Volume 2 Number 1 March 2011

    
A Study on the aspect of data transmission on SMS interface

Alyssa Marie Dykimching, Jan Aaron Angelo Lee, William Emmanuel Yu

https://doi.org/

Abstract We, in this paper identified an aspect of data transmission that could help address the existing gap between the availability of the second and third generations of mobile telephony in the light of increased demand for growth of machine-to-machine applications using mobile data technology. Our approach helped to findout the reliability of sending data through the SMS interface as an... Read More


A Scalable Web Service Security Model

Khalil Challita, Hikmat Farhat1, Joseph Zalaket

https://doi.org/

Abstract http://www.dline.info/jisr/fulltext/v2n1/2.pdf... Read More


Classification of Transport Layer Data Using Multi-way Association Clustering Analysis

Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum

https://doi.org/

Abstract Currently, the categorization of real time multicast data using payload-based analysis is producing practical limitations with many applications that a network supports. Through this work, we set our goal to identify the recurrent patterns and classification of transport layer data, as an effective measure of anomaly-based intrusion detection. We have identified them by using association rules techniques such as Apriori... Read More


Improved Access Control Mechanism with XML Coding and XML Document Updating

Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, Nur Izura Udzir

https://doi.org/

Abstract Now researchers felt the need for XML access control mechanism over World Wide Web. In addition, an efficient dynamic labeling scheme is required in order to eliminate the re-labeling process of existing XML nodes during XML document updating. However, the previous research on access control mechanisms for XML documents has not addressed the issue of integrating access control with a... Read More


An Efficient Multi-Proxy System for Proxy Signature Scheme

Shivendu Mishra, Rajeev Anand Sahu, Sahadeo Padhye

https://doi.org/

Abstract In the last few years, the traditonal certificate-based setting is replaced by the ID-based setting. Proxy signatures allow the delegation of signing rights from an original user to its proxy agent. Normally, the original signer can authorize a group of proxy agents to sign any document on its behalf. Currently in our study, we have proposed an ID-based multi-proxy signature... Read More