
The paper introduces the design objective and design scheme of mobile agent-based X.509 certificate management system, and describes the key technologies such as encryption, the certificate processing format and coding, secure communication protocols such as SSL in detaile.
APA, Harvard, Vancouver, ISO, and other styles
13

Kappenberger, Reiner. "The true cost of self-signed SSL certificates." Computer Fraud & Security 2012, no. 9 (September 2012): 14–16. http://dx.doi.org/10.1016/s1361-3723(12)70092-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

B, Risma, Azhar Azhar, and Makhdalena Makhdalena. "IMPLEMENTASI KERANGKA KUALIFIKASI NASIONAL INDONESIA DI LEMBAGA KURSUS UNIVERSAL SKILL PEKANBARU." Jurnal Manajemen Pendidikan Penelitian Kualitatif 2, no. 2 (September 29, 2018): 242. http://dx.doi.org/10.31258/jmppk.2.2.p.242-247.

Full text
Abstract:
This research is described the implementation of National QualificationFramework at Universal Skill Course in Pekanbaru about the curriculum concept and theregistration of new students process, educational processes, competence exams until the receivesof the certificates. This research used the qualitative approach, the data of research got by theleader of Universal Skill course, tutor, admission, and students. The data collectives got bytriangulation technique through observation, interviews, and documentations research. The reportof the research shows some indicators, they are 1) the new students’ registration processes atlevel 2 of Accountant Junior Technician Assistance is in roles of NQF that is the students haveto graduate of Senior High School level. 2) The Education processes at Universal Skill hasused SKKNI thus suitable with KKNI curriculum, besides Universal Skill has got theAccreditation of BAN PNF with score “B”, it shows that implementation of KKNI at UniversalSkill is very good. 3) The students’ study achievement at Universal Skill are 100%, it measuredby the SKL achievement has match as the SKKNI procedure. The SKL achievement provedby the students’ score reports on certificate around 80 – 90. 4) The influence of successfulfactors in implementing of KKNI at level 2 of Accountant Junior Technician Assistance asfollows; The curriculum which is used refers to the SKKNI thus the output of the courseproduce the workers whom ready to work and compete in business world; the other factor isthe tutor recruited from practitioners in his/ her own fields so that in learning processes thetutors discuss about some cases which are influences the successful of implementation ofKKNI at Universal Skill course is the certificates of Universal Skill prints in English languageso that comes the advantages to compete with the foreigner and also in next MEA. Meanwhiles the barrier factors of the implementation of KKNI at Universal Skill is the late ofdistribute the certificates from the government.
APA, Harvard, Vancouver, ISO, and other styles
15

Tian, Cong, Chu Chen, Zhenhua Duan, and Liang Zhao. "Differential Testing of Certificate Validation in SSL/TLS Implementations." ACM Transactions on Software Engineering and Methodology 28, no. 4 (October 12, 2019): 1–37. http://dx.doi.org/10.1145/3355048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Thurimella, Ramakrishna, and William Mitchell. "Cloak and Dagger." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 55–75. http://dx.doi.org/10.4018/jisp.2009100704.

Full text
Abstract:
One of the most devastating forms of attack on a computer is when the victim doesn’t even know an attack occurred. After some background material, various forms of man in the middle (MITM) attacks, including ARP spoofing, fake SSL certificates, and bypassing SSL are explored. Next, rootkits and botnets, two key pieces of crimeware, are introduced and analyzed. Finally, general strategies to protect against such attacks are suggested.
APA, Harvard, Vancouver, ISO, and other styles
17

Antonishyn, Mykhailo. "Four ways to bypass Android SSL. Verification and Certificate Pinning." Transfer of Innovative Technologies 3, no. 1 (September 3, 2020): 96–99. http://dx.doi.org/10.32347/tit2020.31.0302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Seniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.

Full text
Abstract:
Currently there is no method, feature, or ability in securing data transmission in microcontroller systems and applications with client-server scheme communication, while major modern computer systems using secure socket layer (SSL) for establishing secure communication. However, ESP espressif based microcontroller has supported SSL communication to secure data transmission, but only works on the Wi-Fi network. A single-board computer based embedded system has fully supported SSL communication, but it costs a very high price. On the other hand, STM32F103 microcontrollers with a very affordable price even cheaper than the Arduino board has the opportunity to build secure data communication using SSL protocol based on MbedTLS library. In addition to wiznet W5100/W5500 ethernet shield, an STM32F103 SSL client device has been successfully built in this study. The SSL client device supports ECDHE ECDHA AES128 CBC SHA256 SSL cipher suite. The Apache web server must also be configured to support this cipher suite by generating OpenSSL ECC (elliptic curve cryptography) certificate. The system was tested with the LM35 analog temperature sensor, and as a result, the STM32F103 SSL client has successfully secured the data transmission to the Apache SSL web server. The communication time was 3 seconds for the first connection and 42 ms for the next data transmission.
APA, Harvard, Vancouver, ISO, and other styles
19

Dakov, Stanislav, and Anna Malinova. "A SURVEY OF E-COMMERCE SECURITY THREATS AND SOLUTIONS." Proceedings of CBU in Natural Sciences and ICT 2 (October 24, 2021): 1–9. http://dx.doi.org/10.12955/pns.v2.135.

Full text
Abstract:
E-commerce security is part of the Web security problems that arise in all business information systems that operate over the Internet. However, in e-commerce security, the dimensions of web security – secrecy, integrity, and availability-are focused on protecting the consumer’s and e-store site’s assets from unauthorized access, use, alteration, or destruction. The paper presents an overview of the recent security issues in e-commerce applications and the usual points the attacker can target, such as the client (data, session, identity); the client computer; the network connection between the client and the webserver; the web server; third party software vendors. Discussed are effective approaches and tools used to address different e-commerce security threats. Special attention is paid to Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), phishing attacks, SQL injection, Man-in-the-middle, bots, denial-of-service, encryption, firewalls, SSL digital signatures, security certificates, PCI compliance. The research outlines and suggests many security solutions and best practices.
APA, Harvard, Vancouver, ISO, and other styles
20

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.
APA, Harvard, Vancouver, ISO, and other styles
21

KATO, Hiroya, Shuichiro HARUTA, and Iwao SASASE. "Android Malware Detection Scheme Based on Level of SSL Server Certificate." IEICE Transactions on Information and Systems E103.D, no. 2 (February 1, 2020): 379–89. http://dx.doi.org/10.1587/transinf.2019edp7119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hermawan, Tommy. "Legal Certainty To Double Land Statement Letter (Skl) Holders In Land Boarders (Study Case In Teteilanan Village, South Barito Regency, Center Kalimantan)." Pancasila and Law Review 1, no. 2 (January 5, 2021): 137. http://dx.doi.org/10.25041/plr.v1i2.2157.

Full text
Abstract:
This research was ⅿotivateⅾ by the nսⅿber of ⅼanⅾⅾispսtes that occսrreⅾ in Centraⅼ Kaⅼiⅿantan which was caսseⅾ by the existence of a ⅾoսbⅼe ⅼanⅾ Certificate (SKT) issսeⅾ by the Viⅼⅼage Heaⅾ. This stսⅾy raises a ⅼanⅾⅾispսte that occսrreⅾ between party X anⅾ a paⅼⅿ oiⅼ coⅿpany where each party owns an SKT on ⅼanⅾ objects on the saⅿe borⅾer ⅼanⅾ with a ⅾifferent ⅾistrict base. This ⅾispսte occսrs becaսse there are no cⅼear anⅾ firⅿ rսⅼes governing ⅾoսbⅼe SKT on borⅾer ⅼanⅾ so there is no ⅼegaⅼ certainty for SKT hoⅼⅾers. Baseⅾ on the ⅾescription above, the researcher raises the probⅼeⅿ forⅿսⅼation: what is the ⅼegaⅼ certainty for hoⅼⅾers of ⅾoսbⅼe ⅼanⅾ certificates on the ⅼanⅾ borⅾer of Teteiⅼanan Viⅼⅼage, Soսth Barito Regency, Centraⅼ Kaⅼiⅿantan)? This research սses jսriⅾicaⅼ eⅿpiricaⅼ research, jսriⅾicaⅼ socioⅼogicaⅼ approach, priⅿary anⅾ seconⅾary ⅾata sets which are anaⅼyzeⅾսsing qսaⅼitative anaⅼysis. The resսⅼts of this stսⅾy inⅾicate that there is no ⅼegaⅼ certainty for hoⅼⅾers of ⅿսⅼtipⅼe ⅼanⅾ Certificate, this is becaսse the ⅼanⅾ Certificate can be սseⅾ as eviⅾence of controⅼ over ⅼanⅾ rights in carrying oսt the ⅼanⅾ registration process reⅼateⅾ to the presence of incoⅿpⅼete ⅼanⅾⅾocսⅿents. The existence of ⅾoսbⅼe SKT is caսseⅾ by 3 (three) first things, naⅿeⅼy the ⅼack of orⅾer in the aⅾⅿinistration of ⅼanⅾ recorⅾs in the viⅼⅼage registration book, reⅼateⅾ to the probⅼeⅿ that the apparatսs in charge of ⅼanⅾ registration ⅿսst re-coⅼⅼect ⅾata then register in the viⅼⅼage registration book on the resսⅼts of the re-ⅾata coⅼⅼection. Seconⅾ, the repⅼaceⅿent of the Viⅼⅼage Heaⅾ or Viⅼⅼage Apparatսs, reⅼateⅾ to this probⅼeⅿ the new Viⅼⅼage Heaⅾ or Viⅼⅼage Apparatսs ⅿսst ⅾoսbⅼe-check the viⅼⅼage registration book in orⅾer to ⅿiniⅿize the occսrrence of ⅾoսbⅼe SKT. Thirⅾ, naⅿeⅼy the ⅼoss or ⅾaⅿage of the viⅼⅼage registration book, reⅼateⅾ to this probⅼeⅿ, the viⅼⅼage heaⅾ or the reⅼevant viⅼⅼage apparatսs ⅿսst ⅿake a copy of the ⅾata containeⅾ in the viⅼⅼage registration book sսch as a copy of a photocopy or eⅼectronic fiⅼe.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Liang, David Choffnes, Tudor Dumitraş, Dave Levin, Alan Mislove, Aaron Schulman, and Christo Wilson. "Analysis of SSL certificate reissues and revocations in the wake of heartbleed." Communications of the ACM 61, no. 3 (February 21, 2018): 109–16. http://dx.doi.org/10.1145/3176244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bostan, Atila. "Implicit learning with certificate warning messages on SSL web pages: what are they teaching?" Security and Communication Networks 9, no. 17 (August 25, 2016): 4295–300. http://dx.doi.org/10.1002/sec.1607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Yingjie, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, and Wei Wang. "Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis." Journal of Systems and Software 167 (September 2020): 110609. http://dx.doi.org/10.1016/j.jss.2020.110609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Sun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.

Full text
Abstract:
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer-organized public VPN relay system launched in 2013. By analyzing the security of the system, we have found that there is a man-in-the-middle attack risk because an attacker may hijack a VPN session and decrypt the traffic. According to our study, the reason of the security issues is the misuse of the SSL certificate. To mitigate the security risks, we offered a series of recommendations.
APA, Harvard, Vancouver, ISO, and other styles
27

Tambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (July 31, 2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.

Full text
Abstract:
Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that specifies how data is exchanged, and one of the most widely used protocols is the File Transfer Protocol (FTP). FTP is generally useful as a means of exchanging files or data in a network. The FTP protocol is not secure enough, because when data transfer there is no security to protect it. Therefore the FTP protocol is necessary for additional security, by implementing the SSL security protocol or Secure Socket Layer Security protecting the FTP protocol during data transfer. SSL certificates are used for the purpose of handling the security of data packets transmitted over the network system. When SSL is activated, the server and client when the connection occurs will be encrypted so that the data cannot be seen by others. Keywords: FTP; Network; Server; SSL Abstrak: Suatu Kemajuan teknologi komunikasi saat ini memiliki pengaruh terhadap perkembangan didalam pengelolaan data didalam sendi kehidupan, membuat kebutuhan akan media center menjadi sesuatu yang harus dalam penyimpanan arsip digital. Data tidak selamanya akan tersimpan di dalam personal computer saja tetapi akan lebih baik jika ada wadah data terpusat menjadi solusi dalam media penyimpanan, agar menjaga dari kehilangan data atau cadangan data. Istilah jaringan (network) dipakai apabila terdapat minimal dua atau lebih perangkat yang terhubungkan satu dengan yang lainnya. Untuk melaksanakn pertukaran data didalam jaringan ini, digunakan protocol yang menspesifikasikan bagaimana data dipertukarkan, dan salah satu protocol yang banyak digunakan adalah File Transfer Protocol (FTP). FTP umumnya bermanfaat sebagai sarana pertukaran file atau data dalam suatu network. Protokol FTP tidaklah cukup aman, dikarenakan ketika transfer data tidak ada keamanan untuk melindunginya. Maka dari itu protokol FTP perlu untuk penambahan keamanan, dengan menerapkan protokol keamanan SSL atau Secure Socket Layer Security melindungi protokol FTP pada saat transfer data. Sertifikat SSL dimanfaatkan untuk keperluan menangani keamanan paket data yang ditransmisikan melalui sistem jaringan. Ketika SSL diakatifkan, maka server dan client ketika terjadi koneksi akan ter enkripsi sehingga data yang ada tidak dapat untuk dilihat oleh orang lain. Kata kunci: FTP;Network; Server; SSL
APA, Harvard, Vancouver, ISO, and other styles
28

ŞAHİN, Mehmet. "MOTIVATIONS OF SLL-WEB SERVICE ADMINISTRATORS IN USING SELF-SIGNED DIGITAL CERTIFICATES." Journal of Social Sciences 2, no. 4 (January 1, 2015): 209. http://dx.doi.org/10.16990/sobider.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Chi, Zuxing Gu, Min Zhou, Jiecheng Wu, Jiarui Zhang, and Ming Gu. "API Misuse Detection in C Programs: Practice on SSL APIs." International Journal of Software Engineering and Knowledge Engineering 29, no. 11n12 (November 2019): 1761–79. http://dx.doi.org/10.1142/s0218194019400205.

Full text
Abstract:
Libraries offer reusable functionality through Application Programming Interfaces (APIs) with usage constraints such as call conditions or orders. Constraint violations, i.e. API misuses, commonly lead to bugs and security issues. Although researchers have developed various API misuse detectors in the past few decades, recent studies show that API misuse is prevalent in real-world projects, especially for secure socket layer (SSL) certificate validation, which is completely broken in many security-critical applications and libraries. In this paper, we introduce SSLDoc to effectively detect API misuse bugs, specifically for SSL API libraries. The key insight behind SSLDoc is a constraint-directed static analysis technique powered by a domain-specific language (DSL) for specifying API usage constraints. Through studying real-world API misuse bugs, we propose ISpec DSL, which covers majority types of API usage constraints and enables simple but precise specification. Furthermore, we design and implement SSLDoc to automatically parse ISpec into checking targets and employ a static analysis engine to identify potential API misuses and prune false positives with rich semantics. We have instantiated SSLDoc for OpenSSL APIs and applied it to large-scale open-source programs. SSLDoc found 45 previously unknown security-sensitive bugs in OpenSSL implementation and applications in Ubuntu. Up to now, 35 have been confirmed by the corresponding development communities and 27 have been fixed in master branch.
APA, Harvard, Vancouver, ISO, and other styles
30

Lapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.

Full text
Abstract:
Purpose of the study: development of a method that allows detecting and identifying packets of the Tor network, including obfuscated packets on the local machine of the network user, by a Wireshark sniffer using the filter syntax based on the features of the Tor network packets characteristic of the TLS v1.2 and v1.3 encryption versions; studying the possibility of using the SSL Bump attack (decrypting https traffic on a virtual server using self-signed x.509 certificates) to overcome the obfuscation of Tor network packets. Method: software analysis of transmitted network packets, decomposition of the contents of data packets according to their size and belonging to encryption protocols, a comparative method in relation to different versions of the encryption protocol and resources, synthesis of filtering rules based on the syntax of the analyzer was used. Results: an applied method was developed that allows detecting and identifying packets of the Tor Network, including obfuscated packets on the local machine of the network user, by a Wireshark sniffer based on the filtering syntax based on the signs of encryption packets of the TLS v1.2 and v1.3 versions; data on the impossibility of using the SSL Bump attack to overcome the obfuscation of the Tor network was obtained.
APA, Harvard, Vancouver, ISO, and other styles
31

Lee, Khan-yong. "Features of Geography Assessment in Republic of South Africa : Focusing on Geography Examinations of National Senior Certificate." Social Studies Education 57, no. 3 (September 30, 2018): 153–70. http://dx.doi.org/10.37561/sse.2018.09.57.3.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Moskalets, V. V., T. Z. Moskalets, I. V. Grynyk, O. A. Shevchuk, and O. O. Khodanitska. "Breeding study of sea buckthorn (Hippophae rhamnoides L.) in the Institute of Horticulture, NAAS оf Ukraine." Horticulture: Interdepartment Subject Scientific Collection, no. 75 (2020): 37–49. http://dx.doi.org/10.35205/0558-1125-2020-75-37-49.

Full text
Abstract:
The authors present the results of the sea buckthorn breeding at the Institute of Horticulture (NAAS). The stages of the work have been analyzed – from studying and selecting the initial material in the conditions of the Polissya, Polissya-Lisosteppe and Lisosteppe ecotopes (2012-2016) to the successful targeted introduction to the Northern part of the Lisosteppe (2017-2019) and new forms have been characterized according to the traits valuable for economy and molec-ular genetic markers. The new forms of the researched crop taking into consideration the high indices of their productiv-ity,adaptivity to the unfavourable abiotic and biotic environmental factors and consumption quality of fruits for pro-cessing and making functionary products were entered officially into Genetic Fund of the Plants of Ukraine as con-firmed by the certificates of copyright and developed genetic passports. The list of these genotypes includes 1-15-1 (Nos-ivchanka, UA3700073), 1-15-8S (Mitsna, UA3700079), make form 1-15-6Ch (Aboryhen 6/11, UA3700080), 1-15-9 Ka-rotynna, UA3700082), 1-15-3 (Pamiatka, UA3700076), 1-15-8V (Soniachne siayvo, UA3700075), 1-15-11 (Lymonna, UA3700072), 2-15-73 (Morkviana, UA3700077), 1-15-5 (Adaptyvna, UA3700078), 1-15-8B (Osoblyva, UA3700083), 1-15-6 (Apelsynova, UA3700084) and forms 6A/11 (UA3700081), 1-15-5a (Sribnolysta 5a, UA3700074). The possibility of using 5 DNA markers to characterize genotypes of sea buckthorn bymeans of the molecular genetic markers was tested and evaluated in the framework of the scientific cooperation with the Institute of Cell Biology and Genetic Engineering of the National Academy of Sciences of Ukraine. It should be noted that the most polymorphic markers were HrMS025 and HrMS026. However, the marker HrMS014 was monomorphic, but appeared in all the samples, so it can be used as a reference. The best forms of sea buckthorn Adaptyvna (certificate №190899) and Osoblyva (certificate №190900) were included into the State Register of Plant Varieties Suitable for dissemination in Ukraine, and the cultivars of the univer-sal use Nadiina (applications №18299010), Oliana (applications №18299009) and Morkviana (applications № 20299001) and cv pollinator Obrii (applications №18299008) undergo the State strain test. The attention is concentrat-ed on the promising directions of the new sea buckthorn genotypes for the prior breeding and genetic investigations at the Institute of Horticulture (NAAS) and its network.
APA, Harvard, Vancouver, ISO, and other styles
33

Søgaard, Hans Jørgen, and Per Bech. "Psychometric analysis of Common Mental Disorders — Screening Questionnaire (CMD-SQ) in long-term sickness absence." Scandinavian Journal of Public Health 37, no. 8 (August 28, 2009): 855–63. http://dx.doi.org/10.1177/1403494809344653.

Full text
Abstract:
Aims: Mental disorders often go undetected in primary care, for persons awarded disability pension, and in sick-leave certificates. No validity tests of instruments for detection and measurement of mental disorders have been performed in long-term sickness absence (LSA). This is the aim of the present study for Common Mental Disorders — Screening Questionnaire (CMD-SQ). Methods: It is validity tested in a well-defined Danish population comprising all persons on continuous sickness absence just exceeding eight weeks. CMD-SQ is composed of SCL-SOM (somatization), Whiteley-7 (illness worry and conviction), SCL-ANX4 (anxiety), SCL-DEP6 (depression), SCL-8 (emotional disorder), and CAGE (alcohol dependency). Results: Of 2,414 incident persons on long-term sickness absence within one year, 1,121 participated in the study by filling in CMD-SQ and a subsample of 337 was diagnosed by a psychiatric examination including Present State Examination. Psychometric properties such as scalability and monotonicity, construct validity, and predictive validity were analyzed. Further change over time was analyzed. SCL-SOM and Whiteley-7 showed slight psychometric and screening statistics whereas a combined scale of SC-ANX4, SCL-DEP6, and SCL-8, called SCL-8AD, showed the best and excellent psychometric and screening statistics. Conclusions: SCL-8AD, a sub-scale of CMD-SQ, is a promising candidate for screening and measurement of mental disorders in long-term sickness absence.
APA, Harvard, Vancouver, ISO, and other styles
34

Gea, Asaziduhu, and Lisda Junita. "PENERAPAN CRM BERBASIS WEB DAN SMS GATEWAY PELAYANAN ADMINISTRASI UMUM DI DISDUKCAPIL KABUPATEN LANGKAT.pdf." JURNAL ARMADA INFORMATIKA 3, no. 1 (August 1, 2019): 23–35. http://dx.doi.org/10.36520/jai.v3i1.42.

Full text
Abstract:
Service to the community provided by each agency is currently a major concern. The speed of service provided will increase public confidence in the institution. Therefore, all institutions both private and government make every effort to provide the best service in various ways including the use of Digital services. The Department of Population and Civil Registration of Langkat Regency is one of the institutions that provides various public administration services to the public such as making KTP, Birth Certificate, Marriage Certificate, and others. The method of service is still not optimal. Therefore it is necessary to have a media that is a system that integrates the Department of Population and Civil Registration of Langkat Regency with the community with the concept of Customer Relationship Management (CRM) supported by SMS Gateway technology that can help people get the information they need easily and quickly and saving time. Keywords: CRM (Customer Relationship Management), PHP, SQL Server, Web, SMS Gateway
APA, Harvard, Vancouver, ISO, and other styles
35

Tsai, Chia-Wen, and Pei-Di Shen. "The Application of Web and Educational Technologies in Supporting Web-Enabled Self-Regulated Learning in Different Computing Course Orientations." International Journal of Information and Communication Technology Education 7, no. 1 (January 2011): 70–79. http://dx.doi.org/10.4018/jicte.2011010107.

Full text
Abstract:
Many educational institutions provide online courses; however, the question whether they can be as effective as those offered in the face-to-face classroom format still exists. In addition, it also remains unclear whether every subject is appropriate to be delivered in web-based learning environments. Thus, the authors redesigned two courses with different orientations and conducted a quasi-experiment to examine the effects of web-enabled self-regulated learning (SRL) in different course orientations on students’ computing skills. Four classes with 173 students from the courses ‘Database Management System’ and ‘Packaged Software and Application’ were divided into 2 (Design-oriented vs. Procedural-oriented) × 2 (SRL vs. non-SRL) experimental groups. The results showed that students who received the intervention of web-enabled SRL had significantly higher grades on the examination for certificates than those that did not receive this intervention, whether in design-oriented or procedural-oriented computing courses. Moreover, students in the two different courses had very similar scores, which resulted in non-significant differences in their end-of-term computing skills.
APA, Harvard, Vancouver, ISO, and other styles
36

Gu, Jung-Eun, Joongu Kang, and Sang Hwa Jung. "Characteristics of Underwater Acoustics in Different Habitat Types along a Natural River Channel." Water 14, no. 21 (November 3, 2022): 3538. http://dx.doi.org/10.3390/w14213538.

Full text
Abstract:
Fluvial biological habitat types are classified using the diversity in physical characteristics of a water channel. Recent ecological management studies have highlighted the potential of underwater sound as a quantitative indicator of habitat characteristics. We investigate the relationship between underwater acoustic characteristics and hydraulic factors of 12 habitat types in the Namdae Stream in Yangyang, Korea, namely riffles, pools, and step riffle habitats. In the riffles and pools, the underwater sound levels were measured as sound pressure levels (SPLs). SPL(RMS) and 1/3 octave band have been measured in the frequency range between 8 Hz and 20 kHz. Among riffles, high SPL corresponded to the descending level of flow velocity. Pools generally had a low SPL. Low-frequency sound waves in the upper regions are better transmitted in the deeper water. To quantitatively analyze the water depth and flow velocity, we used a regression between the observed water depth, flow velocity, and acoustic SPL. The application of this study was certificated. The correlation coefficients between SPL and flow velocity/water depth revealed specific frequency bands with very strong positive correlations between SPL and flow rate in riffles and very strong negative correlations between SPL and pool water depth. Consequently, underwater sound can be used as an alternative for evaluating biological habitats.
APA, Harvard, Vancouver, ISO, and other styles
37

Hasa, Michal, and Miloš Zich. "Nonlinear Analysis of Precast Dapped-End Beams." Solid State Phenomena 259 (May 2017): 184–89. http://dx.doi.org/10.4028/www.scientific.net/ssp.259.184.

Full text
Abstract:
This article deals with a nonlinear analysis of the detail of the dapped-end beam, the design of which in practice usually employs the design procedures based on the strut-and-tie method. The article is a follow-up to the contribution released in 2014 which presented the experiment carried out with a view to verify the design procedure and to the study showing the influence of the used amount of vertical and inclined hanger reinforcement on the bearing capacity and behaviour of the detail under load. The experiment also included the tests of material properties performed on the used concrete. Along with the inspection certificates issued for the used reinforcement, these tests served as a basis for the nonlinear finite element analysis by the ATENA software. This article presents and compares the results of the aforementioned analysis and experiment.
APA, Harvard, Vancouver, ISO, and other styles
38

Affandi, Muhammad. "Implementasi Virtual Private Network (Vpn) Open vpn Dengan Keamanan Sertifikat SSL pada Network Attached Storage (Nas) Freenas." Jurnal Impresi Indonesia 1, no. 12 (December 20, 2022): 1329–41. http://dx.doi.org/10.58344/jii.v1i12.748.

Full text
Abstract:
Pendahuluan: Perkembangan teknologi informasi dan komunikasi sangat cepat dan pesat, hal ini yang menyebabkan munculnya kemajuan teknologi informasi. Karena banyak kemudahan yang di tawarkan, teknologi informasi tidak dapat lepas dari berbagai aspek kehidupan manusia, yang memungkinkan dapat berkomunikasi dan saling bertukar informasi atau data. Seringkali masalah keamanan berada di urutan kedua, atau bahkan di urutan terakhir dalam daftar hal-hal yang dianggap penting. Tujuan: menghasilkan jaringan privat dan mengamankan data pada Network Attached Storage (NAS) dengan sistem keamanan berbasis SSL yang dapat diakses dari jaringan publik secara privat menggunakan teknologi VPN. Metode: Metode ini menggunakan metode Kuantitatif yang dimana dapat mengambil nilai hasil perhitungan empat parameter QoS. Nilai perhitungan lima parameter QoS dilakukan rekapitulasi berdasarkan waktu dan jenis data, proses rekapitulasi selanjutnya akan memperlihatkan nilai yang lebih detail dari masing-masing parameter QoS. Hasil: Host virtual machine menjalankan 3 guest virtual machine, guest virtual machine pertama untuk FreeNAS Server, guest virtual machine kedua untuk Certificate Authority Server, dan guest virtual machine ketiga untuk OpenVPN Server. Implementasi sistem dibagi menjadi empat langkah yaitu, konfigurasi router mikrotik RB2011, instalasi dan konfigurasi Server FreeNAS, instalasi dan konfigurasi CA Server, instalasi dan konfigurasi OpenVPN Server. Kesimpulan: Berdasarkan pengujian performa QoS OpenVPN terhadap enam parameter yakni, packet loss, round trip, transfer file, Jitter, Download dan Upload yang diujikan pada enam macam Provider, kapasitas bandwidth Provider internet yang dipakai sangat berpengaruh terhadap kualitas layanan ketika terkoneksi menjadi OpenVPN Client. Semakin tinggi kapasitas bandwidth dari Provider yang digunakan semakin baik kualitas layanannya, semakin cepat kecepatan akses datanya.
APA, Harvard, Vancouver, ISO, and other styles
39

Taylor, Sarah. "Growing Up in a Steel Town: Early-Life Pollution Exposure and Later-Life Mortality." Social Science History 44, no. 1 (2020): 117–42. http://dx.doi.org/10.1017/ssh.2019.45.

Full text
Abstract:
ABSTRACTAn important hypothesis about the disease burden of air pollution is that high levels of exposure in childhood can result in a lifetime of health problems, leading to increased mortality rates at older ages. I evaluate this hypothesis using a proprietary data set—Medicare records matched to Social Security records that identify birthplace. I analyze old-age mortality among 390,000 individuals born in small cities and towns in Pennsylvania during the years 1916 through 1927. Some of these individuals were born in places with steel production, and thus likely had exposure to high levels of air pollution in childhood. These individuals have significantly higher rates of mortality post–age 65 than those born in comparable towns that did not have steel production facilities. There are three notable features of the excess mortality among those born in steel towns: (1) the relationship holds for comparisons within counties, (2) the excess mortality is higher in towns that had relatively higher levels of steel production, and (3) old-age mortality is especially high for individuals born in locations with relatively high levels of steel production and relatively low elevation—a finding consistent with the possibility that low-elevation locations were subject to atmospheric inversions that trapped air pollution. By matching the SSA/Medicare data with death certificate data, I am able to establish that the excess mortality associated with childhood exposure to air pollution is due primarily to elevated levels of cancer.
APA, Harvard, Vancouver, ISO, and other styles
40

Asratian, R. E. "Secure Network Channel for Web Services based on SSL/TLS Technology in a Linux Environment." Programmnaya Ingeneria 13, no. 3 (March 23, 2022): 124–31. http://dx.doi.org/10.17587/prin.13.124-131.

Full text
Abstract:
An approach to the organization of secure interaction in distributed systems via a public network is considered, based on the organization of secure communication channels based on sSl/TLS technology. Unlike VPN technology, the described approach is strictly focused on supporting only HTTP/SOAP interactions in distributed systems, which allows you to implement authentication and authorization based on HTTP-header data and client public key certifi­cates as ready-made technical solutions. The approach implies the use of special gateways that provide switching from HTTP to HTTPS on the client side and switching from HTTPS to HTTP on the web server side and make up a "transparent" communication channel for system components. It is assumed that both client programs and web serv­ers are located in the same secure private network (or even on the same network node) with the gateways serving them, and only the interaction between the gateways is carried out through the public network. The work of gateways is based on the use of SSL/TLS technology to add a secure channel over an already open TCP connection. The main idea of the approach is that in this case, security tools are connected at high levels of the OSI protocol hierarchy, which allows gateways to analyze high-level parameters of information requests and responses of web servers con­tained in HTTP-headers. And this, in turn, allows you to add additional "intelligence" to the gateways associated with authentication of servers and clients, as well as with the differentiation of access rights to information resources up to individual functions (methods) of web services based on the data contained in "Subject Name" attribute of public key certificates. The implementation of the approach in the Linux environment and the results of an experimental study are described. In particular, the study showed that when calling service functions with a runtime of 0.5 seconds or higher, the secure channel increases the total query execution time by only a few percent, even with a rather large amount of data being transmitted (up to 200 kilobytes).
APA, Harvard, Vancouver, ISO, and other styles
41

Kang, James Jin, Kiran Fahd, and Sitalakshmi Venkatraman. "Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity." Cryptography 2, no. 4 (December 5, 2018): 38. http://dx.doi.org/10.3390/cryptography2040038.

Full text
Abstract:
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confidentiality and integrity can be achieved using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates, these depend on the correct authentication of servers, which could be compromised due to man-in-the-middle (MITM) attacks. Many existing solutions have practical limitations due to their operational complexity, deployment costs, as well as adversaries. We propose a novel scheme to detect MITM attacks with minimal intervention and workload to the network and systems. Our proposed model applies a novel inferencing scheme for detecting true anomalies in transmission time at a trusted time server (TTS) using time-based verification of sent and received messages. The key contribution of this paper is the ability to automatically detect MITM attacks with trusted verification of the transmission time using a learning-based inferencing algorithm. When used in conjunction with existing systems, such as intrusion detection systems (IDS), which require comprehensive configuration and network resource costs, it can provide a robust solution that addresses these practical limitations while saving costs by providing assurance.
APA, Harvard, Vancouver, ISO, and other styles
42

Trisnowati, Nina. "Legal Protection for Creditors Against Validity of Trade Binding Act with Loan Without Dependent Rights (Analysis of Verdict Number: 34/Pdt/2017/PT. YYK and Number : 214/Pdt.G/2014/PN.Jkt Sel)." Authentica 3, no. 2 (February 8, 2021): 163–85. http://dx.doi.org/10.20884/1.atc.2020.3.2.45.

Full text
Abstract:
Credit, which was previously considered taboo, is now a necessity in society. Everyone is looking for convenience for credit without knowing the risks and impacts that will occur in the future. The most important element of credit (debt) is the trust of the creditor towards the borrower as the debtor. Sale and Purchase Agreement (hereinafter referred to as PJB) is an agreement between a seller to sell his property to a buyer made with a notarial deed. Cases that occurred in Yogyakarta High Court Decision Number 34 / Pdt /2017/PT.YYK and District Court Decision Number 214 / Pdt, G / 2014 / PN. Jkt.Sel is a case of debt receivable with collateral for a certificate of land rights and the parties poured their agreement into the Sale and Purchase Binding Act (PPJB) and the Selling Power of Attorney, considering that after the two decisions, there was an outstanding debt problem, while the debtor was still have not been able to repay their debts to creditors, with guarantees of certificates of land rights without mortgage. The purpose of this study was to analyze the judges' consideration of the decision Number 34 / Pdt /2017/PT.YYK with Decision Number 214 / Pdt.G / 2014 / PN. Jkt Cell regarding sale and purchase agreement. analyze the legal protection for creditors against the validity of the deed of sale and purchase agreement with a loan without mortgage. analyze repayment by defaulting debtors relating to debts and loans without mortgages. The method used in this study is a normative juridical method, analyzed Normatively Qualitatively, The results of the study show that in Decision Number 34 / Pdt /2017/PT.YYK which states are null and void and do not have the power to bind an authentic deed regarding the "Purchase Bond" Number 01/2015 and authentic deed in the form of "Sales Authority" Number 02/2015 , because based on the Supreme Court Jurisprudence of the Republic of Indonesia number 275K / PDT / 2004. Whereas as a comparison for Decision Number 214 / Pdt.G / 2014 / PN. Jkt Cell, which originally had a legal relationship, that is, debt and receivables which stated that the Plaintiff was proven to have committed a default on the Defendant, stated the Purchase Binding Agreement No. 45 dated July 11, 2008 and all of its derivatives are valid and correct deeds; declare the Deed of Credit Recognition No. 46 dated July 11, 2008 and all of its derivatives are valid and correct deeds; certifies Fiduciary Deed (movable property) No. 47 dated July 11, 2008 and all of its derivatives are valid and correct deeds. Keywords: Legal Protection, Debt-Receivables, Binding Agreement of Purchase, Abuse of Circumstances.
APA, Harvard, Vancouver, ISO, and other styles
43

Sánchez-Valdés, Arlen, Rosa María Nava-Rogel, and Alejandro Delgado-Cruz. "Motivaciones de empresas turísticas para certificarse en calidad. Evidencia empírica en el Estado de México." Revista Venezolana de Gerencia 26, no. 93 (January 28, 2021): 349–69. http://dx.doi.org/10.52080/rvg93.24.

Full text
Abstract:
El objetivo es analizar las motivaciones que inciden en la facilidad de certificarse en calidad de las micro, pequeñas y medianas empresas (MIPYMES) turísticas de cinco municipios del Estado de México inscritos en el Programa Pueblos Mágicos: Valle de Bravo, Ixtapan de la Sal, Malinalco, Tepotzotlán y El Oro. Se aplicó una encuesta a 100 MIPYMES y se emplearon como técnicas para el tratamiento de datos la regresión lineal por pasos sucesivos y la modelación de ecuaciones estructurales por covarianzas (CB-SEM). Los resultados ponen de manifiesto que la percepción del turista es la motivación externa con mayor influencia sobre la facilidad de certificación y, ésta a su vez, es determinada por otras motivaciones como el posicionamiento, el apoyo gubernamental y la productividad. Asimismo, se reconoce que las empresas más productivas son aquellas que conocen en qué consiste una certificación, haciendo más fácil que se orienten en las necesidades del mercado y aprovechen los programas públicos de fortalecimiento turístico. Se concluye que una certificación de calidad podría incorporar mejores prácticas de servicio y atención turística, conllevado a las MIPYMES a ser más competitivas.
APA, Harvard, Vancouver, ISO, and other styles
44

Kabak, L., O. P. Bulanyi, O. N. Molotkov, and V. V. Kuts. "Research of information protection possibility by built-in packages of data cryptosecurity for MS SQL server and Oracle certificates." Systems and Technologies 1(57) (2019): 107–23. http://dx.doi.org/10.32836/2521-6643-2019-1-57-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wallett, Lucy, Wentin Chen, Lucretia Thomas, Parisha Blaggan, Emma Ooi, Dengyi Zhou, Thia Hanania, et al. "Developing a simulation-based learning model for acute medical education during COVID-19 pandemic with Simulation via Instant Messaging – Birmingham Advance (SIMBA)." BMJ Open Quality 11, no. 2 (April 2022): e001565. http://dx.doi.org/10.1136/bmjoq-2021-001565.

Full text
Abstract:
Simulation-based learning (SBL) is well-established in medical education and has gained popularity, particularly during the COVID-19 pandemic when in-person teaching is infeasible. SBL replicates real-life scenarios and provides a fully immersive yet safe learning environment to develop clinical competency. Simulation via Instant Messaging – Birmingham Advance (SIMBA) is an exemplar of SBL, which we previously showed to be effective in endocrinology and diabetes. Previous studies reported the efficacy of SBL in acute medicine. We studied SIMBA as a learning intervention for healthcare professionals interested in acute medicine and defined our aims using the Kirkpatrick model: (i) develop an SBL tool to improve case management; (ii) evaluate experiences and confidence before and after; and (iii) compare efficacy across training levels.Three sessions were conducted, each representing a PDSA cycle (Plan-Do-Study-Act), consisting of four cases and advertised to healthcare professionals at our hospital and social media. Moderators facilitated progression through 25 min simulations and adopted patient and clinical roles as appropriate. Consultants chaired discussion sessions using relevant guidelines. Presimulation and postsimulation questionnaires evaluated self-reported confidence, feedback and intended changes to clinical practice.Improvements were observed in self-reported confidence managing simulated cases across all sessions. Of participants, 93.3% found SIMBA applicable to clinical practice, while 89.3% and 88.0% felt SIMBA aided personal and professional development, respectively. Interestingly, 68.0% preferred SIMBA to traditional teaching methods. Following participant feedback, more challenging cases were included, and we extended the time for simulation and discussion. The transcripts were amended to facilitate more participant-moderator interaction representing clinical practice. In addition, we refined participant recruitment over the three sessions. In cycle 1, we advertised incentives: participation counted towards teaching requirements, certificates and feedback. To rectify the reduction in participants in cycle 2, we implemented new advertisement methods in cycle 3, including on-site posters, reminder emails and recruitment of the defence deanery cohort.
APA, Harvard, Vancouver, ISO, and other styles
46

Pan, Jiaye, Yi Zhuang, and Binglin Sun. "Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs." Security and Communication Networks 2019 (October 27, 2019): 1–22. http://dx.doi.org/10.1155/2019/8467081.

Full text
Abstract:
Many famous attacks take web browsers as transmission channels to make the target computer infected by malwares, such as watering hole and domain name hijacking. In order to protect the data transmission, the SSL/TLS protocol has been widely used to defeat various hijacking attacks. However, the existence of such encryption protection makes the security software and devices confront with the difficulty of analyzing the encrypted malicious traffic at endpoints. In order to better solve this kind of situation, this paper proposes a new efficient and transparent method for large-scale automated TLS traffic analysis, named as hyper TLS traffic analysis (HTTA). It extracts multiple types of valuable data from the target system in the hyper mode and then correlates them to decrypt the network packets in real time, so that overall data correlation analysis can be performed on the target. Additionally, we propose an aided reverse engineering method to support the analysis, which can rapidly identify the target data in different versions of the program. The proposed method can be applied to the endpoints and cloud platforms; there are no trust risk of certificates and no influence on the target programs. Finally, the real experimental results show that the method is feasible and effective for the analysis, which leads to the lower runtime overhead compared with other methods. It covers all the popular browser programs with good adaptability and can be applied to the large-scale analysis.
APA, Harvard, Vancouver, ISO, and other styles
47

Nayeem, FMH, MN Hoque, M. Ali, MM Islam, and S. Haque. "Nature and extent of forest resource extraction from Modhupur Sal forest by the community." Progressive Agriculture 28, no. 2 (August 9, 2017): 148–55. http://dx.doi.org/10.3329/pa.v28i2.33476.

Full text
Abstract:
The study was undertaken to document the nature and extent of forest resource extraction from the Modhupur Sal forest by the community people. It was conducted at Rosulpur village in Muktagachha Upazila which is adjacent to Modhupur Upazila of Tangail district. A total of 60 households were selected for data collection using purposive sampling technique. The collected data through field survey method were analyzed using descriptive statistics. The majority of the forest users was aged between 25 to 34 years and had a literacy status of below secondary school certificate level. Around 30% of the forest users depend on agriculture but forest resource extraction was the subsidiary occupation for most of the households that was done by mostly female members of the respondents’ family. Forty percent of the forest users’ income varies from Tk. 10000 to Tk. 15000 per month. Besides these, majority of them had 0.51 to 1.0 acre of cultivable lands. Though different resources are extracted from Modhupur Sal forest such as timber, fuel wood, medicinal plants, etc, but timber is collected by 100% of the respondents. Number of livestock, level of landholding and labor time spent for forest resources collection were the influencing factors for household’s forest resources collection. The majority of the forest users suggested that government need to invest in awareness building program and enforce rules and regulations so that community people can contribute and participate to conserve the forest.Progressive Agriculture 28 (2): 148-155, 2017
APA, Harvard, Vancouver, ISO, and other styles
48

Journal, Baghdad Science. "The Impact of Operating System on Bandwidth in Open VPN Technology." Baghdad Science Journal 13, no. 1 (March 6, 2016): 204–11. http://dx.doi.org/10.21123/bsj.13.1.204-211.

Full text
Abstract:
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.
APA, Harvard, Vancouver, ISO, and other styles
49

Cabezas, Víctor Goyes, Miguel Goyes Cabezas, Oscar Mora Castro, Joffre León Paredes, Mario Quispe Sandoval, Yary Ruiz Parrales, Carlos Castro Arteaga, and Miguel Fuentes Fajardo. "Tolerância de cultivares de arroz (Oryza sativa L.), ao complexo de coloração de grãos na estação chuvosa da costa equatoriana / Tolerance of rice cultivars (Oryza sativa L.), to the grain spotting complex in the rainy season on the Ecuadorian coast." Brazilian Journal of Animal and Environmental Research 4, no. 4 (December 29, 2021): 6616–28. http://dx.doi.org/10.34188/bjaerv4n4-141.

Full text
Abstract:
O complexo de coloração de grãos é uma doença que afeta componentes de desempenho na cultura do arroz, por causar seu desaparecimento e diminuição de: germinação entre 26 e 41%; vigor e tamanho da muda; número de grãos por panícula; peso do grão até 40%; 30% de enchimento de grãos; Da mesma forma, prejudica a qualidade da semente, reduzindo o número de grãos inteiros e aumentando os grãos quebradiços no processo de moagem, como grãos de giz e grãos com coloração anormal. O objetivo do presente trabalho foi avaliar a tolerância de cultivares de arroz (Oryza sativa L.) ao complexo de coloração de grãos na estação chuvosa na área de Babahoyo. Para tanto, foram estabelecidos seis tratamentos e quatro repetições, utilizando sementes certificadas das variedades de arroz SFL 09, SFL 11, SFL 12, INIAP 14, INIAP 15 e INIAP Cristalino. Foi aplicado o delineamento experimental Blocos Completos ao acaso, onde as comparações das médias foram feitas com o teste de intervalo múltiplo de Tukey a 95% de probabilidade. As parcelas experimentais tiveram dimensões de 5,0 x 6,0 m, a separação entre as repetições foi de 1,0 m, dando uma área de teste de 810 m2. Todas as tarefas agrícolas necessárias foram realizadas no cultivo do arroz para o seu desenvolvimento normal, tais como preparo do terreno, semeadura, irrigação, fertilização, controle de ervas daninhas e fitossanitárias, e colheita. Para estimar corretamente os efeitos dos tratamentos, foram tomados os dados de incidência e severidade do complexo de coloração de grãos, determinação do agente causal, produtividade da cultura e análises econômicas. Através dos resultados obtidos, determinou-se que as variedades de arroz SFL 11, SFL 12, INIAP 14, INIAP 15 e INIAP Cristalino apresentam tolerância ao complexo de coloração de grãos no período chuvoso na região de Cedegé. A maior incidência (10,7%) e severidade (27,7%) do complexo de coloração de grãos ocorreu na variedade de arroz SFL 09; Curvularia sp. Foi determinado como o agente causal da coloração de grãos. e Helminthosporium sp. e a maior produtividade da cultura foi obtida com a variedade Iniap 15 com 5101,0 kg / ha.
APA, Harvard, Vancouver, ISO, and other styles
50

Bondan Dwisetyo, Maharani Ratna Palupi, and Fajar Budi Utomo. "UNCERTAINTY ANALYSIS OF LABORATORY MEASUREMENT OF AIRBORNE SOUND INSULATION." Spektra: Jurnal Fisika dan Aplikasinya 5, no. 2 (August 31, 2020): 97–108. http://dx.doi.org/10.21009/spektra.052.02.

Full text
Abstract:
The evaluation and analysis of the uncertainty of laboratory measurement of airborne sound insulation have been carried out by Research Group for Acoustics and Vibration – National Standardization Agency of Indonesia (BSN). The aims of this work are to evaluate and analyze the uncertainty measurement of airborne sound insulation by pressure method, where it is focused only for the determination of sound transmission loss (STL) as a major product of this measurement according to ASTM, and guide to the expressions of Uncertainty in Measurement (GUM) provided by JCGM. The supplied parameter of uncertainty budgets includes measurement of sound pressure level (SPL) in a source room (L1), and measurement of some parameters in a receiver room such as SPL (L2), reverberation time (RT60), background noise (B), test opening area (S), and volume of receiver room (V). From the result of the case study, the source of uncertainty that has a top contribution for obtaining expanded uncertainty is considered as the repeated measurement of the measured parameter such as L1, L2, and RT60 at the frequency range 250 Hz – 315 Hz. Meanwhile, the standard uncertainty that provided by the calibration certificate also contributes to the final result, where it is supplied by an acoustic calibrator and sound analyzer, respectively. Furthermore, the sources obtained from the readability parameter has a slight effect on this whole result. Therefore, the maximum and minimum value of expanded uncertainty is determined that their values are 0.70 dB and 0.43 dB for the frequency of 315 Hz and 1600 Hz, respectively.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography