E-Book, Englisch, Band 64, 284 Seiten
Tkacz / Kapczynski Internet - Technical Development and Applications
1. Auflage 2009
ISBN: 978-3-642-05019-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 64, 284 Seiten
Reihe: Advances in Intelligent and Soft Computing
ISBN: 978-3-642-05019-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among researchers, teachers and also students of computer science and related disciplines.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;6
2;Contents;8
3;List of Contributors;17
4;Part I Internet – Technical Fundamentals and Applications;21
4.1;How to Improve Internet?;22
4.1.1;How Internet Works;22
4.1.1.1;Short Chronology;23
4.1.1.2;Social Aspects;24
4.1.1.3;Internet Infrastructure;25
4.1.2;Problems and Their Solutions;26
4.1.2.1;Spam Is Incredibly Annoying;26
4.1.2.2;There Are Necessary Better Search Engines;27
4.1.3;Conclusion and Future Plans;28
4.1.4;References;29
4.2;Performance Modeling of Selected AQM Mechanisms in TCP/IP Network;30
4.2.1;Introduction;30
4.2.2;Active Queue Management;31
4.2.3;Simulation Model of the RED Mechanism;32
4.2.4;Numerical Results;33
4.2.5;Conclusions;37
4.2.6;References;38
4.3;Simulation and Analytical Evaluation of a Slotted Ring Optical Packet Switching Network;40
4.3.1;Introduction;40
4.3.2;Network Architecture;41
4.3.3;Quality of Service Mechanism;42
4.3.4;Simulations;43
4.3.5;Markovian Analysis;44
4.3.6;Conclusions;47
4.3.7;References;47
4.4;A Multi-tier Path Query Evaluation Engine for Internet Information Systems;48
4.4.1;Introduction;48
4.4.2;Related Work;49
4.4.3;Deferred Evaluation of Structural Join;49
4.4.4;Tailored Location Steps;50
4.4.4.1;Employing FIFO Index;51
4.4.4.2;Additional Hint for the Cursor Shift;52
4.4.5;Composition of Operators;52
4.4.6;Experimental Evaluation;53
4.4.7;Conclusions;54
4.4.8;References;55
4.5;Modeling of Internet 3D Traffic Using Hidden Markov Models;56
4.5.1;Introduction;56
4.5.2;3D Object Representation – Progressive Meshes;57
4.5.3;Data Acquisition;59
4.5.4;Hidden Markov Model;60
4.5.5;Conclusions;62
4.5.6;References;63
4.6;Usability Testing of the Information Search Agent: Interface Design Issues;64
4.6.1;Introduction;64
4.6.2;Agents Working for Us;65
4.6.2.1;Information Search Agents;66
4.6.3;Research on Interaction of People with Intelligent Information Search Agent;66
4.6.3.1;Exploring Interaction;67
4.6.3.2;Research Outcomes;68
4.6.4;Conclusion;69
4.6.5;References;69
4.7;The Use of Natural Language as an Intuitive Semantic Integration System Interface;70
4.7.1;Introduction;70
4.7.2;Metalog;71
4.7.3;HILLS Semantic Integration System;72
4.7.3.1;HILLS Architecture;72
4.7.3.2;HILLS and Metalog;75
4.7.4;Polish Language and Metalog;76
4.7.5;Summary;77
4.7.6;References;77
4.8;Student’s Electronic Card: A Secure Internet Database System for University Management Support;78
4.8.1;Introduction;78
4.8.2;Project Background;80
4.8.3;Functionality and Architecture of the System;82
4.8.3.1;Cards and System Security;84
4.8.3.2;Data Synchronization with the University Database;87
4.8.3.3;System Expansion;87
4.8.3.4;Design, Development, Update and Maintenance;89
4.8.4;Summary and Conclusion;90
4.8.5;References;91
4.9;Video Shot Selection and Content-Based Scene Detection for Automatic Classification of TV Sports News;92
4.9.1;Introduction;92
4.9.2;Temporal Segmentation;93
4.9.3;Scene Detection and Classification;95
4.9.4;Classification of Shots from TV Sports News;95
4.9.5;Best Frame Position in a Scene;96
4.9.6;Final Conclusions and Further Studies;97
4.9.7;References;99
4.10;E-Learning Database Course with Usage of Interactive Database Querying;100
4.10.1;Introduction;100
4.10.2;General Structure of a Module;101
4.10.3;Description of SQL Learning Problem;102
4.10.3.1;Developed Solution;104
4.10.4;Conclusion;107
4.10.5;References;108
4.11;On Applications of Wireless Sensor Networks;109
4.11.1;Introduction;109
4.11.2;Sensor Networks from a Practical Point of View;110
4.11.3;Technological Aspects;112
4.11.4;Object, Habitat and Environmental Monitoring;113
4.11.5;Building Automation;114
4.11.6;Oil and Gas Installations;114
4.11.7;Medical Care;115
4.11.8;Military Applications;115
4.11.9;Conclusions;116
4.11.10;References;116
4.12;Gift Cards Authorization through GSM in a Distributed Trade Network – Case Study;118
4.12.1;The Business Environment of Gift Cards;118
4.12.1.1;Good Vouchers and Gift Cards Survey;119
4.12.1.2;Formal Regulations of Gift Cards;120
4.12.2;Gift Cards Authorization System Requirements;120
4.12.3;System Architecture;121
4.12.3.1;Gift Card Manager;122
4.12.3.2;Authentication Procedure;123
4.12.3.3;SMS Protocol;123
4.12.4;Conclusions;124
4.12.5;References;125
4.13;Remote Access to a Building Management System;126
4.13.1;Introduction;126
4.13.2;Configuration of the BMS;127
4.13.2.1;Buildings, Devices, States;127
4.13.2.2;Automation;128
4.13.2.3;Events Dictionary;129
4.13.3;Building Management Protocol;129
4.13.3.1;Initialization and Finishing;129
4.13.3.2;Information Commands;130
4.13.3.3;Controlling Devices;131
4.13.3.4;Monitoring;131
4.13.3.5;Transactions;132
4.13.4;Remote Access;133
4.13.5;Conclusions;133
4.13.6;References;134
4.14;Applying Rough Set Theory to the System of Type 1 Diabetes Prediction;135
4.14.1;Introduction;135
4.14.2;Medical Data;136
4.14.3;The Aim of the Study;136
4.14.4;Rough Set Preliminaries;137
4.14.5;Information System;137
4.14.6;Data Analysis;138
4.14.6.1;Classification Problem;139
4.14.7;Conclusions;141
4.14.8;References;142
5;Part II Information Management Systems;144
5.1;Outline of the Enterprise Resource Control Systems Architecture;145
5.1.1;Data Structure;145
5.1.2;Organizational Information-Transition Nets;148
5.1.3;Organizational Structure;150
5.1.4;Functional Structure;151
5.1.5;Conclusions;153
5.1.6;References;153
5.2;Implementation of Changes to the System in the Model of Multiple Suppliers vs. the Model of a Single Supplier;154
5.2.1;The Process of Implementing Changes to the System;154
5.2.2;The Lines Dividing the Process – The Responsibility of Suppliers and Points of Contact;155
5.2.3;The Specificity of the Single Supplier Model;157
5.2.4;The Specificity of the Multi-supplier Model;158
5.2.5;Summary and Conclusions;159
5.2.6;References;161
5.3;Standardization of Software Size Measurement;162
5.3.1;Introduction;162
5.3.2;Software Size Measures;163
5.3.3;Standardization of Software Functional Size Measurement Concept;165
5.3.4;Standardization of Software Functional Size Measurement Process;166
5.3.5;Concluding Remarks;168
5.3.6;References;169
5.4;The Role of Automation Tools Supporting the Maintenance of the System Environments;170
5.4.1;System Environments;170
5.4.2;Selected Aspects of System Environment Maintenance;171
5.4.3;Tools to Support System Environment Maintenance;172
5.4.4;Summary and Conclusions;175
5.4.5;References;177
5.5;Why IT Strategy Does Not Suffice?;178
5.5.1;Introduction;178
5.5.2;Attempt to Evaluate the Selected Results of Poll Studies;179
5.5.3;Enterprise Architecture as a Basis for IT Strategy Realization;183
5.5.4;Summary;187
5.5.5;References;187
5.6;The Process Approach to the Projects of the Information Systems;188
5.6.1;The Processes in the Projects of the Information Systems;188
5.6.2;The Classification of Processes;190
5.6.3;General Principles and Characteristics of the Process Approach to the Management of Projects of Information Systems;191
5.6.4;The Principle of the Process Strategy;192
5.6.5;The Principle of the Consequent Separation of Production and Non-production Processes in the IS Projects;193
5.6.6;The Principle of Delegation, Monitoring and Control;193
5.6.7;The Principle of the Repeated Procedure in the Management of the IS Project;195
5.6.8;The Principle of Team Work, the Principle of Evaluation and Motivation of Workers in the Project;195
5.6.9;The Principle of the Maximization of the Application of Knowledge Processes;196
5.6.10;Conclusions;196
5.6.11;References;197
5.7;The Importance of Virtual Community for Enterprise Functioning – The Case Study of P.P.H.U. Jedroch Partnership Company;198
5.7.1;Introduction;198
5.7.2;The Role of Virtual Community in Marketing;199
5.7.3;Organizational and Managing P.P.H.U. Jedroch Reactions upon Opinions Expressed by Internauts;201
5.7.4;Conclusions;204
5.7.5;References;205
6;Part III Information Security in Distributed Computer Systems;206
6.1;Quantum Cryptography: Opportunities and Challenges;207
6.1.1;Introduction;207
6.1.2;Quantum Key Distribution;210
6.1.3;Quantum Cryptography Protocols;213
6.1.3.1;The BB84 Quantum Cryptographic Protocol;213
6.1.3.2;The B92 Quantum Cryptographic Protocol;216
6.1.3.3;EPR Quantum Cryptographic Protocols;216
6.1.3.4;Quantum Teleportation;218
6.1.4;Quantum Cryptography in Practice;218
6.1.4.1;The DARPA Quantum Network;219
6.1.4.2;The Vienna Network;220
6.1.4.3;Commercial Quantum Products;220
6.1.5;Security of Quantum Cryptography;221
6.1.5.1;Overall Security of a Communication System;221
6.1.5.2;Attacks on Quantum Cryptosystems;222
6.1.5.3;Exploiting Physical Imperfections;223
6.1.6;Other Challenges;224
6.1.7;Conclusions;225
6.1.8;References;226
6.2;Cerberis: High-Speed Encryption with Quantum Cryptography;228
6.2.1;Cryptography;228
6.2.2;Organizational Information-Transition Nets;229
6.2.3;Quantum Cryptography;230
6.2.4;Advantage of Layer 2 Encryption;230
6.2.5;Description of the Cerberis Solution;231
6.2.5.1;Quantum Key Distribution Server (QKD Server);231
6.2.5.2;High Speed Encryption Engine (AES-256);232
6.2.6;Conclusions;232
6.2.7;References;232
6.3;A Numerical Simulation of Quantum Factorization Success Probability;233
6.3.1;Introduction;233
6.3.2;Quantum Factorization;234
6.3.2.1;Phase Estimation;235
6.3.2.2;Quantum Order Finding;236
6.3.2.3;The Shor’s Algorithm;237
6.3.3;Analysis;238
6.3.4;Conclusion;240
6.3.5;References;240
6.4;Software Flaws as the Problem of Network Security;242
6.4.1;The Vulnerability of Systems to Hacking;242
6.4.2;The Attacks on the Operating Systems;243
6.4.3;The Vulnerability of Utility Applications to Attacks;245
6.4.4;Hacking theWeb Applications;246
6.4.5;Application Vulnerabilities – The Frequency of Occurrence;247
6.4.6;Summary;249
6.4.7;References;250
6.5;Security of Internet Transactions;251
6.5.1;Introduction;251
6.5.2;Threats to Internet Users;253
6.5.2.1;Drive-by Download Attack;256
6.5.2.2;Attack through SSLStrip;257
6.5.3;Eavesdropping in Computer Networks and Scanning of Ports;257
6.5.4;Summary;258
6.5.5;References;258
6.6;Security of Internet Transactions – Results of a Survey;260
6.6.1;Introduction;260
6.6.2;Electronic Bank Accounts;262
6.6.3;A Survey 2008 on the Security of Internet Transactions;263
6.6.4;Summary;266
6.6.5;References;267
6.7;Ontological Approach to the IT Security Development;268
6.7.1;Common Criteria Primer;268
6.7.2;Introduction;269
6.7.3;The Ontological Approach to the Common Criteria;270
6.7.4;Conclusions;274
6.7.5;References;274
6.8;Enhancement of Model of Electronic Voting System;277
6.8.1;Introduction;277
6.8.2;Electronic Voting;278
6.8.3;E-Voting Protocols;279
6.8.4;Model of e-Voting via Internet;280
6.8.5;Enhancement of e-Voting Model;281
6.8.6;Conclusions;282
6.8.7;References;282
7;Author Index;284




