University of York Students' Union

Displaying 1-35 of 35 results

  • White Papers // Sep 2013

    Stability of Software Defect Prediction in Relation to Levels of Data Imbalance

    Software defect prediction is an important decision support activity in software quality assurance. Its goal is reducing verification costs by predicting the system modules that are more likely to contain defects, thus enabling more efficient allocation of resources in verification process. The problem is that there is no widely applicable...

    Provided By University of York Students' Union

  • White Papers // May 2013

    Security Analysis of Croatia's Receipt Registration and Verification System

    In this paper, the authors presented initial analysis of a fiscal system introduced by Republic of Croatia's Tax Administration. It is only a partial analysis, based on publicly available information, which doesn't include testing's on live systems due to being illegal by the new Criminal law in Croatia. Also, they...

    Provided By University of York Students' Union

  • White Papers // Feb 2013

    Criteria for Evaluation of Open Source Cloud Computing Solutions

    Cloud computing promises on-demand scalability and flexibility for the enterprise environment and open source products have a large presence in this area. The authors have devised an elaborate set of criteria for evaluation and comparison of open source IaaS cloud computing solutions which can be used for ranking and choosing...

    Provided By University of York Students' Union

  • White Papers // Feb 2013

    Multimedia Stimuli Databases Usage Patterns: a Survey Report

    Multimedia documents such as images, sounds or videos can be used to elicit emotional responses in exposed human subjects. These stimuli are stored in affective multimedia databases and successfully used for a wide variety of research in affective computing, human-computer interaction and cognitive sciences. Affective multimedia databases are simple repositories...

    Provided By University of York Students' Union

  • White Papers // Nov 2012

    Regulatory Aspects of Cloud Computing

    The paper deals with regulatory issues related to cloud computing that include interrelationships with broadband connectivity, data protection and privacy, quality of cloud services and competitive market development. Cloud computing architecture and service models are presented on the base of the National Institute of Standards and Technology and International Telecommunication...

    Provided By University of York Students' Union

  • White Papers // Oct 2012

    Security Agility Solution Independent of the Underlaying Protocol Architecture

    Cryptographic protocols are constantly exposed to new at-tack methods. When some cryptographic protocol gets exposed there is a need to replace it. This is hard because most cryptographic protocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used. In that way old and vulnerable...

    Provided By University of York Students' Union

  • White Papers // Sep 2012

    Useful Patterns for BPEL Developers

    Modern enterprises use service-oriented architecture to accommodate business agility. One of the most important SOA standards is BPEL, because it provides a means to specify business processes and their interaction. In this paper, the authors examine patterns that are related to BPEL or can be implemented in BPEL. The most...

    Provided By University of York Students' Union

  • White Papers // Sep 2012

    A Mechanism for Gray Hole Attack Detection in Mobile Ad-hoc Networks

    The mobile ad-hoc networks are vulnerable to Denial of Service (DoS) attacks. MANET has features like self organizing, working as router as well as host having dynamic topology. In MANET, nodes have limited resources like bandwidth, battery power and storage capacity. Gray hole attack is a kind of Denial of...

    Provided By University of York Students' Union

  • White Papers // Aug 2012

    Making Businesses Work Smarter with Mobile Business Intelligence

    Through the course of this paper, the authors outline how mobile Business Intelligence (m-BI) can help businesses to work smarter and to improve their agility. When they analyze the industry from the usage perspective or how interaction with the enterprise BI system happens via mobile devices, they may easily understand...

    Provided By University of York Students' Union

  • White Papers // Jun 2012

    Strategic Success Factors in ERP System Implementation

    Different ways of approaching ERP implementation give different results. In order to successfully implement an ERP system it is necessary to properly balance critical success factors. By researching what the critical success factors in ERP implementation are, why they are critical, and to what extent they are relevant to users,...

    Provided By University of York Students' Union

  • White Papers // May 2012

    Implementing Certificate-based Authentication Protocol on Smart Cards

    In this paper, the authors describe challenges faced when building a practical implementation of a smart card authentication protocol. The protocol to be implemented was designed with intention of restricting access to maintenance functions implemented in majority of Point-Of-Sale (POS) terminals. POS terminals have complex software platform that must be...

    Provided By University of York Students' Union

  • White Papers // Feb 2012

    Towards Semantic and Affective Coupling in Emotionally Annotated Databases

    Emotionally annotated databases are repositories of multimedia documents with annotated affective content that elicit emotional responses in exposed human subjects. They are primarily used in research of human emotions, attention and development of stress-related mental disorders. This can be successfully exploited in larger processes like selection, evaluation and training of...

    Provided By University of York Students' Union

  • White Papers // Dec 2011

    Transition Between Process Models (BPMN) and Service Models (WS-BPEL and Other Standards): A Systematic Review

    BPMN and BPEL have become de facto standards for modeling of business processes and implementation of business processes via Web services. There is a quintessential problem of discrepancy between these two approaches as they are applied in different phases of lifecycle and their fundamental concepts are different - BPMN is...

    Provided By University of York Students' Union

  • White Papers // Sep 2011

    Security Threats for Mobile Platforms

    The proliferation of smart-phone devices, with ever advancing technological features, has brought the issue of mobile device security back into focus. Mobile devices are rapidly becoming attractive targets for malicious attacks due to significant advances in both hardware and operating systems. The modern mobile platforms, like Android, iOS and Symbian,...

    Provided By University of York Students' Union

  • White Papers // Aug 2011

    A Classification Framework for Web Browser Cross-Context Communication

    Demand for more advanced Web applications is the driving force behind Web browser evolution. Recent requirements for Rich Internet Applications, such as mashing-up data and background processing, are emphasizing the need for building and executing Web applications as a coordination of browser execution contexts. Since development of such Web applications...

    Provided By University of York Students' Union

  • White Papers // May 2011

    ARM Architecture and Multimedia Applications

    The ARM processor is a key component of many embedded systems. First ARM prototype was introduced in 1985. Under the name of Acorn RISC Machine. An overview of ARM processor architecture evolution with emphasis to specific instruction sets capable of executing the demanding high speed real-time multimedia applications is provided....

    Provided By University of York Students' Union

  • White Papers // Mar 2011

    Research Challenges for Cloud Computing Economics

    Cloud Computing is a new paradigm of computing infrastructure provision which promises to achieve a vision of computer utilities. The most active research topic in Cloud Computing is its economic aspect. In this paper, the authors give overview of existing literature on Cloud Computing economics (pricing of Cloud services, costs,...

    Provided By University of York Students' Union

  • White Papers // Jan 2011

    Reaching Inter-Institutional Business Processes in e-Society

    Each business enterprise strives to achieve the most efficient organization of its operations. While business enterprises can influence internal factors of organization, external factors are more rigid. Public organizations have less of an incentive to be efficient. Furthermore, their organization is less favorable since the decision making is centralized and...

    Provided By University of York Students' Union

  • White Papers // Dec 2010

    Information Retrieval and Information Extraction in Web 2.0 Environment

    With the rise of Web 2.0 paradigm new trends in Information Retrieval (IR) and Information Extraction (IE) can be observed. Significance of IR and IE as fundamental method of acquiring new and up-to-date information is crucial for efficient decision making. Social aspects of modern information retrieval are gaining on its...

    Provided By University of York Students' Union

  • White Papers // Oct 2010

    Security and Privacy Related Online Behavior of Experienced ICT Users

    The increase in the number and variety of potential security and privacy threats puts emphasis on the behaviors of Internet users regarding their use of computer systems and the Internet. The assumptions and habits of Internet users have a great influence on the level of their online privacy and security....

    Provided By University of York Students' Union

  • White Papers // Jun 2010

    Survey of Simulation Capabilities of the IBM WebSphere Business Modeler Business Process Modeling Tool on the Example of Processing a Loan Application

    Business process modeling tools that support simulation are a powerful means of improving business processes. With a view to avoid the risk of failure and unnecessary costs, current state process models are developed as an alternative to conducting real-world business process modification. Further attempts are made at improving those models....

    Provided By University of York Students' Union

  • White Papers // Jun 2010

    Mapping of Core Components Based e-Business Standards into Ontology

    A mapping of Core Components specification based e-business standards to ontology is presented. The Web Ontology Language (OWL) is used for ontology development. In order to preserve the existing hierarchy of the standards, an emphasis is put on the mapping of Core Components elements to specific constructs in OWL. The...

    Provided By University of York Students' Union

  • White Papers // May 2010

    Analysis of Dynamic Changes and Iterations in the Development Process of an Electrically Powered Go-Kart

    Today's companies are facing numerous challenges. For decades, the importance of factors as time, costs, competition and quality for the innovation process has been emphasized. With relatively new aspects like higher frequencies of emerging new technologies, increased interdisciplinary work or new and changing markets and competitors, pressure on companies is...

    Provided By University of York Students' Union

  • White Papers // Mar 2010

    Evaluation of Embedded Processor Based BDD Implementation

    Different strategies for implementation of computationally intensive applications in hardware are available today. The spectrum of implementations ranges from usage of standardized microprocessors to specially tailored hardware solutions. Available processor architectures range from general purpose type through processors with instruction set extensions to application-specific processors. On the other side, recent...

    Provided By University of York Students' Union

  • White Papers // Feb 2010

    Component-Based Specification for Multi-Processor System-on-Chip Design

    In this paper, the authors present a component-based design approach in modeling Multi-Processor Systems-on-Chip (MPSoC). As a component-based specification, SaveComp Component Model (SaveCCM) component technology was employed. In contrast to widely used component-based technologies, SaveCCM is light-weighted, HW/SW platform-independent and considers specific non-functional constraints inherent in heterogeneous MPSoC domain, e.g....

    Provided By University of York Students' Union

  • White Papers // Oct 2009

    Improving the ETL Process and Maintenance of Higher Education Information System Data Warehouse

    HEIS (Higher Education Information System) is a project funded by the Croatian Ministry of Science, Education and Sports started in the year 2001. HEIS is a comprehensive information system that provides support for education related processes taking place within a higher education institution. As a part of the project, a...

    Provided By University of York Students' Union

  • White Papers // Jul 2009

    Recent Advances in Data Management

    To increase the value of data as a business asset, companies and government organizations need to establish standards, policies, and processes for the usage, development, and management of data, to create the right organizational structure, and to develop the supporting technology infrastructure. As a practice with roots in corporate and...

    Provided By University of York Students' Union

  • White Papers // Apr 2009

    Design of a System-Level Pipelined JPEG Coder for a Homogeneous Multiprocessor Platform Using Replication

    In this paper, the authors present a case study on using replication for breaking system-level pipeline bottlenecks in Multi-Processor Systems-on-Chip (MPSoC). Using this approach, they have designed a JPEG coder application on a homogenous multiprocessor platform and have achieved 4.78

    Provided By University of York Students' Union

  • White Papers // Jun 2008

    IT and Business Process Performance Management: Case Study of ITIL Implementation in Finance Service Industry

    Although Information Technology (IT) is taking significant role in businesses with its innovating and supporting potential, it seems that it is least understood company asset. Successful organizations manage IT function in much the same way that they manage their other strategic functions and processes. This in particular means that they...

    Provided By University of York Students' Union

  • White Papers // Jun 2008

    Fuzzy Active Rules in Mutimodal Biometric Systems

    In this paper, the authors present the idea how to use fuzzy active rules within biometric systems. They have already shown how the concept of complex events presented in the active database theory could be used in order to build a biometric system. They especially explored the paradigm of active...

    Provided By University of York Students' Union

  • White Papers // Mar 2008

    Discovering Tacit Knowledge in Business Decision Making

    In dynamic and globalized business environment the only certain source of lasting competitive advantage of companies is knowledge. By maintaining and acquiring relevant knowledge through the use of knowledge management systems businesses are sustaining their competitive advantage over other players in the market. In this paper, one of the most...

    Provided By University of York Students' Union

  • White Papers // Oct 2007

    A Multimodal Biometric System Implemented within an Active Database Management System

    Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In some situations it is enough that user knows e.g. password, in other situations it is enough that user posses e.g. a...

    Provided By University of York Students' Union

  • White Papers // Jun 2007

    An Agent Based System for Business-driven Service Provisioning

    In the 3G mobile networks, utilization of multimedia applications on mobile/wireless devices allows users to be present and communicate with other users, anywhere and anytime. Novel service provisioning models are taking into account user's behavior, terminal equipment capabilities and the content providers. Thus, service charging schemes must be adapted to...

    Provided By University of York Students' Union

  • White Papers // May 2007

    The Evaluation Criteria of Workflow Metamodels

    This paper defines the evaluation framework of workflow metamodels, based on a list of evaluation criteria. The presented evaluation criteria combine domain specific evaluation approach and some of the existing quality metrics, defined in the field of software. Well established evaluation criteria of workflow metamodels should enable their comparison, selection...

    Provided By University of York Students' Union

  • White Papers // May 2007

    The Impact of Business Process Orientation on Organizational Performance

    The extensive literature on business process management suggests that organizations can enhance their overall performance by adopting a process view of business. It has been shown in previous studies that the companies which have reached higher business process maturity level consistently outperform those that have not reached them. The paper...

    Provided By University of York Students' Union

  • White Papers // Sep 2012

    A Mechanism for Gray Hole Attack Detection in Mobile Ad-hoc Networks

    The mobile ad-hoc networks are vulnerable to Denial of Service (DoS) attacks. MANET has features like self organizing, working as router as well as host having dynamic topology. In MANET, nodes have limited resources like bandwidth, battery power and storage capacity. Gray hole attack is a kind of Denial of...

    Provided By University of York Students' Union

  • White Papers // Dec 2010

    Information Retrieval and Information Extraction in Web 2.0 Environment

    With the rise of Web 2.0 paradigm new trends in Information Retrieval (IR) and Information Extraction (IE) can be observed. Significance of IR and IE as fundamental method of acquiring new and up-to-date information is crucial for efficient decision making. Social aspects of modern information retrieval are gaining on its...

    Provided By University of York Students' Union

  • White Papers // Feb 2013

    Multimedia Stimuli Databases Usage Patterns: a Survey Report

    Multimedia documents such as images, sounds or videos can be used to elicit emotional responses in exposed human subjects. These stimuli are stored in affective multimedia databases and successfully used for a wide variety of research in affective computing, human-computer interaction and cognitive sciences. Affective multimedia databases are simple repositories...

    Provided By University of York Students' Union

  • White Papers // Aug 2011

    A Classification Framework for Web Browser Cross-Context Communication

    Demand for more advanced Web applications is the driving force behind Web browser evolution. Recent requirements for Rich Internet Applications, such as mashing-up data and background processing, are emphasizing the need for building and executing Web applications as a coordination of browser execution contexts. Since development of such Web applications...

    Provided By University of York Students' Union

  • White Papers // Mar 2011

    Research Challenges for Cloud Computing Economics

    Cloud Computing is a new paradigm of computing infrastructure provision which promises to achieve a vision of computer utilities. The most active research topic in Cloud Computing is its economic aspect. In this paper, the authors give overview of existing literature on Cloud Computing economics (pricing of Cloud services, costs,...

    Provided By University of York Students' Union

  • White Papers // Aug 2012

    Making Businesses Work Smarter with Mobile Business Intelligence

    Through the course of this paper, the authors outline how mobile Business Intelligence (m-BI) can help businesses to work smarter and to improve their agility. When they analyze the industry from the usage perspective or how interaction with the enterprise BI system happens via mobile devices, they may easily understand...

    Provided By University of York Students' Union

  • White Papers // Feb 2013

    Criteria for Evaluation of Open Source Cloud Computing Solutions

    Cloud computing promises on-demand scalability and flexibility for the enterprise environment and open source products have a large presence in this area. The authors have devised an elaborate set of criteria for evaluation and comparison of open source IaaS cloud computing solutions which can be used for ranking and choosing...

    Provided By University of York Students' Union

  • White Papers // Nov 2012

    Regulatory Aspects of Cloud Computing

    The paper deals with regulatory issues related to cloud computing that include interrelationships with broadband connectivity, data protection and privacy, quality of cloud services and competitive market development. Cloud computing architecture and service models are presented on the base of the National Institute of Standards and Technology and International Telecommunication...

    Provided By University of York Students' Union

  • White Papers // May 2010

    Analysis of Dynamic Changes and Iterations in the Development Process of an Electrically Powered Go-Kart

    Today's companies are facing numerous challenges. For decades, the importance of factors as time, costs, competition and quality for the innovation process has been emphasized. With relatively new aspects like higher frequencies of emerging new technologies, increased interdisciplinary work or new and changing markets and competitors, pressure on companies is...

    Provided By University of York Students' Union

  • White Papers // May 2007

    The Evaluation Criteria of Workflow Metamodels

    This paper defines the evaluation framework of workflow metamodels, based on a list of evaluation criteria. The presented evaluation criteria combine domain specific evaluation approach and some of the existing quality metrics, defined in the field of software. Well established evaluation criteria of workflow metamodels should enable their comparison, selection...

    Provided By University of York Students' Union

  • White Papers // Jun 2008

    IT and Business Process Performance Management: Case Study of ITIL Implementation in Finance Service Industry

    Although Information Technology (IT) is taking significant role in businesses with its innovating and supporting potential, it seems that it is least understood company asset. Successful organizations manage IT function in much the same way that they manage their other strategic functions and processes. This in particular means that they...

    Provided By University of York Students' Union

  • White Papers // Jun 2010

    Survey of Simulation Capabilities of the IBM WebSphere Business Modeler Business Process Modeling Tool on the Example of Processing a Loan Application

    Business process modeling tools that support simulation are a powerful means of improving business processes. With a view to avoid the risk of failure and unnecessary costs, current state process models are developed as an alternative to conducting real-world business process modification. Further attempts are made at improving those models....

    Provided By University of York Students' Union

  • White Papers // Jan 2011

    Reaching Inter-Institutional Business Processes in e-Society

    Each business enterprise strives to achieve the most efficient organization of its operations. While business enterprises can influence internal factors of organization, external factors are more rigid. Public organizations have less of an incentive to be efficient. Furthermore, their organization is less favorable since the decision making is centralized and...

    Provided By University of York Students' Union

  • White Papers // Dec 2011

    Transition Between Process Models (BPMN) and Service Models (WS-BPEL and Other Standards): A Systematic Review

    BPMN and BPEL have become de facto standards for modeling of business processes and implementation of business processes via Web services. There is a quintessential problem of discrepancy between these two approaches as they are applied in different phases of lifecycle and their fundamental concepts are different - BPMN is...

    Provided By University of York Students' Union

  • White Papers // Jun 2007

    An Agent Based System for Business-driven Service Provisioning

    In the 3G mobile networks, utilization of multimedia applications on mobile/wireless devices allows users to be present and communicate with other users, anywhere and anytime. Novel service provisioning models are taking into account user's behavior, terminal equipment capabilities and the content providers. Thus, service charging schemes must be adapted to...

    Provided By University of York Students' Union

  • White Papers // Sep 2011

    Security Threats for Mobile Platforms

    The proliferation of smart-phone devices, with ever advancing technological features, has brought the issue of mobile device security back into focus. Mobile devices are rapidly becoming attractive targets for malicious attacks due to significant advances in both hardware and operating systems. The modern mobile platforms, like Android, iOS and Symbian,...

    Provided By University of York Students' Union

  • White Papers // Jul 2009

    Recent Advances in Data Management

    To increase the value of data as a business asset, companies and government organizations need to establish standards, policies, and processes for the usage, development, and management of data, to create the right organizational structure, and to develop the supporting technology infrastructure. As a practice with roots in corporate and...

    Provided By University of York Students' Union

  • White Papers // Oct 2009

    Improving the ETL Process and Maintenance of Higher Education Information System Data Warehouse

    HEIS (Higher Education Information System) is a project funded by the Croatian Ministry of Science, Education and Sports started in the year 2001. HEIS is a comprehensive information system that provides support for education related processes taking place within a higher education institution. As a part of the project, a...

    Provided By University of York Students' Union

  • White Papers // Oct 2012

    Security Agility Solution Independent of the Underlaying Protocol Architecture

    Cryptographic protocols are constantly exposed to new at-tack methods. When some cryptographic protocol gets exposed there is a need to replace it. This is hard because most cryptographic protocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used. In that way old and vulnerable...

    Provided By University of York Students' Union

  • White Papers // Sep 2013

    Stability of Software Defect Prediction in Relation to Levels of Data Imbalance

    Software defect prediction is an important decision support activity in software quality assurance. Its goal is reducing verification costs by predicting the system modules that are more likely to contain defects, thus enabling more efficient allocation of resources in verification process. The problem is that there is no widely applicable...

    Provided By University of York Students' Union

  • White Papers // Feb 2010

    Component-Based Specification for Multi-Processor System-on-Chip Design

    In this paper, the authors present a component-based design approach in modeling Multi-Processor Systems-on-Chip (MPSoC). As a component-based specification, SaveComp Component Model (SaveCCM) component technology was employed. In contrast to widely used component-based technologies, SaveCCM is light-weighted, HW/SW platform-independent and considers specific non-functional constraints inherent in heterogeneous MPSoC domain, e.g....

    Provided By University of York Students' Union

  • White Papers // Apr 2009

    Design of a System-Level Pipelined JPEG Coder for a Homogeneous Multiprocessor Platform Using Replication

    In this paper, the authors present a case study on using replication for breaking system-level pipeline bottlenecks in Multi-Processor Systems-on-Chip (MPSoC). Using this approach, they have designed a JPEG coder application on a homogenous multiprocessor platform and have achieved 4.78

    Provided By University of York Students' Union

  • White Papers // Mar 2010

    Evaluation of Embedded Processor Based BDD Implementation

    Different strategies for implementation of computationally intensive applications in hardware are available today. The spectrum of implementations ranges from usage of standardized microprocessors to specially tailored hardware solutions. Available processor architectures range from general purpose type through processors with instruction set extensions to application-specific processors. On the other side, recent...

    Provided By University of York Students' Union

  • White Papers // May 2011

    ARM Architecture and Multimedia Applications

    The ARM processor is a key component of many embedded systems. First ARM prototype was introduced in 1985. Under the name of Acorn RISC Machine. An overview of ARM processor architecture evolution with emphasis to specific instruction sets capable of executing the demanding high speed real-time multimedia applications is provided....

    Provided By University of York Students' Union

  • White Papers // Feb 2012

    Towards Semantic and Affective Coupling in Emotionally Annotated Databases

    Emotionally annotated databases are repositories of multimedia documents with annotated affective content that elicit emotional responses in exposed human subjects. They are primarily used in research of human emotions, attention and development of stress-related mental disorders. This can be successfully exploited in larger processes like selection, evaluation and training of...

    Provided By University of York Students' Union

  • White Papers // Mar 2008

    Discovering Tacit Knowledge in Business Decision Making

    In dynamic and globalized business environment the only certain source of lasting competitive advantage of companies is knowledge. By maintaining and acquiring relevant knowledge through the use of knowledge management systems businesses are sustaining their competitive advantage over other players in the market. In this paper, one of the most...

    Provided By University of York Students' Union

  • White Papers // Jun 2012

    Strategic Success Factors in ERP System Implementation

    Different ways of approaching ERP implementation give different results. In order to successfully implement an ERP system it is necessary to properly balance critical success factors. By researching what the critical success factors in ERP implementation are, why they are critical, and to what extent they are relevant to users,...

    Provided By University of York Students' Union

  • White Papers // Sep 2012

    Useful Patterns for BPEL Developers

    Modern enterprises use service-oriented architecture to accommodate business agility. One of the most important SOA standards is BPEL, because it provides a means to specify business processes and their interaction. In this paper, the authors examine patterns that are related to BPEL or can be implemented in BPEL. The most...

    Provided By University of York Students' Union

  • White Papers // May 2007

    The Impact of Business Process Orientation on Organizational Performance

    The extensive literature on business process management suggests that organizations can enhance their overall performance by adopting a process view of business. It has been shown in previous studies that the companies which have reached higher business process maturity level consistently outperform those that have not reached them. The paper...

    Provided By University of York Students' Union

  • White Papers // Jun 2010

    Mapping of Core Components Based e-Business Standards into Ontology

    A mapping of Core Components specification based e-business standards to ontology is presented. The Web Ontology Language (OWL) is used for ontology development. In order to preserve the existing hierarchy of the standards, an emphasis is put on the mapping of Core Components elements to specific constructs in OWL. The...

    Provided By University of York Students' Union

  • White Papers // May 2013

    Security Analysis of Croatia's Receipt Registration and Verification System

    In this paper, the authors presented initial analysis of a fiscal system introduced by Republic of Croatia's Tax Administration. It is only a partial analysis, based on publicly available information, which doesn't include testing's on live systems due to being illegal by the new Criminal law in Croatia. Also, they...

    Provided By University of York Students' Union

  • White Papers // May 2012

    Implementing Certificate-based Authentication Protocol on Smart Cards

    In this paper, the authors describe challenges faced when building a practical implementation of a smart card authentication protocol. The protocol to be implemented was designed with intention of restricting access to maintenance functions implemented in majority of Point-Of-Sale (POS) terminals. POS terminals have complex software platform that must be...

    Provided By University of York Students' Union

  • White Papers // Oct 2007

    A Multimodal Biometric System Implemented within an Active Database Management System

    Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In some situations it is enough that user knows e.g. password, in other situations it is enough that user posses e.g. a...

    Provided By University of York Students' Union

  • White Papers // Jun 2008

    Fuzzy Active Rules in Mutimodal Biometric Systems

    In this paper, the authors present the idea how to use fuzzy active rules within biometric systems. They have already shown how the concept of complex events presented in the active database theory could be used in order to build a biometric system. They especially explored the paradigm of active...

    Provided By University of York Students' Union

  • White Papers // Oct 2010

    Security and Privacy Related Online Behavior of Experienced ICT Users

    The increase in the number and variety of potential security and privacy threats puts emphasis on the behaviors of Internet users regarding their use of computer systems and the Internet. The assumptions and habits of Internet users have a great influence on the level of their online privacy and security....

    Provided By University of York Students' Union