The main objective of this project report is to study the significance of Information Systems (IS) security. Some topics discussed in this report are: Security in the Information Age, Information Systems Research, The Scandinavian School, Computer Security and IT Security, Security Mechanisms, Actual and perceived Information Systems Security Concepts, etc.
In this project report, we will disscuss about security policies for runtime environments. The runtime environments offered by application-level virtual machines like the Java Virtual Machine (JVM) or the .NET Common Language Runtime are appealing for Online application vendors for the reason
Certificate management is a crucial element in PKI implementations, which includes certificate generation, distribution, storage, and revocation. Most of the existing research has been focusing on the security aspect or the functionality and the structure of certificate management systems. Very little has
The dissertation relates to the design of a smart sensor network for safeguarding building from chemical, biological and intruder attacks. This dissertation provides a logical level design combined with the architectures at different levels of hierarchy. The application of object technology is
In the last 30 years, an array of cryptographic protocols have been offered to fix secure and safe communication problems even in the presence of adversaries. The plethora of this work differs from developing basic security primitives offering confidentiality and authenticity to
The Web is an assortment of shared resources. Online users share bandwidth and processing resources both in the network at routers and on the network’s edge at servers. Nevertheless, the Internet’s architecture doesn’t stop nodes from eating excessive resources. In reality, resource
Traditionally, firewalls and access control have been the most important components used in order to secure servers, hosts and computer networks. Today, intrusion detection systems (IDSs) are gaining attention and the usage of these systems is increasing. This thesis covers commercial IDSs and the future direction of these systems.
In hospitals, medical data is stored in databases. These medical databases store anything from diagnoses to patient information. Some of the data in a medical database is sensitive and access to this data should be limited to authorized persons. Furthermore, the integrity of the data should be protected to prevent unauthorized persons from making alterations.
Steganography, meaning hidden writing, is the technique of concealing secret information into another cover-media, such as audio, video, image and text, in such a manner that the very existence of the information is camouflaged. Unlike the goal of cryptography, which prevents the data from illicit access and modification by transforming the secret data into messy and meaningless bit-streams, the aim of steganography is to conceal their very existence such that the embedded data is inaudible or invisible to the grabbers.
The Web is evolving at an incredible speed and it is now the largest information and knowledge database. Numerous web documents are gathered, which need programmed processing and examination for smart applications. In this dissertation, we investigate the web document analysis approach and also create an application to anti-phishing. For Web document analysis, a visual factor based page segmentation approach is suggested and implemented.