Статті в журналах з теми "Secure web-application development"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Secure web-application development.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secure web-application development".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Arif Ulla, Sayyad. "Secure Development - Web Application Security." IOSR Journal of Computer Engineering 14, no. 6 (2013): 14–22. http://dx.doi.org/10.9790/0661-1461422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lee, Junho, Jungwoong Woo, Cheongan Lee, and Kyungsoo Joo. "A Software Development Methodology for Secure Web Application." International Journal on Advanced Science, Engineering and Information Technology 9, no. 1 (February 28, 2019): 336. http://dx.doi.org/10.18517/ijaseit.9.1.5987.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Moon, Jae-Chan, and Seong-Je Cho. "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development." Journal of the Korea Society of Computer and Information 17, no. 2 (February 29, 2012): 127–37. http://dx.doi.org/10.9708/jksci.2012.17.2.127.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Kornienko, D. V., S. V. Mishina, and M. O. Melnikov. "The Single Page Application architecture when developing secure Web services." Journal of Physics: Conference Series 2091, no. 1 (November 1, 2021): 012065. http://dx.doi.org/10.1088/1742-6596/2091/1/012065.

Повний текст джерела
Анотація:
Abstract The article is devoted to the development of a prototype of a secure single page-application (SPA) web service for automating user information accounting. The relevance of this study is very high due to the use of web services. The article provides a classification of web applications and shows the features of the architecture of a single page application used in the development of the service. Based on a comparative analysis of the architectural styles of the API, the most appropriate style was selected. Considered and taken into account the key points of the development of a secure application programming interface (API), the requirements that must be met by RESTful API services. The work used popular authentication schemes (methods). A comparative characteristic of web frameworks of the Python programming language is given, on the basis of which a tool for implementing a web service is selected. Shows the main advantages of using Python when developing paged web services and the security tools included in the standard package of the Flask web services development framework. Shows how to securely prototype a Python RESTful SPA Web Service API using Flask. An example of using the Swagger tool to describe the specifications of the developed API is given. The process of setting up the application is considered in detail. The main recommendations for securing a web application, setting up a database and a web server are listed. The key points of ensuring the protection of the developed web application are considered. Conclusions are made regarding the choice of the architectural style of the application API, the most suitable tools and technologies for the software implementation of the service.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pathak, Nitish, B. M. Singh, and Girish Sharma. "UML 2.0 based framework for the development of secure web application." International Journal of Information Technology 9, no. 1 (February 22, 2017): 101–9. http://dx.doi.org/10.1007/s41870-017-0001-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Nathawat, Mukul Singh. "Development of Ecommerce Web Application: Pick & Buy." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3683–85. http://dx.doi.org/10.22214/ijraset.2021.35628.

Повний текст джерела
Анотація:
Electronic commerce is a process of performing business through online modes using computer networks. Now-a-days Ecommerce is seen as an important part of many businesses and business plan. It is beneficial in terms of cost reduction, fast buying, affordable advertisements and marketing, flexibility for buyers, product and price comparison and last but not the least time- saving. Using Ecommerce websites for shopping is not only easy and effortless but also less time consuming. Ecommerce is useful for feedbacks and helps the business owners to build a more efficient and secure business environment for customers.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Mouratidis, Haralambos, and Miao Kang. "Secure by Design." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 23–41. http://dx.doi.org/10.4018/jsse.2011070102.

Повний текст джерела
Анотація:
This paper describes results and reflects on the experience of engineering a secure web based system for the pre-employment screening domain. In particular, the paper presents results from a Knowledge Transfer Partnership (KTP) project between the School of Computing, IT and Engineering at the University of East London and the London-based award winning pre-employment company Powerchex Ltd. The Secure Tropos methodology, which is based on the principle of secure by design, has been applied to the project to guide the development of a web based system to support employment reference and background checking specifically for the financial services industry. Findings indicate the potential of the methodology for the development of secure web based systems, and support the argument of incorporating security considerations from the early stages of the software development process, i.e., the idea of secure by design. The developed system was tested by a third, independent to the project, party using a well known method of security testing, i.e., penetration testing, and the results provided did not indicate the presence of any major security problems. The experience and lessons learned by the application of the methodology to an industrial setting are also discussed in the paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Korneva, L. A., and P. B. Khorev. "Development of framework secure application with client-server architecture." Informacionno-technologicheskij vestnik 15, no. 1 (March 30, 2018): 112–19. http://dx.doi.org/10.21499/2409-1650-2018-1-112-119.

Повний текст джерела
Анотація:
When creating software systems developers need to choose the most effective design solutions, which may make frameworks, created by other developers. Such a framework can be used as a basis for new applications. Not all available client-server application developers frameworks give due regard to the safety of such applications. So there is a need to develop a framework to create a secure client-server application. To create such a framework in the Java programming language is selected. This article provides a set of components that are required to create a framework of information security-oriented Web applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Qu, Bo, and Zhong Xue Yang. "Design of Web Based Secure Embedded System in C." Applied Mechanics and Materials 347-350 (August 2013): 1635–40. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1635.

Повний текст джерела
Анотація:
This paper describes the design and implementation of Web based secure embedded system, including tiny secure Web server, embedded system-based CGI library, and utilities for security, such as CAPTCHA program and mail sending program. The entire system is designed in C by the author of this paper on Linux platform with GNU tool chain. A Web based secure embedded application demo system is also designed to show the architecture and running effect. On the premise of implementing essential functions, the scale of the system is designed as small as possible therefore it is suitable not only for embedded Linux development on Web based applications but also for embedded system course teaching in colleges and universities. By some further extensions, it can also be used on development of general Web based MIS.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Xu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.

Повний текст джерела
Анотація:
Mobile e-commerce systems are the big trend of international economy and social development now days, and also the key process of industry upgrade, industrialization and modernization in our country. Mobile e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. With the help of Chinese Wall, web services are becoming popular in Web applications. In the end, we present strategies for e-commerce application: trusted e-commerce module.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Kornienko, D. V., S. V. Mishina, S. V. Shcherbatykh, and M. O. Melnikov. "Principles of securing RESTful API web services developed with python frameworks." Journal of Physics: Conference Series 2094, no. 3 (November 1, 2021): 032016. http://dx.doi.org/10.1088/1742-6596/2094/3/032016.

Повний текст джерела
Анотація:
Abstract This article discusses the key points of developing a secure RESTful web service API for keeping a student achievement journal. The relevance of using web services has been analyzed. The classification of web applications is given. The features of the Single Page Application architecture were considered. Comparative characteristics of architectural styles of application programming interfaces are given. Requirements to be met by RESTful API services are considered. The basic principles of API security were analyzed. A list of the main vulnerabilities that may appear during the development of the REST API is given. An overview of popular authentication schemes (methods) is given. Comparative characteristics of web frameworks of the Python programming language are given. The main tools used in the development of web API applications are listed. The process of creating a secure prototype of a RESTful web service API in Python using the Flask microframework and a tool for describing the Swagger specifications is presented. The process of configuring the application was examined in detail. The main recommendations for securing a web application, database and web server settings are listed. The key points of ensuring the protection of the developed web application are considered. The results obtained were analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

WATANABE, Hidenobu, Sen UENO, and Ken T. MURATA. "A Method for Cooperation with A Secure Web Application Development by The NICT Science Cloud." Joho Chishiki Gakkaishi 24, no. 3 (2014): 291–96. http://dx.doi.org/10.2964/jsik_2014_029.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Buja, Alya Geogiana, Nurul Syahirah Khairuddin, Noor Afni Deraman, and Khyrina Airin Fariza Abu Samah. "Development of a browser extension for web application vulnerability detection, avoidance, and secure browsing (VDAS)." International Journal of Advanced Technology and Engineering Exploration 8, no. 77 (April 30, 2021): 537–44. http://dx.doi.org/10.19101/ijatee.2020.762187.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Anugrah, Indra Gita, and Muhamad Aldi Rifai Imam Fakhruddin. "Development Authentication and Authorization Systems of Multi Information Systems Based REst API and Auth Token." INNOVATION RESEARCH JOURNAL 1, no. 2 (September 22, 2020): 127. http://dx.doi.org/10.30587/innovation.v1i2.1927.

Повний текст джерела
Анотація:
The security of an application is the most important problem in an information system integration process. The authentication and authorization process is usually carried out using Single Sign On (SSO). Authentication and authorization methods are used to secure data in a system. The authentication and authorization processes are carried out on the client side (web browser) in the form of a session and on the server side (web server) in the form of cookies. Sessions and cookies are valuable assets in the authentication and authorization process because they contain the data required for the login process so that the session and cookies need to be secured. Session is a combination of username and password data that has been encrypted while cookies store login information data so that they are still in a state of gaining access according to the privileges given to the user. So important is the role of sessions and cookies in the authentication and authorization process, so we need a way to secure data on sessions and cookies. One way to secure data is to use the REst API and Auth Token.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Pathak, Nitish, B. M. Singh, and Girish Sharma. "An Empirical Perspective of Roundtrip Engineering for the Development of Secure Web Application Using UML 2.0." International Journal of Intelligent Systems and Applications 9, no. 5 (May 8, 2017): 43–54. http://dx.doi.org/10.5815/ijisa.2017.05.06.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Andrian, Rian, and Ahmad Fauzi. "Security Scanner For Web Applications Case Study: Learning Management System." Jurnal Online Informatika 4, no. 2 (February 14, 2020): 63. http://dx.doi.org/10.15575/join.v4i2.394.

Повний текст джерела
Анотація:
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Huda, Choirul, Chendra Hudyanto, Sisillia Sisillia, and Revin Kencana Persada. "THE DEVELOPMENT OF A WEB BASED DATABASE APPLICATIONS OF PROCUREMENT, INVENTORY, AND SALES AT PT. INTERJAYA SURYA MEGAH." CommIT (Communication and Information Technology) Journal 5, no. 2 (October 31, 2011): 57. http://dx.doi.org/10.21512/commit.v5i2.560.

Повний текст джерела
Анотація:
The objective of this research is to develop a web based database application for the procurement, inventory and sales at PT. Interjaya Surya Megah. The current system at PT. Interjaya Surya Megah is running manually, so the company has difficulty in carrying out its activities. The methodology, that is used in this research, includes interviews, observation, literature review, conceptual database design, logical database design and physical database design. The results are the establishment of a web-based database application at PT. Interjaya Surya Megah. The conclusion is the company can be easier to run the day-to-day activities because data processing becomes faster and more accurate, faster report generation and more accurate, more secure data storage.Keywords: database; application; procurement; inventory; sales
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Li, Jinfeng. "Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)." Annals of Emerging Technologies in Computing 4, no. 3 (July 1, 2020): 1–8. http://dx.doi.org/10.33166/aetic.2020.03.001.

Повний текст джерела
Анотація:
The delivery of a framework in place for secure application development is of real value for application development teams to integrate security into their development life cycle, especially when a mobile or web application moves past the scanning stage and focuses increasingly on the remediation or mitigation phase based on static application security testing (SAST). For the first time, to the author’s knowledge, the industry-standard Open Web Application Security Project (OWASP) top 10 vulnerabilities and CWE/SANS top 25 most dangerous software errors are synced up in a matrix with Checkmarx vulnerability queries, producing an application security framework that helps development teams review and address code vulnerabilities, minimise false positives discovered in static scans and penetration tests, targeting an increased accuracy of the findings. A case study is conducted for vulnerabilities scanning of a proof-of-concept mobile malware detection app. Mapping the OWASP/SANS with Checkmarx vulnerabilities queries, flaws and vulnerabilities are demonstrated to be mitigated with improved efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Wang, Cheng, Zhi Guang Huang, Hui Min Liu, Jin Gou, and Li Xiao Zheng. "ASP.NET Websites Longitudinal Security Theoretical System." Applied Mechanics and Materials 513-517 (February 2014): 597–601. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.597.

Повний текст джерела
Анотація:
With the development of Internet technology, ASP.NET has been the most widely used Web platform. The invasion and attack of ASP.NETs sites bring Websites developed by ASP.NET facing a severe trial. With the constant expansion of the site, the Microsoft security features were not enough. This paper will summed up the knowledge and experience of ASP.NET website security development based on the Web security theory. In this paper, the strategy of the longitudinal analysis, platform security, data security, Web application security, WCF security, website front-end security and other important aspects will be analyzed. By constructing a relatively complete theoretical of ASP.NET security, intelligence e-business web site Kooboo eCommerce become much more secure.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Gutierrez, Amelie Anne. "SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)." International Journal of Computer Science and Information Technology 13, no. 6 (December 31, 2021): 39–57. http://dx.doi.org/10.5121/ijcsit.2021.13604.

Повний текст джерела
Анотація:
There are essential security considerations in the systems used by semiconductor companies like TI. Along with other semiconductor companies, TI has recognized that IT security is highly crucial during web application developers' system development life cycle (SDLC). The challenges faced by TI web developers were consolidated via questionnaires starting with how risk management and secure coding can be reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis tool by developing a prototype application mapped with IT Security goals, project management and SDLC initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was able to satisfy IT Security requirements in the SDLC and PM phases.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Al-Mahrouqi, Rasha, Khalsa Al Siyabi, Amani Al Nabhani, Salma Al-Hashemi, and Shoukath Ali Muhammed. "E-commerce Web App in Azure Cloud: Considerations, Components of Implementation and Schematic Design." Computer and Information Science 14, no. 4 (September 21, 2021): 32. http://dx.doi.org/10.5539/cis.v14n4p32.

Повний текст джерела
Анотація:
Consumers shifted their spending to the web due to the coronavirus (Covid-19) outbreak. Businesses and organizations that once mapped digital strategy with careful planning over a transition period, now forced to scale their initiatives in a matter of days. In this regard, we are motivated by the need to develop a scalable, highly available, resilient, secure, and cost-effective e-commerce web application for demonstrating how cloud services can be leveraged for implementing such applications. This paper is a part of the aforementioned web application development project, titled “A cloud-based e-commerce storefront prototype for SMEs in Oman”. In this paper, we discuss the system considerations, components of implementation, and the schematic design of the proposed software solution. This paper provides meaningful guidelines for companies that want to adopt cloud-based E-commerce web application to bring their products and services online without much upfront cost or initial investment.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Ahmed, Hanaa Mohusan, and Ahmed Oday Alazzawi. "User Authentication Secure by Randomly Cubic Spline Curve and Blum Blum Shub Algorithm." Al-Mustansiriyah Journal of Science 30, no. 1 (August 15, 2019): 99. http://dx.doi.org/10.23851/mjs.v30i1.421.

Повний текст джерела
Анотація:
With the tremendous development witnessed by the world in recent times, computer security significance expanded as insurance procedure of registering systems and authentication the user with scientific and technological developments are increasing every day. This assurance procedure is connected for touchy information such of electronic business, electronic learning, and electronic saving money exchange, online networking and more administrations over the web by utilizing login application to distinguish the character for doing this authentication. The problem by using some application login how to detected the user authentic and experimental data collection and separated the duplicated name that may be Confusion the system with speed detected and difficult attack. This paper solve this problem by used Cubic spline to easy represented name and easy detected by distance Euclidean equation, authentication techniques utilized as insurance process by securing name mix with Blum Blum Shub (BBS) algorithm that have randomly number. In this work, the application is founded on type name that the combine with (BBS) and represented by cubic spline, to detected user. The result of proposed work require randomly number to drawing the curve to detect and how much the different shape in cubic spline curve that can be detected. Assurance gives affirmation distinguished suitable security and all the more effortlessly least complex that developing popular in the online application that shows in result some portion of the paper
Стилі APA, Harvard, Vancouver, ISO та ін.
23

SWAMY, NIKHIL, JUAN CHEN, CÉDRIC FOURNET, PIERRE-YVES STRUB, KARTHIKEYAN BHARGAVAN, and JEAN YANG. "Secure distributed programming with value-dependent types." Journal of Functional Programming 23, no. 4 (July 2013): 402–51. http://dx.doi.org/10.1017/s0956796813000142.

Повний текст джерела
Анотація:
AbstractDistributed applications are difficult to program reliably and securely. Dependently typed functional languages promise to prevent broad classes of errors and vulnerabilities, and to enable program verification to proceed side-by-side with development. However, as recursion, effects, and rich libraries are added, using types to reason about programs, specifications, and proofs becomes challenging. We present F*, a full-fledged design and implementation of a new dependently typed language for secure distributed programming. Our language provides arbitrary recursion while maintaining a logically consistent core; it enables modular reasoning about state and other effects using affine types; and it supports proofs of refinement properties using a mixture of cryptographic evidence and logical proof terms. The key mechanism is a new kind system that tracks several sub-languages within F* and controls their interaction. F* subsumes two previous languages, F7 and Fine. We prove type soundness (with proofs mechanized in Coq) and logical consistency for F*. We have implemented a compiler that translates F* to .NET bytecode, based on a prototype for Fine. F* provides access to libraries for concurrency, networking, cryptography, and interoperability with C#, F#, and the other .NET languages. The compiler produces verifiable binaries with 60% code size overhead for proofs and types, as much as a 45x improvement over the Fine compiler, while still enabling efficient bytecode verification. We have programmed and verified nearly 50,000 lines of F* including new schemes for multi-party sessions; a zero-knowledge privacy-preserving payment protocol; a provenance-aware curated database; a suite of web-browser extensions verified for authorization properties; a cloud-hosted multi-tier web application with a verified reference monitor; the core F* typechecker itself; and programs translated to F* from other languages such as F7 and JavaScript.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Mindila, Agnes N., Joseph M. Wafula, Harriet A. M. Ratemo, Collins Tabu, Joyce Charo, and Catherine Silali. "Requirements elicitation for a blockchain vaccine supply chain management web/mobile application." Gates Open Research 3 (April 26, 2019): 1420. http://dx.doi.org/10.12688/gatesopenres.12877.1.

Повний текст джерела
Анотація:
Background: This paper presents the processes carried out to be able to develop/gather the complete and right requirements to developing a secure and effective blockchain system for the vaccine supply chain. The paper hence presents the requirements elicitation activity of the Blockchain web/mobile application for vaccine supply chain. Methods: A mixed-methods methodology was applied. The methods employed were; document review, survey, focus group workshops, interviews, observation, brainstorming, brainwriting Unified Modeling Language and system dynamics. Results: The paper present results of each of the methods used in requirements elicitation for eight themes, namely: temperature monitoring; quality, suitability and capacity of transport facilities; information systems and supportive management functions; storage quality, suitability and capacity; maintenance of cold-chain equipment; vaccine distribution; vaccine management policies and stock management. The results presented gave understanding of the operation of the existing vaccine supply chain and the requirements for the blockchain web/mobile application for vaccine supply chain. Conclusions: The requirements for the development of the desired vaccine supply chain web/mobile application were captured and documented.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

S, Uppliammal, Stanley D, and S. Sowmiya. "Automated Access Communication System." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 309–17. http://dx.doi.org/10.5121/ijci.2021.100234.

Повний текст джерела
Анотація:
Automated Access Communication System is concerned with the development of a system that is simple and easy to use yet a powerful web application for sharing, managing and controlling enterprise documents on intranet/internet in a secure manner within the particular organization. It enables the communication between all the departments of the company through online. The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Jurnal, Redaksi Tim. "PENERAPAN ALGORITMA RIVERT CODE 4 (RC 4) PADA APLIKASI KRIPTOGRAFI DOKUMEN." PETIR 11, no. 1 (November 6, 2018): 38–47. http://dx.doi.org/10.33322/petir.v11i1.6.

Повний текст джерела
Анотація:
The development of information technology, has made the information as a basic requirement for everyone. To secure the information we have, one of the techniques of data and information security is cryptography. Therefore, the authors make an application that can maintain the confidentiality of the information and the intended application is web-based cryptographic applications. This application can be used to secure the data. In this application, the cryptographic algorithm to be used is the algorithm Rivest Code 4 (RC4). RC4 is a stream cipher algorithm that processes the type of data input unit. Algorithms Rivest Code 4 (RC4) is also part of a symmetric algorithm, in which the encryption and decryption process has the same key. Making these applications using the programming language PHP and MySQL. Modeling methods in making this application is a method of UML (Unified Modeling Language). The results to be achieved from this research is biased document cryptographic applications perform encryption and decryption algorithms Rivest document with Code 4 (RC4).
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Raj, Gaurav, Manish Mahajan, and Dheerendra Singh. "Trust Decision Model and Trust Evaluation Model for Quality Web Service Identification in Web Service Lifecycle Using QSW Data Analysis." International Journal of Web-Based Learning and Teaching Technologies 15, no. 1 (January 2020): 53–72. http://dx.doi.org/10.4018/ijwltt.2020010103.

Повний текст джерела
Анотація:
In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy. This article proposes a trust evaluation and decision model where the authors have defined indirect attribute, trust, calculated based on available direct attributes in quality web service (QWS) data sets. After getting training of such evaluation and decision strategies, developers and customers, both will use the knowledge and improve the QoS. This research provides web-based learning about web service quality which will be utilized for prediction, recommendation and the selection of trusted web services in the pool of web services available globally. In this research, the authors include designs to make decisions about the trustworthy web services based on classification, correlation, and curve fitting to improve trust in web service prediction. In order to empower the web services life cycle, they have developed a quality assessment model to incorporate a security and performance policy.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Raj, Dr Shaji N. "A Flexible Vulnerability Reduction System Using Machine Learning." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3784–91. http://dx.doi.org/10.47059/revistageintec.v11i4.2407.

Повний текст джерела
Анотація:
The human system have an ability to adapt dynamically and protect against biological viruses is amazing. Computer security faces an ever-increasing threat and a system which can prevent any viruses coming in, is an open research problem. We propose a new model, called (RI Secure Web), whic h can be resilient and immune to web application vulnerability for injection and URL manipulation for injection methods using an agent based machine learning system The ability of human immune system to survive and maintain body from different damages and its self curing capabi lity inspires the development of a resilient and adaptive cyber security system. Such system functions proactive and defends itself against viruses as human immune system does. In this paper, an architectural view of a system for reducing application level vulnerabilities to protect cyber attacks, particularly injection method is proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Dang, Chi Van, Khoat Duc Nguyen, Luc The Nguyen, Dung Ngoc Le, Quan Hong Luu, and Son Thanh Huynh. "Applying AES algorithm for secure data transmission between Sensor node and LoRa Gateway to Web Server." Journal of Mining and Earth Sciences 63, no. 1 (February 28, 2022): 105–14. http://dx.doi.org/10.46326/jmes.2022.63(1).10.

Повний текст джерела
Анотація:
Lora Gateway is an intermediary device that can connect devices in the IoT system. IoT is the Internet of Things, consisting of a system of interrelated digital and mechanical devices and machines, capable of transmitting data over a network without requiring human-computer interaction. Lora is a long distance wireless communication technology that enables communication over a wide range between devices. Through this device, the Sensor nodes in the IoT system can transmit and receive data by LoRa waves to the Gateway and by Wifi/3G to the web server via the Internet. Data communicates in the internet environment, so important information needs to be protected by data encryption. This paper presents research and application of 128-bit AES symmetric encryption algorithm in LoRa wide area sensor network to secure data transmission between IoT devices and web server through LoRa Gateway device. The research team has designed and built models for testing sensor stations with integrated humidity and temperature sensors, LoRa Gateway integrating Lora module and wifi/3G module, developing the interface on web server with decoding, monitoring, and data storage features, and proposing a solution with AES encryption algorithm and architecture applied in the development of embedded software for LoRa module. The research results are tested on the model to test the encryption, data transmission, and decryption functions in applications for IoT LoRa Gateway systems. With this initial research, it is possible to apply the AES algorithm to secure data transmission in IoT Gateway systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Lesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.

Повний текст джерела
Анотація:
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attacks in order to be able to develop various protection mechanisms. This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. In XSS attacks, malicious content is delivered to users by means of a client-side programming language such as JavaScript, while using SQL injection, the SQL database query language is used. At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. Developers should develop security for both server components and the client part of the web application.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Liu, Joyce F., Jung-min Lee, Ellie Strock, Ruth Phillips, Karine Mari, Bill Killiam, Matthew Bonam, Tsveta Milenkova, Elise C. Kohn, and S. Percy Ivy. "Technology Applications: Use of Digital Health Technology to Enable Drug Development." JCO Clinical Cancer Informatics, no. 2 (December 2018): 1–12. http://dx.doi.org/10.1200/cci.17.00153.

Повний текст джерела
Анотація:
Purpose This pilot study developed and evaluated the feasibility, usability, and perceived satisfaction with an end-user mobile medical application and provider web portal. The two interfaces allowed for remote monitoring, provided daily guidance in the management of hypertension and diarrhea, and allowed for rapid management of adverse events during a clinical trial of olaparib and cediranib. Patients and Methods eCO (eCediranib/Olaparib) was designed for patient self-reported, real-time management of hypertension and diarrhea using remote monitoring. eCO links to a Bluetooth-enabled blood pressure (BP) monitor and transmits data to a secure provider web portal. eCO use was assessed for suitability, usability, and satisfaction after 4 weeks using a 17-item questionnaire. Metrics regarding patient-reported BP and diarrhea events were analyzed. Results Sixteen patients enrolled in the pilot. A total of 98.2% of expected BP values were reported: 94.2% via Bluetooth and 5.8% entered manually. Twelve patients experienced 21 BP events (systolic BP > 140 and/or diastolic BP > 90 mmHg on two consecutive readings); data from cycle 1 were comparable to the study database. Thirteen patients reported diarrhea (more than one stool per 24 hours over baseline) categorized as grade 1 or 2, which was comparable to the study database. Survey analysis showed that patients had statistically significant, positive responses to the use of the eCO application. Patients indicated eCO use made them feel more involved in their care and better connected to their health care team. The only aspect of the application that did not show a statistically significant positive response was the process of reporting diarrhea. Conclusion The eCO application was designed to assist in managing acute treatment-related events most often associated with treatment discontinuation, need for drug holidays, or dose interruption. Hypertension and diarrhea events reported via eCO allowed rapid provider response and a positive overall patient experience.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Busse, Monica, Julie Latchem-Hastings, Kate Button, Vince Poile, Freya Davies, Rhian O' Halloran, Barbara Stensland, et al. "Web-based physical activity intervention for people with progressive multiple sclerosis: application of consensus-based intervention development guidance." BMJ Open 11, no. 3 (March 2021): e045378. http://dx.doi.org/10.1136/bmjopen-2020-045378.

Повний текст джерела
Анотація:
ObjectivesPeople with progressive multiple sclerosis (PwPMS) report that they recognise the benefits of activity on their physical and psychological health but need support to achieve their physical activity goals. We aimed to systematically develop a theoretically informed intervention that would enable PwPMS to more readily engage in regular physical activity.DesignWe used an intervention mapping approach to inform intervention development.SettingWe conducted semistructured interviews with PwPMS and their families/carers and physiotherapists recruited from secondary care settings.ParticipantsFourteen PwPMS with an Expanded Disability Status Scale score of between 6 and 8 and 7 of their families/carers and 13 physiotherapists and 1 physiotherapy technician participated.ResultsInterview data suggested that the development of supportive coaching relationships with physiotherapists could promote the ability of PwPMS to achieve a desirable and achievable physical activity plan. These interview data informed the prototype ‘Lifestyle Exercise and Activity Package for Multiple Sclerosis’ (LEAP-MS) consisting of a secure multiuser web-based platform (with an education and activity suite, interactive components enabling selection of exercises, goal setting and activity logging), up to six flexible face-to-face or web-based physiotherapy coaching sessions and remote support via an embedded web-based messaging function that all together draw on specific theory-based methods to achieve physical activity behaviour change, namely active learning, reinforcement, modelling, feedback, facilitation, goal setting and guided practice. Implementation is within a multiuser platform accessible to participants, trained physiotherapists and researchers.ConclusionsWe have followed an inclusive, systematic and transparent process to develop the LEAP-MS intervention that enables detailed description of components, context and guiding principles to inform ongoing evaluation. Importantly, PwPMS expressed the need for autonomy in developing physical activity plans. This has been achieved through the embedding of self-management principles in the design and delivery of the LEAP-MS intervention.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Bolton, Jennifer, and Cristina !Palacios. "The Development of Baby Feed: A Web Application for Health Professionals and Parents to Improve Infant Diets." Current Developments in Nutrition 5, Supplement_2 (June 2021): 963. http://dx.doi.org/10.1093/cdn/nzab051_007.

Повний текст джерела
Анотація:
Abstract Objectives To develop the web application “Baby Feed” that can: 1) Quickly and easily evaluate infant diets using a validated Infant Food Frequency Questionnaire (FFQ) developed by our group. 2) Provide automatic results online to clinicians on nutrients and foods/beverages consumed above or below the recommended levels. 3) Provide current diet recommendations by infant's age for clinicians to discuss with parents during routine Well-Child Visits. 4) Provide parents online access to the infant diet recommendations and a short tracking question component, with the goal of improving the infant's diet. This could translate into healthy weight gain during infancy and prevent early childhood obesity. Methods In collaboration with the computer science department, our group previously converted the 55-item Infant FFQ and nutrient/food database from paper format to web portals in Baby Feed. The web portals were built in MongoDB and deployed on Microsoft Azure. Next, a secure login system with usernames and passwords was created that directs users to their assigned portal: administrative, parental, or clinician. Tabs were created in the portals that show FFQ results, diet recommendations, and tracking history. The short tracking questions were created for parents to select whether their infant had consumed more, equal, or less than the recommended amounts of the 10 food groups during the past week. Results Baby Feed was developed where: (1) Parents can complete the Infant FFQ online. (2) Clinicians can view the automatic results, which are available in nutrients and foods/beverages color-coded to highlight those consumed above or below the recommended levels. (3) Diet recommendations are presented online in a friendly and graphic way that are easy to follow in tablespoons, cups, and ounces per day. (4) The short tracking questions can help parents at home make goals and stayed engaged in between Well-Child Visits. This use of technology can allow parents at their convenience to access knowledge in Baby Feed and develop skills in infant feeding. Conclusions The development of Baby Feed was successful, and the web application is ready to be pilot tested. Baby Feed could be used by health professionals and parents during routine Well-Child Visits as a tool to improve the diet quality in infants and prevent early childhood obesity. Funding Sources Caplan Foundation for Early Childhood
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Norton, Louis, Joseph Ciervo, Victor S. Lobanov, and Dimitris K. Agrafiotis. "Xcellerate Investigator Portal: A New Web-Based Tool for Online Delivery of Central Laboratory Data, Reports, and Communications to Clinical Sites." SLAS TECHNOLOGY: Translating Life Sciences Innovation 25, no. 5 (July 29, 2020): 427–35. http://dx.doi.org/10.1177/2472630320942200.

Повний текст джерела
Анотація:
Covance Drug Development produces more than 55 million test results via its central laboratory services, requiring the delivery of more than 10 million reports annually to investigators at 35,000 sites in 89 countries. Historically, most of these data were delivered via fax or electronic data transfers in delimited text or SAS transport file format. Here, we present a new web portal that allows secure online delivery of laboratory results, reports, manuals, and training materials, and enables collaboration with investigational sites through alerts, announcements, and communications. By leveraging a three-tier architecture composed of preexisting data warehouses augmented with an application-specific relational database to store configuration data and materialized views for performance optimizations, a RESTful web application programming interface (API), and a browser-based single-page application for user access, the system offers greatly improved capabilities and user experience without requiring any changes to the underlying acquisition systems and data stores. Following a 3-month controlled rollout with 6,500 users at early-adopter sites, the Xcellerate Investigator Portal was deployed to all 240,000 of Covance’s Central Laboratory Services’ existing users, gaining widespread acceptance and pointing to significant benefits in productivity, convenience, and user experience.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Fasola, G., G. Aprile, V. Della Mea, M. Noselli, and F. Puglisi. "Development of a Web-based model to track patients’ self-reported symptoms related to anticancer treatment toxicities." Journal of Clinical Oncology 25, no. 18_suppl (June 20, 2007): 17021. http://dx.doi.org/10.1200/jco.2007.25.18_suppl.17021.

Повний текст джерела
Анотація:
17021 Background: Discrepancies outcropped when traditional modalities in collecting information regarding toxicities suffered by patients being exposed to anticancer treatments have been compared to direct self-reports. Owing to the availability of easily accessible informatics technologies, we hypothesized that a Web-site could be an accurate and reliable tool to directly record toxicity data. Methods: A database schema was designed, implemented with MySQL database management system and interfaced with the Web by using Java 2 Enterprise Edition on the Tomcat application container. A simplified, patient-adapted definition of type and NCI-CTCAE grade of the 15 commonest toxicities has been inserted into the database for reporting. The Web site has two areas, both accessible only with username and password, respectively devoted to patients and physicians. Through home Web access, each patient can report toxicities by choosing and grading any of them. Web site usability has been tested by 8 non-professional users with simulated scenarios. After a quick training, the users were asked to report the described toxicities. Time needed for reporting and reporting errors have been recorded. Results: The average time needed for entering a report has been 10 minutes. Users correctly reported the toxicities provided in the scenarios, but difficulties were noted in the correct identification of the week when entering reports for two or more weeks of therapy. Conclusions: In order to track patient-reported toxicities we developed a prototype Web-based model. Potential utilities of the system are being tested to demonstrate: 1) accuracy, allowing patients to easily report types and grades of the experienced toxicities; 2) flexibility, allowing patient-reporting either weekly or on demand; 3) capability to integrate and to assemble with an electronic patient record and a computerized physician order-entry. The latter capability will be provided by a patient portal with secure authentication and access being developed by the Regional Healthcare Authority. Comparative randomized analysis in 100 consecutive outpatients between clinical interviewing and Web-reported toxicity has been planned. No significant financial relationships to disclose.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Newcomb, William L., Amy E. Lincourt, Keith Gersin, Kent Kercher, David Iannitti, Tim Kuwada, Cynthia Lyons, et al. "Development of a Functional, Internet-Accessible Department of Surgery Outcomes Database." American Surgeon 74, no. 6 (June 2008): 548–54. http://dx.doi.org/10.1177/000313480807400615.

Повний текст джерела
Анотація:
The need for surgical outcomes data is increasing due to pressure from insurance companies, patients, and the need for surgeons to keep their own “report card”. Current data management systems are limited by inability to stratify outcomes based on patients, surgeons, and differences in surgical technique. Surgeons along with research and informatics personnel from an academic, hospital-based Department of Surgery and a state university's Department of Information Technology formed a partnership to develop a dynamic, internet-based, clinical data warehouse. A five-component model was used: data dictionary development, web application creation, participating center education and management, statistics applications, and data interpretation. A data dictionary was developed from a list of data elements to address needs of research, quality assurance, industry, and centers of excellence. A user-friendly web interface was developed with menu-driven check boxes, multiple electronic data entry points, direct downloads from hospital billing information, and web-based patient portals. Data were collected on a Health Insurance Portability and Accountability Act-compliant server with a secure firewall. Protected health information was de-identified. Data management strategies included automated auditing, on-site training, a trouble-shooting hotline, and Institutional Review Board oversight. Real-time, daily, monthly, and quarterly data reports were generated. Fifty-eight publications and 109 abstracts have been generated from the database during its development and implementation. Seven national academic departments now use the database to track patient outcomes. The development of a robust surgical outcomes database requires a combination of clinical, informatics, and research expertise. Benefits of surgeon involvement in outcomes research include: tracking individual performance, patient safety, surgical research, legal defense, and the ability to provide accurate information to patient and payers.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Sowah, Robert A., Dale E. Boahene, Dalton C. Owoh, Rexford Addo, Godfrey A. Mills, Wiafe Owusu-Banahene, Gifty Buah, and Baffour Sarkodie-Mensah. "Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework." Journal of Sensors 2020 (October 30, 2020): 1–22. http://dx.doi.org/10.1155/2020/8868602.

Повний текст джерела
Анотація:
There is rapid interest growing in the use of smart, connected devices. The developing world market for smart technology is evolving to adopt and adapt to the interconnected world of devices leading to the Internet of Things (IoT) everywhere. This research paper presents the design, development, and deployment of a prototype for the secure wireless home automation system with OpenHAB 2. We employed the use of two (2) high-performance microcontrollers, namely, the Arduino Mega 2560, interfaced with a 16-channel relay, and Raspberry Pi Model B, running the OpenHAB software. The Raspberry Pi functioned as the server to develop a prototype of an automated smart home that is remotely controllable from both a web application and an Android mobile app. In designing a wireless controlled switch for home appliances, two security procedures were implemented, namely, the token-based JSON Web Token (JWT) interface and Advanced Encryption Standard (AES) procedures for authentication and data encryption. Our system delivered a home automation system that leverages on the power of the latest version of OpenHAB to maximize productivity and overall home security while making it adaptable to the management of individual devices. When tested, both the developed hardware and software modules performed extremely well to meet the goal of a secured home automation system. Industry-standard penetration testing tools and frameworks, including Aircrack-ng, were utilized; wireless network audit began with a full sweep of the wireless frequencies with excellent results. It also ensures the efficient use of energy in the home as devices are intelligently controlled from both mobile and web applications. The results of the design and implementation of the additional layer for the security of the OpenHAB framework provide various theoretical and practical implications for home automation.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Al-Fadly, Ahmad. "Development and Implementation of E-Business Strategies Managed and Applied by Kuwait Airways." International Journal of Economics and Finance 8, no. 9 (August 24, 2016): 41. http://dx.doi.org/10.5539/ijef.v8n9p41.

Повний текст джерела
Анотація:
The chief objective of the current research is to offer significant novel perspectives into the creation and execution of e-business strategies managed and applied by Kuwait Airways, together with an evaluation of their suitability and ability to lead other airlines to secure a competitive advantage. The degree of achievement resulting from the application of e-business strategies for Kuwait Airways depends on the overall value added to its business operations and processes. The researcher adopted a case study of Kuwait Airways (KAC) and Jazeera Airways as a research method. This study shows that a good website can provide positive input for the fundamentals of a trade procedure and change compared to other related technologies, including the telephone, while the basis of the determined benefit is modified, with information becoming an essential asset and electronic commerce being a crucial enabler. This study reveals that the expansion of information through a web-site is related to both technology and policy. The Internet can be considered as a mode or a distribution channel to interact with clients; it is a crucial method to seeking new clients and maintaining associations with existing clients. Both the trade and the clients cannot afford to overlook the latest technology evolution. The current study showed that combining crucial functions including web technologies, marketing, and system solutions can help the KAC to attain competitive benefits.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Schinköthe, Timo, Mariano Rolando Gabri, Manfred Mitterer, Pedro Gouveia, Volker Heinemann, Nadia Harbeck, and Marion Subklewe. "A Web- and App-Based Connected Care Solution for COVID-19 In- and Outpatient Care: Qualitative Study and Application Development." JMIR Public Health and Surveillance 6, no. 2 (June 1, 2020): e19033. http://dx.doi.org/10.2196/19033.

Повний текст джерела
Анотація:
Background From the perspective of health care professionals, coronavirus disease (COVID-19) brings many challenges as well as opportunities for digital health care. One challenge is that health care professionals are at high risk of infection themselves. Therefore, in-person visits need to be reduced to an absolute minimum. Connected care solutions, including telehealth, remote patient monitoring, and secure communications between clinicians and their patients, may rapidly become the first choice in such public health emergencies. Objective The aim of the COVID-19 Caregiver Cockpit (C19CC) was to implement a free-of-charge, web- and app-based tool for patient assessment to assist health care professionals working in the COVID-19 environment. Methods Physicians in Argentina, Germany, Iran, Italy, Portugal, Switzerland, and the United States explained their challenges with COVID-19 patient care through unstructured interviews. Based on the collected feedback, the first version of the C19CC was built. In the second round of interviews, the application was presented to physicians, and more feedback was obtained. Results Physicians identified a number of different scenarios where telemedicine or connected care solutions could rapidly improve patient care. These scenarios included outpatient care, discharge management, remote tracking of patients with chronic diseases, as well as incorporating infected physicians under quarantine into telehealth services. Conclusions The C19CC is the result of an agile and iterative development process that complements the work of physicians. It aims to improve the care and safety of people who are infected by COVID-19.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Chard, Kyle, Eli Dart, Ian Foster, David Shifflett, Steven Tuecke, and Jason Williams. "The Modern Research Data Portal: a design pattern for networked, data-intensive science." PeerJ Computer Science 4 (January 15, 2018): e144. http://dx.doi.org/10.7717/peerj-cs.144.

Повний текст джерела
Анотація:
We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based data portal to achieve orders-of-magnitude increases in data transfer performance, support new deployment architectures that decouple control logic from data storage, and reduce development and operations costs. We introduce the design pattern; explain how it leverages high-performance data enclaves and cloud-based data management services; review representative examples at research laboratories and universities, including both experimental facilities and supercomputer sites; describe how to leverage Python APIs for authentication, authorization, data transfer, and data sharing; and use coding examples to demonstrate how these APIs can be used to implement a range of research data portal capabilities. Sample code at a companion web site, https://docs.globus.org/mrdp, provides application skeletons that readers can adapt to realize their own research data portals.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Rizal, Mohamad Rafi Raihan. "A BLOCKCHAIN-BASED ONLINE REVIEW SYSTEM OF TOURISM PRODUCTS USING ETHEREUM." Jurnal Techno Nusa Mandiri 18, no. 1 (March 15, 2021): 33–38. http://dx.doi.org/10.33480/techno.v18i1.2162.

Повний текст джерела
Анотація:
Rapid technological advances have made blockchain technology applicable not only to digital money, but in various fields. One of the areas that can be implemented by blockchain is digital tourism, specifically in the online review system of tourism products. The current online review system has several problems due to its centralized nature. The problem faced is the manipulation of review data which can be in the form of review deletion by a centralized party. This research proposes a decentralized online review system using the Ethereum blockchain technology, Smart Contracts, and IPFS to provide a secure, transparent, and trustworthy online review system platform. The purpose of this research is to implement a permission-less blockchain as a storage for reviews (review forms and log notes) and develop a web application as a user interface. The data used is data from travel sites which contain details about hotels and restaurants in Bukhara. The results displayed are the development of a web application that implements a permission-less blockchain using Ethereum and the system performance is displayed based on system testing, which comprised of unit testing and Black-Box testing.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Anggrawan, Anthony, Raisul Azhar, Bambang Krismono Triwijoyo, and Mayadi Mayadi. "Developing Application in Anticipating DDoS Attacks on Server Computer Machines." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 30, 2021): 427–34. http://dx.doi.org/10.30812/matrik.v20i2.410.

Повний текст джерела
Анотація:
The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Lockhart, Elizabeth, Eric Gutierrez, Padraig Richard Warde, Davin Dubeau, Sophie Huang, Harry Johnson, Saul Melamed, et al. "eOutcomes-H&N: Development of an electronic point-of-care outcomes collection system for head and neck cancer." Journal of Clinical Oncology 31, no. 31_suppl (November 1, 2013): 247. http://dx.doi.org/10.1200/jco.2013.31.31_suppl.247.

Повний текст джерела
Анотація:
247 Background: Outcomes data increases the ability to understand the impact of cancer treatment and helps ensure that we direct appropriate investments to achieve improvements in quality of care. Cancer Care Ontario (CCO) has developed an outcomes data collection system for patients with head and neck cancer treated with radiotherapy. Methods: Clinicians involved in the care of these patients agreed on 5 key clinical outcomes to collect as a part of this initiative: local failure, regional failure, distant metastasis, second primaries, and treatment toxicity. Based on the Princess Margaret Hospital Head and Neck Cancer Anthology of Outcomes process, CCO has developed a similar system to collect outcomes data at the point-of-care on a provincial scale. The population-based provincial system aims to provide practice efficiencies and allow for evolution of the system in response to user feedback and expansion to other clinical areas. Results: The system includes a secure web application and iPad mobile application to facilitate the collection and management of outcomes data for head and neck cancer patients treated with radiotherapy in Ontario. Cancer centres upload patient clinic schedule details (including patient identifiers and appointment dates) prior to clinics. A list of patient summaries, including corresponding diagnosis, radiotherapy information and previously recorded outcomes is then generated. In clinic, physicians use these lists to capture outcomes noted at the point-of-care. Data captured are then transferred in real time to a secure central database. Following initial testing, the application was piloted to assess usability, system reliability, and overall satisfaction. Initial results show high physician satisfaction and no documented issues with system availability. Feedback has identified potential improvements and will inform future modifications. Conclusions: The identification of potential variation in recurrence, toxicity and survival data will inform the areas in which quality improvement initiatives or additional investments may be needed. The intent is to leverage project learnings for future outcomes initiatives in other diseases and treatment modalities.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Fennick, Jacob R., J. Brandon Keith, Robert H. Leonard, Thanh N. Truong, and James P. Lewis. "A cyberenvironment for crystallography and materials science and an integrated user interface to the Crystallography Open Database and Predicted Crystallography Open Database." Journal of Applied Crystallography 41, no. 2 (March 8, 2008): 471–75. http://dx.doi.org/10.1107/s0021889808000381.

Повний текст джерела
Анотація:
With the advent and subsequent evolution of the Internet the ways in which computational crystallographic research is conducted have dramatically changed. Consequently, secure, robust and efficient means of accessing remote data and computational resources have become a necessity. At present scientists in computational crystallography access remote data and resourcesviaseparate technologies, namely SSH and Web services. Computational Science and Engineering Online (CSE-Online) combines these two methods into a single seamless environment while simultaneously addressing issues such as stability with regard to Internet interruption. Presently CSE-Online contains several applications which are useful to crystallographers; however, continued development of new tools is necessary. Toward this end a Java application capable of running in CSE-Online, namely the Crystallography Open Database User Interface (CODUI), has been developed, which allows users to search for crystal structures stored in the Crystallography Open Database and Predicted Crystallography Open Database, to export structural data for visualization, or to input structural data in other CSE-Online applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Murad, Abdulaziz, Natalie Hyde, Shanton Chang, Reeva Lederman, Rachelle Bosua, Marie Pirotta, Ralph Audehm, et al. "Quantifying Use of a Health Virtual Community of Practice for General Practitioners’ Continuing Professional Development: A Novel Methodology and Pilot Evaluation." Journal of Medical Internet Research 21, no. 11 (November 27, 2019): e14545. http://dx.doi.org/10.2196/14545.

Повний текст джерела
Анотація:
Background Health care practitioners (HPs), in particular general practitioners (GPs), are increasingly adopting Web-based social media platforms for continuing professional development (CPD). As GPs are restricted by time, distance, and demanding workloads, a health virtual community of practice (HVCoP) is an ideal solution to replace face-to-face CPD with Web-based CPD. However, barriers such as time and work schedules may limit participation in an HVCoP. Furthermore, it is difficult to gauge whether GPs engage actively or passively in HVCoP knowledge-acquisition for Web-based CPD, as GPs’ competencies are usually measured with pre- and posttests. Objective This study investigated a method for measuring the engagement features needed for an HVCoP (the Community Fracture Capture [CFC] Learning Hub) for learning and knowledge sharing among GPs for their CPD activity. Methods A prototype CFC Learning Hub was developed using an Igloo Web-based social media software platform and involved a convenience sample of GPs interested in bone health topics. This Hub, a secure Web-based community site, included 2 key components: an online discussion forum and a knowledge repository (the Knowledge Hub). The discussion forum contained anonymized case studies (contributed by GP participants) and topical discussions (topics that were not case studies). Using 2 complementary tools (Google Analytics and Igloo Statistical Tool), we characterized individual participating GPs’ engagement with the Hub. We measured the GP participants’ behavior by quantifying the number of online sessions of the participants, activities undertaken within these online sessions, written posts made per learning topic, and their time spent per topic. We calculated time spent in both active and passive engagement for each topic. Results Seven GPs participated in the CFC Learning Hub HVCoP from September to November 2017. The complementary tools successfully captured the GP participants’ engagement in the Hub. GPs were more active in topics in the discussion forum that had direct clinical application as opposed to didactic, evidence-based discussion topics (ie, topical discussions). From our knowledge hub, About Osteoporosis and Prevention were the most engaging topics, whereas shared decision making was the least active topic. Conclusions We showcased a novel complementary analysis method that allowed us to quantify the CFC Learning Hub’s usage data into (1) sessions, (2) activities, (3) active or passive time spent, and (4) posts made to evaluate the potential engagement features needed for an HVCoP focused on GP participants’ CPD process. Our design and evaluation methods for ongoing use and engagement in this Hub may be useful to evaluate future learning and knowledge-sharing projects for GPs and may allow for extension to other HPs’ environments. However, owing to the limited number of GP participants in this study, we suggest that further research with a larger cohort should be performed to validate and extend these findings.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Valenzuela, Waldo, Fabian Balsiger, Roland Wiest, and Olivier Scheidegger. "Medical-Blocks―A Platform for Exploration, Management, Analysis, and Sharing of Data in Biomedical Research: System Development and Integration Results." JMIR Formative Research 6, no. 4 (April 11, 2022): e32287. http://dx.doi.org/10.2196/32287.

Повний текст джерела
Анотація:
Background Biomedical research requires health care institutions to provide sensitive clinical data to leverage data science and artificial intelligence technologies. However, providing researchers access to health care data in a simple and secure manner proves to be challenging for health care institutions. Objective This study aims to introduce and describe Medical-Blocks, a platform for exploration, management, analysis, and sharing of data in biomedical research. Methods The specification requirements for Medical-Blocks included connection to data sources of health care institutions with an interface for data exploration, management of data in an internal file storage system, data analysis through visualization and classification of data, and data sharing via a file hosting service for collaboration. Medical-Blocks should be simple to use via a web-based user interface and extensible with new functionalities by a modular design via microservices (blocks). The scalability of the platform should be ensured through containerization. Security and legal regulations were considered during development. Results Medical-Blocks is a web application that runs in the cloud or as a local instance at a health care institution. Local instances of Medical-Blocks access data sources such as electronic health records and picture archiving and communication system at health care institutions. Researchers and clinicians can explore, manage, and analyze the available data through Medical-Blocks. Data analysis involves the classification of data for metadata extraction and the formation of cohorts. In collaborations, metadata (eg, the number of patients per cohort) or the data alone can be shared through Medical-Blocks locally or via a cloud instance with other researchers and clinicians. Conclusions Medical-Blocks facilitates biomedical research by providing a centralized platform to interact with medical data in collaborative research projects. Access to and management of medical data are simplified. Data can be swiftly analyzed to form cohorts for research and be shared among researchers. The modularity of Medical-Blocks makes the platform feasible for biomedical research where heterogeneous medical data are required.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Gu, Li Zhi. "Construction of ASP Platform Based on the Manufacture of Typical Components for the Engineering Machinery." Applied Mechanics and Materials 10-12 (December 2007): 89–93. http://dx.doi.org/10.4028/www.scientific.net/amm.10-12.89.

Повний текст джерела
Анотація:
Briefly reviewed the origin and presence of ASP, elicited the basic requirements of the construction of ASP platform on all-purpose and special needs for enterprises manufacturing the products of engineering machinery. The hierarchy of overall structure for ASP was presented with five layers: client’s layer, representation layer, professional logic layer, integration layer, and resource layer for different functions. Emphasis was focused on the data centers with the representation layer closer to the client’s terminals, the original IT resources stored in the local areas, and important data stored in the secure stations and backup and with standby data centers; on the manufacturing system based on CAD/CAPP/VM and other related techniques; and on the security system with access manipulations, secret keys, ID discriminations and audit tracking. The initial ASP platform has been set up for the medium and small sized enterprises, and was actuated with Rational Rose, UML adopted for the web system, and JavaScript employed for the events, databases, and development of the user’s terminals. Quanhigh Machinery Company was taken as an example in application with four kinds of typical components of engineering machinery.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Tekle, Kidane M., Sveinung Gundersen, Kjetil Klepper, Lars Ailo Bongo, Inge Alexander Raknes, Xiaxi Li, Wei Zhang, et al. "Norwegian e-Infrastructure for Life Sciences (NeLS)." F1000Research 7 (June 29, 2018): 968. http://dx.doi.org/10.12688/f1000research.15119.1.

Повний текст джерела
Анотація:
The Norwegian e-Infrastructure for Life Sciences (NeLS) has been developed by ELIXIR Norway to provide its users with a system enabling data storage, sharing, and analysis in a project-oriented fashion. The system is available through easy-to-use web interfaces, including the Galaxy workbench for data analysis and workflow execution. Users confident with a command-line interface and programming may also access it through Secure Shell (SSH) and application programming interfaces (APIs). NeLS has been in production since 2015, with training and support provided by the help desk of ELIXIR Norway. Through collaboration with NorSeq, the national consortium for high-throughput sequencing, an integrated service is offered so that sequencing data generated in a research project is provided to the involved researchers through NeLS. Sensitive data, such as individual genomic sequencing data, are handled using the TSD (Services for Sensitive Data) platform provided by Sigma2 and the University of Oslo. NeLS integrates national e-infrastructure storage and computing resources, and is also integrated with the SEEK platform in order to store large data files produced by experiments described in SEEK. In this article, we outline the architecture of NeLS and discuss possible directions for further development.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Amin, Amr, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy. "AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach." Information 10, no. 10 (October 22, 2019): 326. http://dx.doi.org/10.3390/info10100326.

Повний текст джерела
Анотація:
The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rush to release” as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy. The code is available through a GitHub repository for public contribution.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Nuryasin, Ilyas. "PENGEMBANGAN PROTOTIPE TOMBOL DARURAT PERUMAHAN BERBASIS WEBSITE." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 7, no. 2 (April 15, 2021): 213–18. http://dx.doi.org/10.33330/jurteksi.v7i2.918.

Повний текст джерела
Анотація:
Abstract: Environmental safety is a shared responsibility between the community and the officers who are specially authorized to secure an area. For this reason, the role of the community in informing actions that interfere with safety is important. This study aims to develop a prototype of an environmental safety system using an emergency button application to inform certain safety conditions. This research is developed by conducting a Research and Development model through requirement analysis, system design, implementation, and functional testing. This prototype offers a basic function of the security system at a residence, such as a button for hazard emergency, stranger alert, notification when out of town, and needing assistance. This prototype is connected to the account of each resident with the security officer at the post guard. This prototype has been tested and works well as expected. Keywords: emergency button; security; residence; Abstrak: Keamanan lingkungan merupakan tanggung jawab bersama antara masyarakat dan petugas yang diberi wewenang secara khusus menjaga keamanan sebuah wilayah. Untuk itu, peranan masyarakat dalam menginformasikan tindakan-tindakan yang mengganggu keselamatan menjadi penting. Penelitian ini bertujuan untuk mengembangkan prototipe sistem keamanan lingkungan menggunakan aplikasi tombol darurat bagi masyarakat untuk menginformasikan kondisi keamanan tertentu. Penelitian ini dikembangkan dengan pendekatan model Research and Development dengan melakukan analisis kebutuhan selanjutnya dirancang dan diimplementasikan dalam bentuk situs web yang selanjutnya diuji coba fungsionalitasnya. Fungsi yang ditawarkan dalam model ini meliputi tombol darurat bahaya, waspada orang asing, keluar kota dan bantuan. Sistem terhubung pada akun masing-masing warga dengan petugas keamanan di pos keamanan. Prototipe telah diuji fungsionalitasnya dan bekerja baik sesuai dengan fungsinya. Kata kunci: keamanan; perumahan; tombol darurat
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії