International MultiConference of Engineers and Computer Scientists

Displaying 1-7 of 7 results

  • White Papers // Mar 2013

    The Design of SQL Injection Analysis System Based on Honeynet

    Honeynet includes one or more honeypots with multilayer data control and data capture mechanism, which is a kind of network structure. Honeynet technology is a kind of research-based, high interaction honeypot technology which helps researchers analyzes attack data deeply. Along with the development of Browser/Server Application Development, SQL injection attacks...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    Risk Assessment for Relational Database Schema-Based Constraint Using State Machine Diagram

    Information is a critical asset of an organization. This is why reducing the chance of data loss must be a primary concern. This research focuses on the risk assessment issue in physical level of data implementation, which includes identifying risk factors and assigning a hazard level. This paper will investigate...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    Towards a Unifying Multilateral Cloud Negotiation Strategy

    In a cloud business model, consumers pay cloud providers for consumption of computing capabilities and the allocation of resources often requires consumers and providers to establish service contracts through negotiation. This paper reports the preliminary findings in devising a unifying strategy for supporting price negotiation among multiple consumers and multiple...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    The Load Balancing of Database Allocation in the Cloud

    Each database host in the cloud platform often has to service more than one database application system. However, under the resource limitations of the host, evenly distributed databases into each host is an important issue needed to be addressed. The database sizes and the number of databases must be taken...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Apr 2009

    Security Testing and Compliance for Online Banking in Real-World

    There is a continuously growing number of customers who use online banking because of its convenience. It considers two current online banking problems. First, it observes a lack of attention and research focusing on security issues relevant to the clients' side of online banking systems. Second, there are many security...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2009

    Securing BGP Networks Using Consistent Check Algorithm

    The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure. However, there is no security concern in the original design of BGP, which suffers from various kinds of threats for attacks. To secure the BGP operation, this paper proposes an algorithm called consistent check. The algorithm...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2009

    Financial Stock Market Forecast using Data Mining Techniques

    The automated computer programs using data mining and predictive technologies do a fare amount of trades in the markets. Data mining is well founded on the theory that the historic data holds the essential memory for predicting the future direction. This technology is designed to help investors discover hidden patterns...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Apr 2009

    Security Testing and Compliance for Online Banking in Real-World

    There is a continuously growing number of customers who use online banking because of its convenience. It considers two current online banking problems. First, it observes a lack of attention and research focusing on security issues relevant to the clients' side of online banking systems. Second, there are many security...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2009

    Securing BGP Networks Using Consistent Check Algorithm

    The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure. However, there is no security concern in the original design of BGP, which suffers from various kinds of threats for attacks. To secure the BGP operation, this paper proposes an algorithm called consistent check. The algorithm...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2009

    Financial Stock Market Forecast using Data Mining Techniques

    The automated computer programs using data mining and predictive technologies do a fare amount of trades in the markets. Data mining is well founded on the theory that the historic data holds the essential memory for predicting the future direction. This technology is designed to help investors discover hidden patterns...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    The Design of SQL Injection Analysis System Based on Honeynet

    Honeynet includes one or more honeypots with multilayer data control and data capture mechanism, which is a kind of network structure. Honeynet technology is a kind of research-based, high interaction honeypot technology which helps researchers analyzes attack data deeply. Along with the development of Browser/Server Application Development, SQL injection attacks...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    Risk Assessment for Relational Database Schema-Based Constraint Using State Machine Diagram

    Information is a critical asset of an organization. This is why reducing the chance of data loss must be a primary concern. This research focuses on the risk assessment issue in physical level of data implementation, which includes identifying risk factors and assigning a hazard level. This paper will investigate...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    Towards a Unifying Multilateral Cloud Negotiation Strategy

    In a cloud business model, consumers pay cloud providers for consumption of computing capabilities and the allocation of resources often requires consumers and providers to establish service contracts through negotiation. This paper reports the preliminary findings in devising a unifying strategy for supporting price negotiation among multiple consumers and multiple...

    Provided By International MultiConference of Engineers and Computer Scientists

  • White Papers // Mar 2013

    The Load Balancing of Database Allocation in the Cloud

    Each database host in the cloud platform often has to service more than one database application system. However, under the resource limitations of the host, evenly distributed databases into each host is an important issue needed to be addressed. The database sizes and the number of databases must be taken...

    Provided By International MultiConference of Engineers and Computer Scientists