University of Thai Chamber of Commerce

Displaying 1-10 of 10 results

  • White Papers // Aug 2013

    Trust Coercion in the Name of Usable Public Key Infrastructure

    The authors are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and commercial purposes. The success of these attacks has relied heavily on an innovative stratagem. This stratagem makes use of digital certificates to devise malicious code or servers as trustworthy, ultimately deceiving end...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jun 2013

    A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP

    Network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents. Nevertheless, the analysis of log files of large volume is usually both complex (slow) and privacy-neglecting. Especially, when it comes to VoIP, the literature on how audit...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jun 2013

    Security and Privacy in M-Learning and Beyond: Challenges and State-of-the-art

    Mobile learning is constantly evolving, following the shift of mobile technologies from laptops to handheld devices and smartphones. Indeed, the opportunities for innovation in this area are numerous and constantly under the focus of all the parties involved, ranging from traditional schools and universities to individual learners. However, mobile technology...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Apr 2013

    Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

    Cloud computing is without a doubt one of the most significant innovations presented in the global technological map. The number of potential users enrolling and using cloud services increases exponentially on a daily bases. The great demand from online users for cloud services along with the reduced operational costs that...

    Provided By University of Thai Chamber of Commerce

  • White Papers // May 2012

    Distributed NQoS Provision in Interactive DVB-T Systems

    This paper discusses a Distributed Network Quality of Service (NQoS) provision approach in decentralized interactive DVB-T systems (IDVB-T), enabling for scalable and fault tolerant operation. The paper describes the design and overall architecture of a regenerative IDVB-T infrastructure, where network resource allocation and service classification processes are performed at local...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Sep 2009

    Survey of Network Security Systems to Counter SIP-Based Denial-of-Service Attacks

    Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service (DoS) attacks launched against SIP servers. More than 20 different research works have been published to address SIP-related DoS...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jul 2009

    Exploring the Transformation of Tourism Firms' Operations and Business Models Through the Use of Web Map Services

    The production and consumption of tourism experiences demand the use of mapping services. Now-a-days, the ubiquitous and open standards of the Internet have given rise to distributed GIS and web map services, while Web 2.0 have further expanded the functionality of web map services. This paper aims to first analyze...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jun 2009

    Design of a 5-Joint Mechanical Arm With User-Friendly Control Program

    This paper describes the design concepts and implementation of a 5-Joint mechanical arm for a rescue robot named CEO Mission II. The multi-joint arm is a five degree of freedom mechanical arm with a four bar linkage, which can be stretched to 125 cm. long. It is controlled by a...

    Provided By University of Thai Chamber of Commerce

  • White Papers // May 2006

    Developing a Security Patterns Repository for Secure Applications Design

    Application developers are often confronted with difficulties in choosing or embedding security mechanisms that are necessary for building secure applications, since this demands possessing expertise in security issues. This paper can be circumvented by involving security experts early in the development process. This paper, however, entails high costs; moreover communication...

    Provided By University of Thai Chamber of Commerce

  • White Papers // May 2006

    A Framework for Exploiting Security Expertise in Application Development

    In this paper, the authors present a framework that enables application developers make use of security expertise. This is succeeded with the help of security ontologies and the employment of security patterns. Through the development of security ontology developers can locate the major security-related concepts and locate those relevant to...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jun 2009

    Design of a 5-Joint Mechanical Arm With User-Friendly Control Program

    This paper describes the design concepts and implementation of a 5-Joint mechanical arm for a rescue robot named CEO Mission II. The multi-joint arm is a five degree of freedom mechanical arm with a four bar linkage, which can be stretched to 125 cm. long. It is controlled by a...

    Provided By University of Thai Chamber of Commerce

  • White Papers // May 2012

    Distributed NQoS Provision in Interactive DVB-T Systems

    This paper discusses a Distributed Network Quality of Service (NQoS) provision approach in decentralized interactive DVB-T systems (IDVB-T), enabling for scalable and fault tolerant operation. The paper describes the design and overall architecture of a regenerative IDVB-T infrastructure, where network resource allocation and service classification processes are performed at local...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Apr 2013

    Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

    Cloud computing is without a doubt one of the most significant innovations presented in the global technological map. The number of potential users enrolling and using cloud services increases exponentially on a daily bases. The great demand from online users for cloud services along with the reduced operational costs that...

    Provided By University of Thai Chamber of Commerce

  • White Papers // May 2006

    Developing a Security Patterns Repository for Secure Applications Design

    Application developers are often confronted with difficulties in choosing or embedding security mechanisms that are necessary for building secure applications, since this demands possessing expertise in security issues. This paper can be circumvented by involving security experts early in the development process. This paper, however, entails high costs; moreover communication...

    Provided By University of Thai Chamber of Commerce

  • White Papers // May 2006

    A Framework for Exploiting Security Expertise in Application Development

    In this paper, the authors present a framework that enables application developers make use of security expertise. This is succeeded with the help of security ontologies and the employment of security patterns. Through the development of security ontology developers can locate the major security-related concepts and locate those relevant to...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jun 2013

    A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP

    Network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents. Nevertheless, the analysis of log files of large volume is usually both complex (slow) and privacy-neglecting. Especially, when it comes to VoIP, the literature on how audit...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jun 2013

    Security and Privacy in M-Learning and Beyond: Challenges and State-of-the-art

    Mobile learning is constantly evolving, following the shift of mobile technologies from laptops to handheld devices and smartphones. Indeed, the opportunities for innovation in this area are numerous and constantly under the focus of all the parties involved, ranging from traditional schools and universities to individual learners. However, mobile technology...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Aug 2013

    Trust Coercion in the Name of Usable Public Key Infrastructure

    The authors are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and commercial purposes. The success of these attacks has relied heavily on an innovative stratagem. This stratagem makes use of digital certificates to devise malicious code or servers as trustworthy, ultimately deceiving end...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Sep 2009

    Survey of Network Security Systems to Counter SIP-Based Denial-of-Service Attacks

    Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service (DoS) attacks launched against SIP servers. More than 20 different research works have been published to address SIP-related DoS...

    Provided By University of Thai Chamber of Commerce

  • White Papers // Jul 2009

    Exploring the Transformation of Tourism Firms' Operations and Business Models Through the Use of Web Map Services

    The production and consumption of tourism experiences demand the use of mapping services. Now-a-days, the ubiquitous and open standards of the Internet have given rise to distributed GIS and web map services, while Web 2.0 have further expanded the functionality of web map services. This paper aims to first analyze...

    Provided By University of Thai Chamber of Commerce