Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
War and peace in the Internet era  [cached]
Josep M. Porta Fabregat
DIGITHUM , 2004,
Abstract: This article looks to find the ideological causes that lead human beings to war or peace nowadays, in the Internet era. This proposal is worthy of study as war is not a need in terms of human nature or history: we are capable of war and peace simultaneously. However, why does war survive if we are able to live in peace? In our opinion, the actual cause of conflict is fanaticism. This phenomenon comes from the perversion of the two bases of our civilisation: liberty and rationality. This twofold perversion leads us to believe that we are the Absolute, or at least its instrument. Since the fall of the Berlin wall, this kind of fanaticism has come from the generalised conviction that we are at the "end of history"; in this light, one can conclude that this irrationality is definitive and, thus, that any efforts to achieve world peace are useless. However, we believe that the formula for peace can only be derived from reflection and the effective extension around the world of a technical medium that makes communication between all men possible. This would be able to resolve all the perversions of liberty and rationality and make people aware of the infinite distance between us and the Absolute. However, this reflection is not enough. For this awareness to triumph, the technical and ideological situation represented by the Internet has to spread over the whole planet: liberty for those taking part, rationality to allow for communication among all those connected and universal access. This is the moral trend for the Internet, which in itself encourages progress towards world peace.
Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus  [PDF]
Wei Huang,Bo Meng
Information Technology Journal , 2011,
Abstract: Secure remote internet voting protocols play an important role in electronic government. Owning to the huge damage and hard to prevention of denial of service attacks in security protocols, resistance of denial of service attacks occupy a tiny space and is intricate security requirements for remote voting protocols. Meng protocol is one of the most important remote internet voting protocols that claims to satisfy formal definitions of key properties. In this study firstly the review of the formal model of resistance of denial of service attacks in security protocol are introduced. Then extended applied pi calculus, the mechanized proof tool ProVerif and Huangs formal model are examined. After that Meng protocol is modeled in extended applied pi calculus. Finally resistance of denial of service attacks is analyzed with ProVerif. The results we obtain are that Meng protocol is not resistance of denial of service attack because one denial of service attacks is found by us. At the same time we give the method against the denial of service attack. To our best knowledge we are conducting the first mechanized proof of resistance of denial of service attacks in Meng protocol for an unbounded number of honest and corrupted voters.
NetFence: Preventing Internet Denial of Service from Inside Out  [PDF]
Xin Liu,Xiaowei Yang,Yong Xia
Computer Science , 2010,
Abstract: Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a scalable DoS-resistant network architecture. NetFence uses a novel mechanism, secure congestion policing feedback, to enable robust congestion policing inside the network. Bottleneck routers update the feedback in packet headers to signal congestion, and access routers use it to police senders' traffic. Targeted DoS victims can use the secure congestion policing feedback as capability tokens to suppress unwanted traffic. When compromised senders and receivers organize into pairs to congest a network link, NetFence provably guarantees a legitimate sender its fair share of network resources without keeping per-host state at the congested link. We use a Linux implementation, ns-2 simulations, and theoretical analysis to show that NetFence is an effective and scalable DoS solution: it reduces the amount of state maintained by a congested router from per-host to at most per-(Autonomous System).
Denial of service attack in the Internet: agent-based intrusion detection and reaction  [PDF]
O. Ignatenko
Computer Science , 2009,
Abstract: This paper deals with denial of service attack. Overview of the existing attacks and methods is proposed. Classification scheme is presented for a different denial of service attacks. There is considered agent-based intrusion detection systems architecture. Considered main components and working principles for a systems of such kind.
Network Copyright Protection in the Internet Era
Cai-qin ZHANG
Canadian Social Science , 2007,
Abstract: This thesis puts forward the development prospect and concrete protections of the network copyright protection in the Internet era through the analysis of law. It figures that the variety of the network copyright has its own characteristics; the objection system on the Internet should be established to fix on the network copyright of a certain work; the range of the network works is different from that of the traditional works; the download, copying, printing, backing up, and paste of the network works should be also considered as the reasonable use under certain conditions; the network copyright, depending on different subjects, is applicable to different liability principles of infringement; the characteristics of the network copyright infringement case should be considered in the aspect of domination, and it is proposed that a large number of cases should be transferred to the basic people's court. Key words: Network Copyright, Legal System, Protection Résumé: L’essai présent expose, à travers l’analyse de la loi, la perspective de développement et des mesures concrètes de protection du droit de réseau à l’heure de l’Internet. D’après l’auteur, le droit de réseau a ses propres caractéristiques ; le système d’objection sur l’Internet devrait être établi pour déterminer le droit de réseau de certain travail ; le travail de réseau est différent du travail traditionnel ; le téléchargement, la copie, l’imprimerie , le secours, le collage sur le réseau devraient être considérés comme l’utilisation raisonnable dans certaines conditions ; le droit de réseau, dépendant de différents sujets, est applicable à des désavantages des principes d’infraction ; les caractéristiques du cas de violation du droit de réseau devraient considérées sur le plan de la domination ; bon nombre de cas devraient être transférés dans la cour populaire de base. Mots-Clés: droit de réseau, système légal, protection
The Internet and HIV study: design and methods
Jonathan Elford, Graham Bolding, Mark Davis, Lorraine Sherr, Graham Hart
BMC Public Health , 2004, DOI: 10.1186/1471-2458-4-39
Abstract: The objectives of the Internet and HIV study are to: (i) measure the extent to which gay men living in London seek sexual partners on the Internet; (ii) compare the characteristics of London gay men who do and do not seek sex on the Internet; (iii) examine whether sex with Internet-partners is less safe than with other sexual partners; (iv) compare use of the Internet with other venues where men meet sexual partners; (v) establish whether gay men use the Internet to actively seek partners for unprotected anal intercourse; (vi) determine the potential for using the Internet for HIV prevention. These objectives have been explored using quantitative and qualitative research methods in four samples of London gay men recruited and interviewed both online and offline. The four samples were: (i) gay men recruited through Internet chat rooms and profiles; (ii) HIV positive gay men attending an NHS hospital outpatients clinic; (iii) gay men seeking an HIV test in an NHS HIV testing or sexual health clinic; (iv) gay men recruited in the community.Quantitative data were collected by means of confidential, anonymous self-administered questionnaires (n>4000) completed on-line by the Internet sample. Qualitative data were collected by means of one-to-one interviews (n = 128) conducted either face-to-face or on-line.The strength of the Internet and HIV study is its methodological plurality, drawing on both qualitative and quantitative research among online and offline samples, as well as taking advantage of recent advances in web survey design. The study's findings will help us better understand the role of the Internet in relation to gay men's sexual practiceSeveral studies have found elevated levels of high risk sexual behaviour among people who seek – and meet – sexual partners through the Internet [1-7] In a study conducted in a public HIV testing clinic in Denver, Colorado, for example, people who sought sex on the Internet were more likely to have had a sexually transmitted
Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks  [PDF]
Katerina J. Argyraki,David R. Cheriton
Computer Science , 2003, DOI: 10.1109/TNET.2008.2007431
Abstract: Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit and interfering with normal traffic. At present, the network operator of a site under attack has no other resolution but to respond manually by inserting filters in the appropriate edge routers to drop attack traffic. However, as DoS attacks become increasingly sophisticated, manual filter propagation becomes unacceptably slow or even infeasible. In this paper, we present Active Internet Traffic Filtering, a new automatic filter propagation protocol. We argue that this system provides a guaranteed, significant level of protection against DoS attacks in exchange for a reasonable, bounded amount of router resources. We also argue that the proposed system cannot be abused by a malicious node to interfere with normal Internet operation. Finally, we argue that it retains its efficiency in the face of continued Internet growth.
Research on the Evolution of Supply Chain Finance Mode in the “Internet+” Era  [PDF]
Mengyang Wang
Open Journal of Social Sciences (JSS) , 2016, DOI: 10.4236/jss.2016.43019
Abstract: With the great development of China e-commerce industry, more and more business transaction is moved from offline to online. Generated by a plenty series of transactions online, multi-dimen-sional user data are used to promote the evolution of the Internet finance mode. In the era of “internet+”, all industries are going through changes. The Internet process of supply chain finance also accelerates. Based on the different characteristics on participants, source of different evolution paths, this paper gives an overall classification of supply chain finance under the background of internet, which includes supply chain finance “1 + N” mode dominated by commercial banks, supply chain finance web 2.0, core enterprise and logistic company’s extensive in supply chain finance. Finally, we analyze the characteristic of the different models and summarize the operational mechanism and development trend in the future.
Marketing Management for Consumer Products in the Era of the Internet of Things  [PDF]
Reinhold Decker, Christian Stummer
Advances in Internet of Things (AIT) , 2017, DOI: 10.4236/ait.2017.73004
Abstract: In the Internet of Things (IoT) consumer products like coffee machines and smoke detectors are connected with the Internet, which effectively expands the Internet to the physical world. Such products have the ability to collect and share data from the user’s environment and, thus, their broad emergence will affect well-established concepts presented in the extant marketing literature. In order to provide a distinct contribution, we focus on customer relationship management, product life cycle management, as well as business model development and discuss implications of the enhanced capabilities of IoT products in these fields. By means of an extensive analysis of current developments in theory and practice, we systematically deduce ten research propositions. The paper concludes with a synthesis of findings and an outlook to promising directions for further research in IoT-oriented marketing management.
Web Publishing in the Internet Era

Peng Jing,

现代图书情报技术 , 1998,
Abstract: With the development of Internet web publishing has been the latest trend in the publishing. The differences between the traditional and web publishing are revealed in the paper,and some relevant legal and technical problems are briefily discussed.At last the realities and prospect of the web publishing in China are analyzed.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.