University of Tasmania

Displaying 1-32 of 32 results

  • White Papers // Aug 2013

    A Proposed RFID Wireless Body Sensor Mesh Network Using Intelligent Agents and Cloud-Based Architecture

    Every year, thousands of patients in Caribbean are admitted to hospitals and kept under medical observation. Patient monitoring is done manually and or by using Wireless Body Sensor Networks (WBSN), which is physically monitored by medical staff. In this paper, the authors propose a system for patient monitoring using Wireless...

    Provided By University of Tasmania

  • White Papers // May 2013

    Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations

    Cloud Computing is an emerging model of computing where users can leverage the computing infrastructure as a service stack or commodity. The security and privacy concerns of this infrastructure arising from the large co-location of tenants are, however, significant and pose considerable challenges in its widespread deployment. The current work...

    Provided By University of Tasmania

  • White Papers // May 2013

    Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems

    Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At...

    Provided By University of Tasmania

  • White Papers // May 2013

    Cloud Digital Investigations Based on a Virtual Machine Computer History Model

    In several traditional digital investigations, several forensic frameworks have been proposed. The selection of a suitable forensic framework for the cloud computing virtual environments further challenges the existing digital forensics space, as no conclusive generic framework exist that inclusively supports or can work for any Cloud Computing digital investigation. To...

    Provided By University of Tasmania

  • White Papers // May 2013

    Cloud Log Forensics Metadata Analysis

    The increase in the quantity and questionable quality of the forensic information retrieved from the current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses the question of what kind of information is desired from...

    Provided By University of Tasmania

  • White Papers // May 2013

    Enabling Security Uniformly Across Cloud Systems

    Compute cloud interoperability across heterogeneous distributed Virtual Machines (VM) is an emergent and challenging problem. Security administrators are currently unable to definitively audit cross platform transactions. In order to provide monitored cross platform support, this paper represents a first attempt to model security in cloud systems. A source theoretical policy...

    Provided By University of Tasmania

  • White Papers // May 2013

    Performance Evaluation of Spectral Efficiency in Linear Regime for High Rate WDM System

    In this paper, the authors address the effect of various system parameters on the spectral efficiency of Wavelength Division Multiplexing (WDM) systems. Three types of WDM systems were investigated: Unconstrained Modulation with Coherent Detection (UMCD) system, Constant Intensity Modulation with Coherent Detection (CIMCD) system, and Unconstrained Modulation with the Direct...

    Provided By University of Tasmania

  • White Papers // May 2013

    Query Dispatching Tool Supporting Fast Access to Data Warehouse

    Data warehousing hastens the process of retrieving information needed for decision making. The spider web diversity between both end-users and data marts increases traffic, load, and delay in accessing the requested information. In this paper, the authors have developed a query dispatching tool facilitating the access to the information within...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    A New Cloud Computing Framework Based on Mobile Agents for Web Services Discovery and Selection

    The increasing use of web services as well as the growing interest lent to cloud computing technology and its capacity of calculation, storage and cloud services, imposes today that the traditional mechanisms of discovery must be reexamined. This specificity of discovery over the cloud led the user to propose a...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Fuzzy Bio-Cryptography Key Generation

    Strength of cryptographic systems security depends mainly upon the security of the used key, which is leads to generate big key space that is result in forget them easily. One solution to this problem is by using bio-cryptography key generation. Bio-cryptography is the integration between cryptography and biometrics that can...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Proposal Design: Fingerprint Random Number Generators

    The essence of each technique and transfer of data security, such as encryption, digital signature and protocols is a Random Number Generator (RNG). In this paper, the authors offer the design of Fingerprint Random Number Generator (FPRNG) which produces non repeated, endless random number. The location of minute points on...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Performance Assessment of Mac Layer Protocols in Pollution Monitoring System Based on Underwater Wireless Sensor Networks

    When comparing terrestrial wireless sensor networks with underwater wireless sensor networks in terms of challenges, the authors find that the fundamental difference is the communication medium. Studies in this area indicated that acoustic communication is the typical physical layer technology for underwater networks compared with electromagnetic waves and optical waves....

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Anomaly Intrusion Detection System Using Random Forests and K-Nearest Neighbor

    This paper proposed a new approach to design the anomaly intrusion detection system using not only misuse but also anomaly intrusion detection for both training and detection of normal or attacks respectively. The utilized method is the combination of Machine Learning and pattern recognition method for Anomaly Intrusion Detection System...

    Provided By University of Tasmania

  • White Papers // Feb 2013

    Data Mining in Teacher Evaluation System Using WEKA

    Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential used in various commercial applications including retail sales, e-commerce, remote sensing, bioinformatics etc. Education is an essential element for the progress of country. Mining in educational environment is called Educational Data...

    Provided By University of Tasmania

  • White Papers // Jan 2013

    Joint Localization and Clock Synchronization for Wireless Sensor Networks

    A fully-asynchronous network with one target sensor and a few anchors (nodes with known locations) is considered. Localization and synchronization are traditionally treated as two separate problems. In this paper, localization and synchronization is studied under a unified framework. The authors present a new model in which time-stamps obtained either...

    Provided By University of Tasmania

  • White Papers // Dec 2012

    An Experimental Survey Towards Engaging Trustable Hypervisor Log Evidence Within a Cloud Forensic Environment

    In this paper, the author explores the technical as well as high level conceptual trust issues that arise in acquiring log forensic evidence from the Virtual Machine (VM) hosted operating systems within the data clouds. This specific survey work is done at the University of TECHnology [UTECH], Jamaica, which currently...

    Provided By University of Tasmania

  • White Papers // Dec 2012

    A Literature Survey on Security Challenges in VANETs

    This paper presented a literature survey on security challenges in Vehicle Ad-hoc NETworks (VANETs). Many researches on Mobile Ad-Hoc NETworks (MANETs) have been done where VANETs routing protocol has taken as a new protocol exist in the network. This protocol or system allows cars to talk to each other where...

    Provided By University of Tasmania

  • White Papers // Oct 2012

    Cloud Computing Adoption: A Comparative Study

    It is becoming increasingly evident that enterprise computing is in the process of transformation from the traditional on-premise model to a model characterized by the delivery of infrastructure and software services by external providers on a pay-per-use basis. Most of the evidence about cloud computing adoption originates from studies conducted...

    Provided By University of Tasmania

  • White Papers // Mar 2012

    Maximin Relay Beamforming in Multi-User Amplify-Forward Wireless Relay Networks

    This paper considers beamforming problem in relay-assisted multi-user communication and presents an efficient algorithm to solve Min-max optimization of information throughput under limited power resources. The authors use DC programming and penalty function method to handle the inherent non-convexity of the associated objective function and follow an iterative procedure to...

    Provided By University of Tasmania

  • White Papers // Sep 2011

    Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques Be Applied?

    The risks involved in Information Technology Outsourcing has since long been known to affect business decisions of whether to outsource or not. This has lead to numerous research on topics such as: understanding and managing outsourcing risks, methodologies to measure outsourcing risks, risk factors in information technology outsourcing, assessing the...

    Provided By University of Tasmania

  • White Papers // Sep 2011

    An Autonomic Open Marketplace for Inter-Cloud Service Management

    The rise of utility in cloud computing and telecommunications has introduced greater complexity in the provisioning and performance management of remote services. The authors propose extended management strategies for this complexity. Their overall aim is for the management to accept responsibility for the complex service in an open marketplace. Responsibility...

    Provided By University of Tasmania

  • White Papers // Aug 2011

    An Autonomic Open Marketplace for Service Management and Resilience

    Expansion in telecommunications services, such as triple play and unified communications, introduces complexity that adversely affects service and network provisioning, especially in terms of provisioning times and the risk of delivery (failure) of new services. The authors envision a marketplace in which all manner of complex services will be provisioned,...

    Provided By University of Tasmania

  • White Papers // May 2011

    Cloud Computing Adoption: What Are the Issues?

    Notwithstanding well-documented concerns such as data security and increased dependence on the service provider recent studies indicate that most large organizations in the USA are already using cloud computing services. There is also substantial evidence that the penetration of cloud computing varies depending on type of application, industry domain, type...

    Provided By University of Tasmania

  • White Papers // Aug 2010

    Evaluating Service Quality Dimensions Within e-Commerce SMEs

    With the continued growing investment in WWW technologies by e-Commerce businesses the measurement of Information Systems (IS) effectiveness in this business sector has become increasingly important over the last decade. As business users, especially in the SME sector, have become reliant on outsourced IS service providers for a wide range...

    Provided By University of Tasmania

  • White Papers // Jul 2010

    Blowing In The Wind Legitimacy Theory. An Environmental Incident And Disclosure

    Change in CSR in annual reports before and after a major environmental incident in 2006 is investigated. Content analysis adopting words was undertaken (2004 to 2008) of annual reports of the 'Incident' company and 30 other companies in that industry. The results indicate the quantity of disclosure increased over the...

    Provided By University of Tasmania

  • White Papers // Jul 2010

    A Local Government Study

    This paper explores the role of accountants in sustainability reporting from a local government perspective. A mail survey document was employed to collect data from 190 respondents, in particular, Chief Financial Officers (CFOs). Findings indicate that just over 50% of respondent local councils are using accountants in the sustainability reporting...

    Provided By University of Tasmania

  • White Papers // May 2010

    Impact of Cloud Computing: Beyond a Technology Trend

    Cloud Computing is being widely promoted as the next enterprise computing paradigm and a solution to most current enterprise IT problems. IT experts are making bold predictions about Cloud Computing and IT vendors are making major investments to implement infrastructure for delivery of Cloud Computing services, while IT users express...

    Provided By University of Tasmania

  • White Papers // Sep 2009

    Combating Wireless LAN MAC-Layer Address Spoofing With Fingerprinting Methods

    Unwanted use of wireless networks has become a well-known problem in recent years. One attempt to solve this problem is the use of access control lists, which are associated with accredited MAC addresses. But since MAC addresses can be spoofed very easily, improved mechanisms are needed to attest the uniqueness...

    Provided By University of Tasmania

  • White Papers // Jul 2009

    Vulnerabilities of VPN Using IPSec and Defensive Measures

    Data security plays a crucial role in modern times most business is transacted over the internet and even to wireless devices. This paper presents the vulnerabilities found in VPN using IPsec and suggested a set of Policy as a Defensive measure. Such policy suggested applies to implementations of VPN that...

    Provided By University of Tasmania

  • White Papers // May 2009

    SOA: Trends and Directions

    While many organizations have adopted SOA there are recent indications that not all organizations are willing to make substantial investments in new skills and technologies required for the transition to SOA in the current economic climate. The recent emergence of Cloud Computing is continuing the trend of delivering enterprise applications...

    Provided By University of Tasmania

  • White Papers // Feb 2009

    Privacy Management, The Law and Global Business Strategies: A Case for Privacy Driven Design

    This paper is based on the adage that 'Good privacy is good business'. Personal information holds significant value and web based businesses often seek to monetize that value. Unlocking personal information value in web based businesses, like social networks, can lead to disclosure of private and sensitive information, and subsequent...

    Provided By University of Tasmania

  • White Papers // Feb 2006

    Innovationroom - A Service for SMEs to Cope With Virtual Innovation Teams

    This paper is to increase understanding and knowledge in the field where innovation management practices and physical room facilities overlap in the strategic sense. The purpose is to develop pragmatic, unique and competent management practices for strategic innovation management and business development from the whole company's point of view. In...

    Provided By University of Tasmania

  • White Papers // Jan 2013

    Joint Localization and Clock Synchronization for Wireless Sensor Networks

    A fully-asynchronous network with one target sensor and a few anchors (nodes with known locations) is considered. Localization and synchronization are traditionally treated as two separate problems. In this paper, localization and synchronization is studied under a unified framework. The authors present a new model in which time-stamps obtained either...

    Provided By University of Tasmania

  • White Papers // Dec 2012

    An Experimental Survey Towards Engaging Trustable Hypervisor Log Evidence Within a Cloud Forensic Environment

    In this paper, the author explores the technical as well as high level conceptual trust issues that arise in acquiring log forensic evidence from the Virtual Machine (VM) hosted operating systems within the data clouds. This specific survey work is done at the University of TECHnology [UTECH], Jamaica, which currently...

    Provided By University of Tasmania

  • White Papers // Feb 2013

    Data Mining in Teacher Evaluation System Using WEKA

    Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential used in various commercial applications including retail sales, e-commerce, remote sensing, bioinformatics etc. Education is an essential element for the progress of country. Mining in educational environment is called Educational Data...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Performance Assessment of Mac Layer Protocols in Pollution Monitoring System Based on Underwater Wireless Sensor Networks

    When comparing terrestrial wireless sensor networks with underwater wireless sensor networks in terms of challenges, the authors find that the fundamental difference is the communication medium. Studies in this area indicated that acoustic communication is the typical physical layer technology for underwater networks compared with electromagnetic waves and optical waves....

    Provided By University of Tasmania

  • White Papers // Dec 2012

    A Literature Survey on Security Challenges in VANETs

    This paper presented a literature survey on security challenges in Vehicle Ad-hoc NETworks (VANETs). Many researches on Mobile Ad-Hoc NETworks (MANETs) have been done where VANETs routing protocol has taken as a new protocol exist in the network. This protocol or system allows cars to talk to each other where...

    Provided By University of Tasmania

  • White Papers // Feb 2009

    Privacy Management, The Law and Global Business Strategies: A Case for Privacy Driven Design

    This paper is based on the adage that 'Good privacy is good business'. Personal information holds significant value and web based businesses often seek to monetize that value. Unlocking personal information value in web based businesses, like social networks, can lead to disclosure of private and sensitive information, and subsequent...

    Provided By University of Tasmania

  • White Papers // Aug 2013

    A Proposed RFID Wireless Body Sensor Mesh Network Using Intelligent Agents and Cloud-Based Architecture

    Every year, thousands of patients in Caribbean are admitted to hospitals and kept under medical observation. Patient monitoring is done manually and or by using Wireless Body Sensor Networks (WBSN), which is physically monitored by medical staff. In this paper, the authors propose a system for patient monitoring using Wireless...

    Provided By University of Tasmania

  • White Papers // May 2013

    Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations

    Cloud Computing is an emerging model of computing where users can leverage the computing infrastructure as a service stack or commodity. The security and privacy concerns of this infrastructure arising from the large co-location of tenants are, however, significant and pose considerable challenges in its widespread deployment. The current work...

    Provided By University of Tasmania

  • White Papers // May 2013

    Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems

    Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At...

    Provided By University of Tasmania

  • White Papers // May 2013

    Cloud Digital Investigations Based on a Virtual Machine Computer History Model

    In several traditional digital investigations, several forensic frameworks have been proposed. The selection of a suitable forensic framework for the cloud computing virtual environments further challenges the existing digital forensics space, as no conclusive generic framework exist that inclusively supports or can work for any Cloud Computing digital investigation. To...

    Provided By University of Tasmania

  • White Papers // May 2013

    Cloud Log Forensics Metadata Analysis

    The increase in the quantity and questionable quality of the forensic information retrieved from the current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses the question of what kind of information is desired from...

    Provided By University of Tasmania

  • White Papers // May 2013

    Enabling Security Uniformly Across Cloud Systems

    Compute cloud interoperability across heterogeneous distributed Virtual Machines (VM) is an emergent and challenging problem. Security administrators are currently unable to definitively audit cross platform transactions. In order to provide monitored cross platform support, this paper represents a first attempt to model security in cloud systems. A source theoretical policy...

    Provided By University of Tasmania

  • White Papers // Sep 2011

    Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques Be Applied?

    The risks involved in Information Technology Outsourcing has since long been known to affect business decisions of whether to outsource or not. This has lead to numerous research on topics such as: understanding and managing outsourcing risks, methodologies to measure outsourcing risks, risk factors in information technology outsourcing, assessing the...

    Provided By University of Tasmania

  • White Papers // May 2013

    Query Dispatching Tool Supporting Fast Access to Data Warehouse

    Data warehousing hastens the process of retrieving information needed for decision making. The spider web diversity between both end-users and data marts increases traffic, load, and delay in accessing the requested information. In this paper, the authors have developed a query dispatching tool facilitating the access to the information within...

    Provided By University of Tasmania

  • White Papers // Sep 2009

    Combating Wireless LAN MAC-Layer Address Spoofing With Fingerprinting Methods

    Unwanted use of wireless networks has become a well-known problem in recent years. One attempt to solve this problem is the use of access control lists, which are associated with accredited MAC addresses. But since MAC addresses can be spoofed very easily, improved mechanisms are needed to attest the uniqueness...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    A New Cloud Computing Framework Based on Mobile Agents for Web Services Discovery and Selection

    The increasing use of web services as well as the growing interest lent to cloud computing technology and its capacity of calculation, storage and cloud services, imposes today that the traditional mechanisms of discovery must be reexamined. This specificity of discovery over the cloud led the user to propose a...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Fuzzy Bio-Cryptography Key Generation

    Strength of cryptographic systems security depends mainly upon the security of the used key, which is leads to generate big key space that is result in forget them easily. One solution to this problem is by using bio-cryptography key generation. Bio-cryptography is the integration between cryptography and biometrics that can...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Proposal Design: Fingerprint Random Number Generators

    The essence of each technique and transfer of data security, such as encryption, digital signature and protocols is a Random Number Generator (RNG). In this paper, the authors offer the design of Fingerprint Random Number Generator (FPRNG) which produces non repeated, endless random number. The location of minute points on...

    Provided By University of Tasmania

  • White Papers // Jul 2009

    Vulnerabilities of VPN Using IPSec and Defensive Measures

    Data security plays a crucial role in modern times most business is transacted over the internet and even to wireless devices. This paper presents the vulnerabilities found in VPN using IPsec and suggested a set of Policy as a Defensive measure. Such policy suggested applies to implementations of VPN that...

    Provided By University of Tasmania

  • White Papers // Jul 2010

    Blowing In The Wind Legitimacy Theory. An Environmental Incident And Disclosure

    Change in CSR in annual reports before and after a major environmental incident in 2006 is investigated. Content analysis adopting words was undertaken (2004 to 2008) of annual reports of the 'Incident' company and 30 other companies in that industry. The results indicate the quantity of disclosure increased over the...

    Provided By University of Tasmania

  • White Papers // Jul 2010

    A Local Government Study

    This paper explores the role of accountants in sustainability reporting from a local government perspective. A mail survey document was employed to collect data from 190 respondents, in particular, Chief Financial Officers (CFOs). Findings indicate that just over 50% of respondent local councils are using accountants in the sustainability reporting...

    Provided By University of Tasmania

  • White Papers // Mar 2012

    Maximin Relay Beamforming in Multi-User Amplify-Forward Wireless Relay Networks

    This paper considers beamforming problem in relay-assisted multi-user communication and presents an efficient algorithm to solve Min-max optimization of information throughput under limited power resources. The authors use DC programming and penalty function method to handle the inherent non-convexity of the associated objective function and follow an iterative procedure to...

    Provided By University of Tasmania

  • White Papers // Mar 2013

    Anomaly Intrusion Detection System Using Random Forests and K-Nearest Neighbor

    This paper proposed a new approach to design the anomaly intrusion detection system using not only misuse but also anomaly intrusion detection for both training and detection of normal or attacks respectively. The utilized method is the combination of Machine Learning and pattern recognition method for Anomaly Intrusion Detection System...

    Provided By University of Tasmania

  • White Papers // May 2013

    Performance Evaluation of Spectral Efficiency in Linear Regime for High Rate WDM System

    In this paper, the authors address the effect of various system parameters on the spectral efficiency of Wavelength Division Multiplexing (WDM) systems. Three types of WDM systems were investigated: Unconstrained Modulation with Coherent Detection (UMCD) system, Constant Intensity Modulation with Coherent Detection (CIMCD) system, and Unconstrained Modulation with the Direct...

    Provided By University of Tasmania

  • White Papers // Sep 2011

    An Autonomic Open Marketplace for Inter-Cloud Service Management

    The rise of utility in cloud computing and telecommunications has introduced greater complexity in the provisioning and performance management of remote services. The authors propose extended management strategies for this complexity. Their overall aim is for the management to accept responsibility for the complex service in an open marketplace. Responsibility...

    Provided By University of Tasmania

  • White Papers // Aug 2011

    An Autonomic Open Marketplace for Service Management and Resilience

    Expansion in telecommunications services, such as triple play and unified communications, introduces complexity that adversely affects service and network provisioning, especially in terms of provisioning times and the risk of delivery (failure) of new services. The authors envision a marketplace in which all manner of complex services will be provisioned,...

    Provided By University of Tasmania

  • White Papers // Feb 2006

    Innovationroom - A Service for SMEs to Cope With Virtual Innovation Teams

    This paper is to increase understanding and knowledge in the field where innovation management practices and physical room facilities overlap in the strategic sense. The purpose is to develop pragmatic, unique and competent management practices for strategic innovation management and business development from the whole company's point of view. In...

    Provided By University of Tasmania

  • White Papers // May 2010

    Impact of Cloud Computing: Beyond a Technology Trend

    Cloud Computing is being widely promoted as the next enterprise computing paradigm and a solution to most current enterprise IT problems. IT experts are making bold predictions about Cloud Computing and IT vendors are making major investments to implement infrastructure for delivery of Cloud Computing services, while IT users express...

    Provided By University of Tasmania

  • White Papers // May 2009

    SOA: Trends and Directions

    While many organizations have adopted SOA there are recent indications that not all organizations are willing to make substantial investments in new skills and technologies required for the transition to SOA in the current economic climate. The recent emergence of Cloud Computing is continuing the trend of delivering enterprise applications...

    Provided By University of Tasmania

  • White Papers // Oct 2012

    Cloud Computing Adoption: A Comparative Study

    It is becoming increasingly evident that enterprise computing is in the process of transformation from the traditional on-premise model to a model characterized by the delivery of infrastructure and software services by external providers on a pay-per-use basis. Most of the evidence about cloud computing adoption originates from studies conducted...

    Provided By University of Tasmania

  • White Papers // Aug 2010

    Evaluating Service Quality Dimensions Within e-Commerce SMEs

    With the continued growing investment in WWW technologies by e-Commerce businesses the measurement of Information Systems (IS) effectiveness in this business sector has become increasingly important over the last decade. As business users, especially in the SME sector, have become reliant on outsourced IS service providers for a wide range...

    Provided By University of Tasmania

  • White Papers // May 2011

    Cloud Computing Adoption: What Are the Issues?

    Notwithstanding well-documented concerns such as data security and increased dependence on the service provider recent studies indicate that most large organizations in the USA are already using cloud computing services. There is also substantial evidence that the penetration of cloud computing varies depending on type of application, industry domain, type...

    Provided By University of Tasmania