textra Inc.

Displaying 1-11 of 11 results

  • White Papers // Dec 2013

    A Decade of Domain Specific Modelling Languages for Model-Driven Security

    In model-driven development software system design is represented through models which are created using general purpose modeling languages e.g. UML. Later on system artefacts are automatically generated from these models. Model-driven security is a specialization of model-driven paradigm towards the domain of security, where security objectives are modeled along the...

    Provided By textra Inc.

  • White Papers // Aug 2013

    Insight into Security Challenges for Cloud Databases and Data Protection Techniques for Building Trust in Cloud Computing

    Data security has always remained a major issue in IT, but in cloud it is particularly of serious concern since data is scattered at different places all over the globe. The security concerns of users' needs to be rectified to make cloud environment trustworthy. In cloud computing, a trustworthy environment...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Application of Artifical Immune System for Detection of Misbehaviour Nodes in Mobile Ad Hoc Network

    The absence of a centralized management of a standardized infrastructure for mobile networks is important. Since this kind of networks are centrally managed and also dynamic topology and have limited power, thus providing a secure environment for MANET routing is very difficult. Artificial immune system is presented a paradigm relatively...

    Provided By textra Inc.

  • White Papers // Jul 2013

    An Overview of the Effects of Processing on Cloud Computing Dramatic Present and Provide New Security Solutions

    Cloud, virtual image of the environment that is not specified and the power and span because of computational processes and new technology to cloud computing is said to be it is not clear how resources and their spatial and temporal dimensions. This technology offers processing facilities, storage and acquisition, support...

    Provided By textra Inc.

  • White Papers // Jul 2013

    A Method for Cryptography in Networks on Chip

    Since today technology is moving toward smaller size, links in comparison to routers have amazing role in power dissipation and power consumption. This paper is to reduce power dissipation and power consumption in links also reducing noise by introducing a new technique for data encryption. This technique recommends reducing the...

    Provided By textra Inc.

  • White Papers // Jul 2013

    A New Service Providers Selection System for Cloud Networks

    In recent years, cloud computing growth has taken all the attention of various communities like researches, internet users, and government organizations. It reduced information technology overhead for the end-user, and total cost of ownership, and brought on greater flexibility, and on demand services. This paper, as a new kind of...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Cloud Computing, Security and Rules

    Cloud computing is the basic model integrating both software and hardware sources with least amount of management problems. New services called \"Cloud services\" have been published through this technology which in fact is provided by cloud providers for cloud users. In order to use it properly, before publishing such technology,...

    Provided By textra Inc.

  • White Papers // Jul 2013

    An Analysis of Cyber Attacks

    In this paper, issues related to software and its concepts are described. This project aims at familiarizing the readers with the concepts associated with cyber space (cyber) and the risks thereof. The concepts provided here are cyberspace, scale of cyber attacks, factors involved in cyber attacks, victims and measures to...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of nodes with high mobility that without any central management they are dynamic topology due to mobility of nodes, may cause the network topology change, thus creating a high reliability routing is one of the important aspects of these networks. Network load balancing...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Review of Some Machine Learning Algorithms for Spam Filtering

    Now-a-days spam emails are increasing dramatically and make problems to users. As the people know, spam not only damage users' profits, time consuming and band width, but also is has become as a risk to efficiency, reliability and security of network. In this paper, the authors try to study some...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Evaluation of Existing Protocols to Improve Information Exchange Security in the Smart Grid

    One of the main goals in smart electrical grids is optimize and enhance its capabilities through handling it. Of course, through sharing of information between the various components and network subsystems, the total system standardization is necessary. Because required to achieve to smart electrical grids, is potential of interaction and...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Evaluation of Existing Protocols to Improve Information Exchange Security in the Smart Grid

    One of the main goals in smart electrical grids is optimize and enhance its capabilities through handling it. Of course, through sharing of information between the various components and network subsystems, the total system standardization is necessary. Because required to achieve to smart electrical grids, is potential of interaction and...

    Provided By textra Inc.

  • White Papers // Dec 2013

    A Decade of Domain Specific Modelling Languages for Model-Driven Security

    In model-driven development software system design is represented through models which are created using general purpose modeling languages e.g. UML. Later on system artefacts are automatically generated from these models. Model-driven security is a specialization of model-driven paradigm towards the domain of security, where security objectives are modeled along the...

    Provided By textra Inc.

  • White Papers // Aug 2013

    Insight into Security Challenges for Cloud Databases and Data Protection Techniques for Building Trust in Cloud Computing

    Data security has always remained a major issue in IT, but in cloud it is particularly of serious concern since data is scattered at different places all over the globe. The security concerns of users' needs to be rectified to make cloud environment trustworthy. In cloud computing, a trustworthy environment...

    Provided By textra Inc.

  • White Papers // Jul 2013

    An Overview of the Effects of Processing on Cloud Computing Dramatic Present and Provide New Security Solutions

    Cloud, virtual image of the environment that is not specified and the power and span because of computational processes and new technology to cloud computing is said to be it is not clear how resources and their spatial and temporal dimensions. This technology offers processing facilities, storage and acquisition, support...

    Provided By textra Inc.

  • White Papers // Jul 2013

    A Method for Cryptography in Networks on Chip

    Since today technology is moving toward smaller size, links in comparison to routers have amazing role in power dissipation and power consumption. This paper is to reduce power dissipation and power consumption in links also reducing noise by introducing a new technique for data encryption. This technique recommends reducing the...

    Provided By textra Inc.

  • White Papers // Jul 2013

    A New Service Providers Selection System for Cloud Networks

    In recent years, cloud computing growth has taken all the attention of various communities like researches, internet users, and government organizations. It reduced information technology overhead for the end-user, and total cost of ownership, and brought on greater flexibility, and on demand services. This paper, as a new kind of...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Cloud Computing, Security and Rules

    Cloud computing is the basic model integrating both software and hardware sources with least amount of management problems. New services called \"Cloud services\" have been published through this technology which in fact is provided by cloud providers for cloud users. In order to use it properly, before publishing such technology,...

    Provided By textra Inc.

  • White Papers // Jul 2013

    An Analysis of Cyber Attacks

    In this paper, issues related to software and its concepts are described. This project aims at familiarizing the readers with the concepts associated with cyber space (cyber) and the risks thereof. The concepts provided here are cyberspace, scale of cyber attacks, factors involved in cyber attacks, victims and measures to...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of nodes with high mobility that without any central management they are dynamic topology due to mobility of nodes, may cause the network topology change, thus creating a high reliability routing is one of the important aspects of these networks. Network load balancing...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Review of Some Machine Learning Algorithms for Spam Filtering

    Now-a-days spam emails are increasing dramatically and make problems to users. As the people know, spam not only damage users' profits, time consuming and band width, but also is has become as a risk to efficiency, reliability and security of network. In this paper, the authors try to study some...

    Provided By textra Inc.

  • White Papers // Jul 2013

    Application of Artifical Immune System for Detection of Misbehaviour Nodes in Mobile Ad Hoc Network

    The absence of a centralized management of a standardized infrastructure for mobile networks is important. Since this kind of networks are centrally managed and also dynamic topology and have limited power, thus providing a secure environment for MANET routing is very difficult. Artificial immune system is presented a paradigm relatively...

    Provided By textra Inc.