Today, smart cards are widely ingrained in human life and its use in various applications for
authentication, Storage and processing of sensitive information is inevitable. One of the most important
parts in the design of smart cards is their operating system, in more precisely their file management system.
In this paper, Design and implementation of a secure and dynamic file management system, that we call
SDFS, for Java cards will be evaluated. The SDFS has high compatibility with international standards
ISO/IEC 7816 that enable it to use in different operating systems that designed for java cards. To enhance
system performance in different uses and future developments, SDFS is completely designed modular.
Modular design provides easy configuration for developers in different situations. SDFS by using secure
cryptographic protocols provides security of storing and processing of information for users.
Implementation results in NetBeans IDE 7.2 show high efficiency and security of new file system in
practical usage.
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...ijsrd.com
Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. There are many relatively new tools available that have been developed in order to recover and dissect the information that can be gleaned from data storage area like hard-disk, pen drive, etc. it's all like a volatile memory, but because this is a relatively new and fast-growing field many forensic analysts do not know or take advantage of these assets. Memory like Volatile memory may contain many pieces of information relevant to a forensic investigation, such as passwords, cryptographic keys, and other data. Having the knowledge which type of method use and tools needed to recover that data is essential, and this capability is becoming increasingly more relevant as hard drive encryption and other security mechanisms make traditional hard disk forensics more challenging. This research will cover the theory behind volatile memory analysis, including why it is important, what kinds of data can be recovered, and the potential pitfalls of this type of analysis, as well as techniques for recovering and analyzing volatile data and currently available toolkits that have been developed for this purpose.
An operating system (OS) is software that manages computer hardware and software. Common desktop operating systems include Windows, Mac OS X, and Linux.
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
Video Trends presentation by VideoSticky.com founder Rodney Rumford presented at blogging conference SOBCON May 2007. Video Aggregation is at the forefront.
On the principle of optimality for linear stochastic dynamic systemijfcstjournal
In this work, processes represented by linear stochastic dynamic system are investigated and by
considering optimal control problem, principle of optimality is proven. Also, for existence of optimal
control and corresponding optimal trajectory, proofs of theorems of necessity and sufficiency condition are
attained.
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng민성 한
오늘 삶애농장과 둘밥은
그리고 이 밭에 계신 박은서 농부님과
더짓다 이유진 그리고 농사펀드는
혼자 외롭게 버티온 그 삶을
응원합니다.
여러분에게 소개하는 것은
이 밭의 인삼이지만
저희는 이 밭이 걸어 온
또 버티어 온 그 삶에 에 대해
좀 더 많이 이야기하고 싶습니다
농사펀드 http://goo.gl/e8r7i9
바로구매 http://goo.gl/cJJi3N
같 이 먹 고 잘 살 기 위 해 ㅣ 둘밥
#공감하신다면이야기를처음부터끝까지한번만읽어주세요
#그것으로도족합니다
#주변에정말좋은삼이필요한분이계시다면삶애농장에대해알려주세요
#참여하시고싶다면이글의공유만으로도많은힘이됩니다.
바라옵건데, 이렇게 기본을 다하는 분들이 있다는 것을
이 땅에 이런 분들이 아직 많다는 것을 알아주세요
바라옵건데, 불필요하게 투자를 해주실 필요는 없습니다
꼭 필요한 분이 계시다면 이렇게 기본을 지키는 분이 있다는 것을
전해주세요.
바라옵건데, 치장보다 본질을 우선시해서 사시는 분들의
수고로움이 가치있고 지켜야한다는 것을
알아 보아 주세요. 그들은 멀리 어드메에 있는 것이 아니라
오늘 우리와 같이 이땅에서 자신의 자리를 지키고 있습니다.
당신이 오늘 그러하셨듯이 말입니다.
BTO Educational - Consiglio Direttivo - 19 novembre 2010BTO Educational
Verbale della riunione del Consiglio Direttivo
BTO Educational
Il giorno diciannove del mese di Novembre dell'anno duemila dieci, alle ore 21, presso Trattoria Garga – via del Moro 56r, Firenze - regolarmente convocato, si e' riunito il Consiglio Direttivo per discutere il seguente ordine del giorno:
1. Ampliamento Consiglio Tecnico Scientifico
2. Social Media Week, a Roma 7 – 11 Febbraio 2011
3. Iscrizione all’Associazione ifitt
4. Enter, a Innsbruck dal 26 al 28 Gennaio 2011
5. ToscanaLab #generazioni2.0@arezzo
6. Bilancio economico della commessa Florence Promhotels relativo al contributo scientifico/organizzativo di BTO Educational all’evento BTO – Buy Tourism Online 2010
7. Seminario a porte chiuse BTO Educational
8. Varie e eventuali
Sono presenti:
Robert Piattelli – Presidente
Giancarlo Carniani – Vice Presidente
Roberta Milano – Consigliere
Rodolfo Baggio – Presidente del Consiglio Tecnico Scientifico
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...ijsrd.com
Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. There are many relatively new tools available that have been developed in order to recover and dissect the information that can be gleaned from data storage area like hard-disk, pen drive, etc. it's all like a volatile memory, but because this is a relatively new and fast-growing field many forensic analysts do not know or take advantage of these assets. Memory like Volatile memory may contain many pieces of information relevant to a forensic investigation, such as passwords, cryptographic keys, and other data. Having the knowledge which type of method use and tools needed to recover that data is essential, and this capability is becoming increasingly more relevant as hard drive encryption and other security mechanisms make traditional hard disk forensics more challenging. This research will cover the theory behind volatile memory analysis, including why it is important, what kinds of data can be recovered, and the potential pitfalls of this type of analysis, as well as techniques for recovering and analyzing volatile data and currently available toolkits that have been developed for this purpose.
An operating system (OS) is software that manages computer hardware and software. Common desktop operating systems include Windows, Mac OS X, and Linux.
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
Video Trends presentation by VideoSticky.com founder Rodney Rumford presented at blogging conference SOBCON May 2007. Video Aggregation is at the forefront.
On the principle of optimality for linear stochastic dynamic systemijfcstjournal
In this work, processes represented by linear stochastic dynamic system are investigated and by
considering optimal control problem, principle of optimality is proven. Also, for existence of optimal
control and corresponding optimal trajectory, proofs of theorems of necessity and sufficiency condition are
attained.
자연농법 삶애농장 농사펀드를 만나다 farming fund natural Korean ginseng민성 한
오늘 삶애농장과 둘밥은
그리고 이 밭에 계신 박은서 농부님과
더짓다 이유진 그리고 농사펀드는
혼자 외롭게 버티온 그 삶을
응원합니다.
여러분에게 소개하는 것은
이 밭의 인삼이지만
저희는 이 밭이 걸어 온
또 버티어 온 그 삶에 에 대해
좀 더 많이 이야기하고 싶습니다
농사펀드 http://goo.gl/e8r7i9
바로구매 http://goo.gl/cJJi3N
같 이 먹 고 잘 살 기 위 해 ㅣ 둘밥
#공감하신다면이야기를처음부터끝까지한번만읽어주세요
#그것으로도족합니다
#주변에정말좋은삼이필요한분이계시다면삶애농장에대해알려주세요
#참여하시고싶다면이글의공유만으로도많은힘이됩니다.
바라옵건데, 이렇게 기본을 다하는 분들이 있다는 것을
이 땅에 이런 분들이 아직 많다는 것을 알아주세요
바라옵건데, 불필요하게 투자를 해주실 필요는 없습니다
꼭 필요한 분이 계시다면 이렇게 기본을 지키는 분이 있다는 것을
전해주세요.
바라옵건데, 치장보다 본질을 우선시해서 사시는 분들의
수고로움이 가치있고 지켜야한다는 것을
알아 보아 주세요. 그들은 멀리 어드메에 있는 것이 아니라
오늘 우리와 같이 이땅에서 자신의 자리를 지키고 있습니다.
당신이 오늘 그러하셨듯이 말입니다.
BTO Educational - Consiglio Direttivo - 19 novembre 2010BTO Educational
Verbale della riunione del Consiglio Direttivo
BTO Educational
Il giorno diciannove del mese di Novembre dell'anno duemila dieci, alle ore 21, presso Trattoria Garga – via del Moro 56r, Firenze - regolarmente convocato, si e' riunito il Consiglio Direttivo per discutere il seguente ordine del giorno:
1. Ampliamento Consiglio Tecnico Scientifico
2. Social Media Week, a Roma 7 – 11 Febbraio 2011
3. Iscrizione all’Associazione ifitt
4. Enter, a Innsbruck dal 26 al 28 Gennaio 2011
5. ToscanaLab #generazioni2.0@arezzo
6. Bilancio economico della commessa Florence Promhotels relativo al contributo scientifico/organizzativo di BTO Educational all’evento BTO – Buy Tourism Online 2010
7. Seminario a porte chiuse BTO Educational
8. Varie e eventuali
Sono presenti:
Robert Piattelli – Presidente
Giancarlo Carniani – Vice Presidente
Roberta Milano – Consigliere
Rodolfo Baggio – Presidente del Consiglio Tecnico Scientifico
The shrinking display ads performance leads to two distinctly different tactics for advertising, programmatic trading and native advertising, according to the PWC Global Entertainment and Media Outlook.
Yet, using the ambient presence of ubiquitous computing in our lives in combination with artificial intelligence, it is possible to enhance the quality of programmatic by offering more value, personalisation and better taking context into account.
Automated does not have to mean impersonal, and AI gives us the possibility to add quality to quantity.
Graduate Engineers Training Photos - Vasco Da Gama - By Sadashiv Borgaonkar (...Sadashiv Borgaonkar
This deck contains some photographs snapped during the Graduate Engineers Training session imparted by ACTSol & Associates at Vasco da Gama - India.
For more details, please write to connect@actsol.in & to know the profile of ACTSol & Associates, visit website www.actsol.in
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
Storage of user or application-generated user-specific private, confidential data on a third party storage provider comes with its own set of challenges. Although such data is usually encrypted while in transit, securely storing such data at rest presents unique security challenges. The first challenge is the generation of encryption keys to implement the desired threat containment. The second challenge is secure storage and management of these keys. This can be accomplished in several ways. A naive approach can be to trust the boundaries of a secure network and store the keys within these bounds in plain text. A more sophisticated method can be devised to calculate or infer the encryption key without explicitly storing it. This paper focuses on the latter approach. Additionally, the paper also describes the implementation of a system that in addition to exposing a set of REST APIs for secure CRUD operations also provides a means for sharing the data among specific users.
Defensive coding practices is one of the most critical proactive sLinaCovington707
Defensive coding practices is one of the most critical proactive security countermeasures in SDLC. If software developers follow certain security best-practices, most of the weaknesses can be eliminated. In this module’s readings, you looked at defensive tactics used in the development of software. You also learned OWASP proactive controls. Question 1
Extract defensive coding practices from Chapter 13 of the Conklin & Shoemaker. Explain each coding practice in one short paragraph. Question 2
For each coding practice, describe a corresponding CWE (https://cwe.mitre.org/) and OWASP proactive control (https://owasp.org/www-project-proactive-controls/)
CHAPTER 13
Defensive Coding Practices
In this chapter you will
• Learn the role of defensive coding in improving secure code
• Explore declarative vs. programmatic security
• Explore the implications of memory management and security
• Examine interfaces and error handling
• Explore the primary mitigations used in defensive coding
Secure code is more than just code that is free of vulnerabilities and defects. Developing code that will withstand attacks requires additional items, such as defensive coding practices. Adding in a series of controls designed to enable the software to operate properly even when conditions change or attacks occur is part of writing secure code. This chapter will examine the principles behind defensive coding practices.
Declarative vs. Programmatic Security
Security can be instantiated in two different ways in code: in the container itself or in the content of the container. Declarative programming is when programming specifies the what, but not the how, with respect to the tasks to be accomplished. An example is SQL, where the “what” is described and the SQL engine manages the “how.” Thus, declarative security refers to defining security relations with respect to the container. Using a container-based approach to instantiating security creates a solution that is more flexible, with security rules that are configured as part of the deployment and not the code itself. Security is managed by the operational personnel, not the development team.
Imperative programming, also called programmatic security, is the opposite case, where the security implementation is embedded into the code itself. This can enable a much greater granularity in the approach to security. This type of fine-grained security, under programmatic control, can be used to enforce complex business rules that would not be possible under an all-or-nothing container-based approach. This is an advantage for specific conditions, but it tends to make code less portable or reusable because of the specific business logic that is built into the program.
The choice of declarative or imperative security functions, or even a mix of both, is a design-level decision. Once the system is designed with a particular methodology, then the secure development lifecycle (SDL) can build suitable protections bas ...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...IJERA Editor
A parallel file system is a type of distributed file system that distributes file data across multiple servers and
provides for concurrent access by multiple tasks of a parallel application. In many to many communications or
multiple tasks, key establishments are a major problem in parallel file system. So we propose a variety of
authenticated key exchange protocols that are designed to address the above issue. In this paper, we also study
the password-based protocols for authenticated key exchange (AKE) to resist dictionary attacks. Password-based
protocols for authenticated key exchange (AKE) are designed to work to resist the use of passwords drawn from
a space so small that attacker might well specify, off line, all possible passwords. While many such protocols
have been suggested, the elemental theory has been lagging. We commence by interpreting a model for this
problem, to approach password guessing, forward secrecy, server compromise, and loss of session keys.
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
This investigation delves into incorporating a hybridized memetic strategy within the framework of English
composition pedagogy, leveraging Internet Plus resources. The study aims to provide an in-depth analysis
of how this method influences students’ writing competence, their perceptions of writing, and their
enthusiasm for English acquisition. Employing an explanatory research design that combines qualitative
and quantitative methods, the study collects data through surveys, interviews, and observations of students’
writing performance before and after the intervention. Findings demonstrate a beneficial impact of
integrating the memetic approach alongside Internet Plus tools on the writing aptitude of English as a
Foreign Language (EFL) learners. Students reported increased engagement with writing, attributing it to
the use of Internet plus tools. They also expressed that the memetic approach facilitated a deeper
understanding of cultural and social contexts in writing. Furthermore, the findings highlight a significant
improvement in students’ writing skills following the intervention. This study provides significant insights
into the practical implementation of the memetic approach within English writing education, highlighting
the beneficial contribution of Internet Plus tools in enriching students' learning journeys.
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
Messages routing over a network is one of the most fundamental concept in communication which requires
simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it
refers to the addition of a timing constraint in which messages should be received within a specified time
delay. This study involves Scheduling, Algorithm Design and Graph Theory which are essential parts of
the Computer Science (CS) discipline. Our goal is to investigate an innovative and efficient way to present
these concepts in the context of CS Education. In this paper, we will explore the fundamental modelling of
routing real-time messages on networks. We study whether it is possible to have an optimal on-line
algorithm for the Arbitrary Directed Graph network topology. In addition, we will examine the message
routing’s algorithmic complexity by breaking down the complex mathematical proofs into concrete, visual
examples. Next, we explore the Unidirectional Ring topology in finding the transmission’s
“makespan”.Lastly, we propose the same network modelling through the technique of Kinesthetic Learning
Activity (KLA). We will analyse the data collected and present the results in a case study to evaluate the
effectiveness of the KLA approach compared to the traditional teaching method.
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
Software architecture is the structural solution that achieves the overall technical and operational
requirements for software developments. Software engineers applied software architectures for their
software system developments; however, they worry the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact application of
each style.
The objective of this research work was a comparative analysis of software architecture styles by its
weakness and benefits in order to select by the programmer during their design time. Finally, in this study,
the researcher has been identified architectural styles, weakness, and Strength and application areas with
its component, connector and Interface for the selected architectural styles.
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
A design of a sales system for professional services requires a comprehensive understanding of the
dynamics of sale cycles and how key knowledge for completing sales is managed. This research describes
a design model of a business development (sales) system for professional service firms based on the Saudi
Arabian commercial market, which takes into account the new advances in technology while preserving
unique or cultural practices that are an important part of the Saudi Arabian commercial market. The
design model has combined a number of key technologies, such as cloud computing and mobility, as an
integral part of the proposed system. An adaptive development process has also been used in implementing
the proposed design model.
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
Frank t-norms are parametric family of continuous Archimedean t-norms whose members are also strict
functions. Very often, this family of t-norms is also called the family of fundamental t-norms because of the
role it plays in several applications. In this paper, optimization of a linear objective function with fuzzy
relational inequality constraints is investigated. The feasible region is formed as the intersection of two
inequality fuzzy systems defined by frank family of t-norms is considered as fuzzy composition. First, the
resolution of the feasible solutions set is studied where the two fuzzy inequality systems are defined with
max-Frank composition. Second, some related basic and theoretical properties are derived. Then, a
necessary and sufficient condition and three other necessary conditions are presented to conceptualize the
feasibility of the problem. Subsequently, it is shown that a lower bound is always attainable for the optimal
objective value. Also, it is proved that the optimal solution of the problem is always resulted from the
unique maximum solution and a minimal solution of the feasible region. Finally, an algorithm is presented
to solve the problem and an example is described to illustrate the algorithm. Additionally, a method is
proposed to generate random feasible max-Frank fuzzy relational inequalities. By this method, we can
easily generate a feasible test problem and employ our algorithm to it.
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
Underwater detector network is one amongst the foremost difficult and fascinating analysis arenas that
open the door of pleasing plenty of researchers during this field of study. In several under water based
sensor applications, nodes are square measured and through this the energy is affected. Thus, the mobility
of each sensor nodes are measured through the water atmosphere from the water flow for sensor based
protocol formations. Researchers have developed many routing protocols. However, those lost their charm
with the time. This can be the demand of the age to supply associate degree upon energy-efficient and
ascendable strong routing protocol for under water actuator networks. During this work, the authors tend
to propose a customary routing protocol named level primarily based routing protocol (LBRP), reaching to
offer strong, ascendable and energy economical routing. LBRP conjointly guarantees the most effective use
of total energy consumption and ensures packet transmission which redirects as an additional reliability in
compare to different routing protocols. In this work, the authors have used the level of forwarding node,
residual energy and distance from the forwarding node to the causing node as a proof in multicasting
technique comparisons. Throughout this work, the authors have got a recognition result concerning about
86.35% on the average in node multicasting performances. Simulation has been experienced each in a
wheezy and quiet atmosphere which represents the endorsement of higher performance for the planned
protocol.
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
This research paper examined and re-evaluates the technological innovation, theory, structural dynamics
and evolution of Pill Camera(Capsule Endoscopy) technology in redirecting the response manner of small
bowel (intestine) examination in human. The Pill Camera (Endoscopy Capsule) is made up of sealed
biocompatible material to withstand acid, enzymes and other antibody chemicals in the stomach is a
technology that helps the medical practitioners especially the general physicians and the
gastroenterologists to examine and re-examine the intestine for possible bleeding or infection. Before the
advent of the Pill camera (Endoscopy Capsule) the colonoscopy was the local method used but research
showed that some parts (bowel) of the intestine can’t be reach by mere traditional method hence the need
for Pill Camera. Countless number of deaths from stomach disease such as polyps, inflammatory bowel
(Crohn”s diseases), Cancers, Ulcer, anaemia and tumours of small intestines which ordinary would have
been detected by sophisticated technology like Pill Camera has become norm in the developing nations.
Nevertheless, not only will this paper examine and re-evaluate the Pill Camera Innovation, theory,
Structural dynamics and evolution it unravelled and aimed to create awareness for both medical
practitioners and the public.
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
Path finding algorithm addresses problem of finding shortest path from source to destination avoiding
obstacles. There exist various search algorithms namely A*, Dijkstra's and ant colony optimization. Unlike
most path finding algorithms which require destination co-ordinates to compute path, the proposed
algorithm comprises of a new method which finds path using backtracking without requiring destination
co-ordinates. Moreover, in existing path finding algorithm, the number of iterations required to find path is
large. Hence, to overcome this, an algorithm is proposed which reduces number of iterations required to
traverse the path. The proposed algorithm is hybrid of backtracking and a new technique(modified 8-
neighbor approach). The proposed algorithm can become essential part in location based, network, gaming
applications. grid traversal, navigation, gaming applications, mobile robot and Artificial Intelligence.
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
The Major Occupation in India is the Agriculture; the people involved in the Agriculture belong to the poor
class and category. The people of the farming community are unaware of the new techniques and Agromachines, which would direct the world to greater heights in the field of agriculture. Though the farmers
work hard, they are cheated by agents in today’s market. This serves as a opportunity to solve
all the problems that farmers face in the current world. The eAgro crop marketing will serve as a better
way for the farmers to sell their products within the country with some mediocre knowledge about using
the website. This would provide information to the farmers about current market rate of agro-products,
their sale history and profits earned in a sale. This site will also help the farmers to know about the market
information and to view agricultural schemes of the Government provided to farmers.
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
This Paper provides a brief description of the Genetic Algorithm (GA), the Simulated Annealing (SA)
Algorithm, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm and attempts to
explain the way as how the Proposed Genetic Algorithm (GA), the Proposed Simulated Annealing (SA)
Algorithm using GA, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm can be
employed in finding the best solution of N Queens Problem and also, makes a comparison between these
four algorithms. It is entirely a review based work. The four algorithms were written as well as
implemented. From the Results, it was found that, the Proposed Genetic Algorithm (GA) performed better
than the Proposed Simulated Annealing (SA) Algorithm using GA, the Backtracking (BT) Algorithm and
the Brute Force (BF) Search Algorithm and it also provided better fitness value (solution) than the
Proposed Simulated Annealing Algorithm (SA) using GA, the Backtracking (BT) Algorithm and the Brute
Force (BF) Search Algorithm, for different N values. Also, it was noticed that, the Proposed GA took more
time to provide result than the Proposed SA using GA.
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
In recent years, the complex event processing technology has been used to process the VANET’s temporal
and spatial event streams. However, we usually cannot get the accurate data because the device sensing
accuracy limitations of the system. We only can get the uncertain data from the complex and limited
environment of the VANET. Because the VANET’s event streams are consist of the uncertain data, so they
are also uncertain. How effective to express and process these uncertain event streams has become the core
issue for the VANET system. To solve this problem, we propose a novel complex event query language
PSTeCEQL (probabilistic spatio-temporal constraint event query language). Firstly, we give the definition
of the possible world model of VANET’s uncertain event streams. Secondly, we propose an event query
language PSTeCEQL and give the syntax and the operational semantics of the language. Finally, we
illustrate the validity of the PSTeCEQL by an example.
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
Now a day enormous amount of data is getting explored through Internet of Things (IoT) as technologies
are advancing and people uses these technologies in day to day activities, this data is termed as Big Data
having its characteristics and challenges. Frequent Itemset Mining algorithms are aimed to disclose
frequent itemsets from transactional database but as the dataset size increases, it cannot be handled by
traditional frequent itemset mining. MapReduce programming model solves the problem of large datasets
but it has large communication cost which reduces execution efficiency. This proposed new pre-processed
k-means technique applied on BigFIM algorithm. ClustBigFIM uses hybrid approach, clustering using kmeans algorithm to generate Clusters from huge datasets and Apriori and Eclat to mine frequent itemsets
from generated clusters using MapReduce programming model. Results shown that execution efficiency of
ClustBigFIM algorithm is increased by applying k-means clustering algorithm before BigFIM algorithm as
one of the pre-processing technique.
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
Software testing is a testing which conducted a test to provide information to client about the quality of the
product under test. Software testing can also provide an objective, independent view of the software to
allow the business to appreciate and understand the risks of software implementation. In this paper we
focused on two main software testing –mutation testing and mutation testing. Mutation testing is a
procedural testing method, i.e. we use the structure of the code to guide the test program, A mutation is a
little change in a program. Such changes are applied to model low level defects that obtain in the process
of coding systems. Ideally mutations should model low-level defect creation. Mutation testing is a process
of testing in which code is modified then mutated code is tested against test suites. The mutations used in
source code are planned to include in common programming errors. A good unit test typically detects the
program mutations and fails automatically. Mutation testing is used on many different platforms, including
Java, C++, C# and Ruby. Regression testing is a type of software testing that seeks to uncover
new software bugs, or regressions, in existing functional and non-functional areas of a system after
changes such as enhancements, patches or configuration changes, have been made to them. When defects
are found during testing, the defect got fixed and that part of the software started working as needed. But
there may be a case that the defects that fixed have introduced or uncovered a different defect in the
software. The way to detect these unexpected bugs and to fix them used regression testing. The main focus
of regression testing is to verify that changes in the software or program have not made any adverse side
effects and that the software still meets its need. Regression tests are done when there are any changes
made on software, because of modified functions.
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork compression and multiple query synthesis at the base-station and modification of query syntax
through introduction of Static Variables. These approaches are general approaches which can be used in
any WSN irrespective of application.
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
Accurate and realistic estimation is always considered to be a great challenge in software industry.
Software Cost Estimation (SCE) is the standard application used to manage software projects. Determining
the amount of estimation in the initial stages of the project depends on planning other activities of the
project. In fact, the estimation is confronted with a number of uncertainties and barriers’, yet assessing the
previous projects is essential to solve this problem. Several models have been developed for the analysis of
software projects. But the classical reference method is the COCOMO model, there are other methods
which are also applied such as Function Point (FP), Line of Code(LOC); meanwhile, the expert`s opinions
matter in this regard. In recent years, the growth and the combination of meta-heuristic algorithms with
high accuracy have brought about a great achievement in software engineering. Meta-heuristic algorithms
which can analyze data from multiple dimensions and identify the optimum solution between them are
analytical tools for the analysis of data. In this paper, we have used the Harmony Search (HS)algorithm for
SCE. The proposed model which is a collection of 60 standard projects from Dataset NASA60 has been
assessed.The experimental results show that HS algorithm is a good way for determining the weight
similarity measures factors of software effort, and reducing the error of MRE.
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
Mining biological data is an emergent area at the intersection between bioinformatics and data mining
(DM). The intelligent agent based model is a popular approach in constructing Distributed Data Mining
(DDM) systems to address scalable mining over large scale distributed data. The nature of associations
between different amino acids in proteins has also been a subject of great anxiety. There is a strong need to
develop new models and exploit and analyze the available distributed biological data sources. In this study,
we have designed and implemented a multi-agent system (MAS) called Agent enriched Quantitative
Association Rules Mining for Amino Acids in distributed Protein Data Banks (AeQARM-AAPDB). Such
globally strong association rules enhance understanding of protein composition and are desirable for
synthesis of artificial proteins. A real protein data bank is used to validate the system.
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer Science & Technology. Over the last decade, there has been an explosion in the field of computer science to solve various problems from mathematics to engineering. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of interest include, but are not limited to the following:
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
In this paper, we analyze the evolution of a small-world network and its subsequent transformation to a
random network using the idea of link rewiring under the well-known Watts-Strogatz model for complex
networks. Every link u-v in the regular network is considered for rewiring with a certain probability and if
chosen for rewiring, the link u-v is removed from the network and the node u is connected to a randomly
chosen node w (other than nodes u and v). Our objective in this paper is to analyze the distribution of the
maximal clique size per node by varying the probability of link rewiring and the degree per node (number
of links incident on a node) in the initial regular network. For a given probability of rewiring and initial
number of links per node, we observe the distribution of the maximal clique per node to follow a Poisson
distribution. We also observe the maximal clique size per node in the small-world network to be very close
to that of the average value and close to that of the maximal clique size in a regular network. There is no
appreciable decrease in the maximal clique size per node when the network transforms from a regular
network to a small-world network. On the other hand, when the network transforms from a small-world
network to a random network, the average maximal clique size value decreases significantly
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
DOI:10.5121/ijfcst.2013.3501 1
SECURE FILE MANAGEMENT SYSTEM FOR
JAVA CARDS
Reza Asgari and Reza Ebrahimi Atani
Department of Computer Engineering, University of Guilan, Rasht, Iran
ABSTRACT
Today, smart cards are widely ingrained in human life and its use in various applications for
authentication, Storage and processing of sensitive information is inevitable. One of the most important
parts in the design of smart cards is their operating system, in more precisely their file management system.
In this paper, Design and implementation of a secure and dynamic file management system, that we call
SDFS, for Java cards will be evaluated. The SDFS has high compatibility with international standards
ISO/IEC 7816 that enable it to use in different operating systems that designed for java cards. To enhance
system performance in different uses and future developments, SDFS is completely designed modular.
Modular design provides easy configuration for developers in different situations. SDFS by using secure
cryptographic protocols provides security of storing and processing of information for users.
Implementation results in NetBeans IDE 7.2 show high efficiency and security of new file system in
practical usage.
KEYWORDS
File Management System, Smart Card Operating Systems, Java Card, ISO/IEC 7816
1. INTRODUCTION
Although smart card technology has been available for many decades, it is only in the last few
years that they have become widely considered as one of the most common secure computing
devices. They are encountered in a number of applications (e.g. secure wireless access in mobile
networks, banking, identification) satisfying a diverse range of uses. As a matter of fact, in the
issue of smart cards security as the most important factor have different aspects: hardware
security, security of communication protocols and coding algorithm and proper implementation
of the embedded operating system in the card [1].
File management system is one of the most important and vital modern operation systems which
should be as fast and reliable as possible. In smart cards, management system can be designed
either as a part of the card or as a separate system which works beside the operating system. In
fact, not only does the operating system allow the writing and reading the files, but also enables it
to have access to the data under the very special and controlled conditions [1,2,3].
Most of the file management systems for smart cards follow a hierarchy and tree-like pattern like
the Linux does and despite their initial structures have a symbolic addressing system which is
dependent of the physical addressing. File systems in smart cards have some features that are
designed for a structure with a limited memory. For example, prevention of large data as much as
possible, no need for an inter human-machine medium. Furthermore, free spaces resulted of
deleting one file is not necessarily given to the other files and all the addressing is based on
hexadecimal system and all the programs use rational addressing [4].
2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
2
Some of the challenges in file management systems are quick response, reliability and efficient
management of the memory. This study is going to declare the designing stages and
implementation if a dynamic and secure file management system (SDFS) for operating systems
based on Java cards. In fact, the main goal is to design an efficient file management system with
the following features:
Acceleration the performing the orders of operating system and applications in access
to the files
Increasing the security of access to the memory and preventing of unauthorized
applications to each other’s information.
Preventing of access to sensitive and important information like keys and PINs saved
on the card
Compatibility with different applications and operating systems designed for Java
cards
High level of reliability in the case of error in the system and assurance of maintaining
the files in the card in a stable situation.
Dynamism of the system in producing a new file or deleting the current files
The ability of simple configuration of the file management system to be used in
different usage
In this research we evaluate the specifications of the SDFS. Basic concepts regarding the Java
card and international standards of the file systems in smart cards are explained in the part 2 of
the article. In continue, SDFS’s specifications, designing methods and implementation are stated
in the part 3 and 4. Discussion and evaluation also mentioned in the parts 5 and at the end of this
article conclusion and future works have been included.
2. JAVA CARD
By definition in [5] “Java Cards are pocket-size cards equipped with an embedded micro-
controller that supports the execution of a Java Virtual Machine”. These cards are usually used in
different areas such as credit and loyalty systems, health care, electronic cash, e-government, etc.
programs in Java cards are formed from a set of Java applets in a package which fetch a set of
library classes and could be installed on a card to be used.
Java card technology has a secure commentator and a several-program platform in which one can
take advantage of a variety of benefits of using Java programming like object oriented
programming, reusing of the designed programs, strongly typed language, interoperability which
means writing once and using everywhere, and the several level accessibility control system for
methods and variables [6]. Utilizing this structure has two advantages for Java cards: portability
and familiarity. In fact, Java programs are portable in all the different implementation of the Java
cards which are developed by other producers. On the other hand, since the other programmers
are familiar with the Java language, it is much easier to write and develop a program under Java
cards in comparison with the other cards [3].
One of the most eminent features of the Java card is its security model which gives a high level of
flexibility to the card’s developer as a controlling level on the applets and objects on the card.
Bytecode evaluator which forms a part of the transformer seeks to assure that none of the
programs are using the resources out of its authority. Transformed applets, known as CAP, are
registered as a developing packet and use a security key i.e., DES, which card check it once the
CAP file is being loaded [3]. To check it in the loading time, Java card used a firewall software
mechanism which explicitly joins the object to its applet and prevents of other applets’ access [5].
3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
3
These two security mechanisms together allow the developer of the card to design a security
structure which enables the multi-program cards to be developed with one or more programs and
load the canals and have an acceptable security level for other programs.
Java card system relies upon a Java Card Routine Environment (JCRE) to develop the resources,
run the programs and applying an access controlling mechanism. JCRE is part of the Java card
which should be prepared by the manufacturer of the Java card. It consists of a local operating
system, Java Card Virtual Machine (JCVM) and several Application Programming Interfaces
(APIs). Structure of java card is shown in Figure 1.
Figure 1. Basic Structure of java card [3].
As said earlier, most of the operating systems have a modern file structure. In modern file
structures, files are performed in an object-oriented way which means that the file’s information
is saved in the file itself. Therefore, each file is consisted of two parts: the header part and the
body. In the header part, some info about the file format and access way to the info is saved. This
info never changes and is saved toward deleting. However, the info in the body of the file
includes the operator’s information or other application programs and can be changed repeatedly.
Files are usually formed and numbered during the production and after that, just a limited changes
are done in the contents. While using a card, a file might become active or inactive. Mostly, the
info in the smart cards is permanent and not deleted. However, there are a few operating systems
which do not follow this feedback operation. Programs’ files are saved on the EEPROM memory
which becomes activate after making a file on the Java card. This file can be selected by different
programs to be in access. Choosing a file means activating it and deactivating the other files.
After being activated, one can get access to the file’s contents. A file becomes activate and
inactivate again and again. Files, if supported by the operating system, can be deleted from a card
through special commands. When a card is destroyed, the life of all its files comes to an end.
A file in the smart card has a reverse tree structure similar to the Linux. A sample of this structure
is shown in Figure 2. There are two main files: Dedicated file (DF) and Elementary File (EF). At
the top of the tree, there is a master file which is kind of a DF and considered as the root of the
tree. By each operating the card, MF becomes implicitly activated. In fact, MF is a special kind of
DF which has all the information of the directories, files and all the areas to access the card.
Smart Card Hardware
Java Card Virtual Machine
Java Card Class Library
Applet
A Secure
Applet/File
Download
Applet
B
Applet
C
Native Applications
File Management SystemCard Operating System
4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
4
Figure 2. Sample file structure in smart cards
DF file can embed other files of DF and EF. There is a special kind of DF called Application DF
(ADF) which keeps all the programs’ information and could be considered a special MF.
According to the ISO/IEC 7815 a tree can be extended as much as the memory allows. EF retains
the information of an operator for a special program and has two types: Inter EF to save the
internal data of the operating system and programs, and Working EF for data and programs
which should be read or written by a terminal [7, 9].
In object-oriented systems, one should first select the file to have access to its contents. In this
system, each time just one file can be selected which means a successful selection of a new file
the previous one would be invalid. Access to a file is through its name and each file must have a
name. This name must be perceivable amongst the files of the same level so as to for several files
with the same name the selecting file algorithm by the operating system could be independent of
the searching algorithm [1].
Different policies are defined for access to each of the files. MF can be called everywhere. In
addition, in the beginning of the card operation, this file can be implicitly selected. DF can be
accessed by the MF and the other same-level DFs. EF can be just called by the father MF or DF.
3. SECURE FILE MANAGEMENT SYSTEM
In SDFS memory is divided into segments with fixed length, called pages. Information about a
file can be stored in one or more page. SDFS manage and store files with pointers, page table
(PT) and child table (CT). To increase the security of information, pages are assigned randomly to
the files. This work by creating intentional irregularity in memory causing that in the attacks that
memory is read by attacker, finding information about the memory structure to be more difficult
for attackers. The file manager holds a list of empty memory pages to assign it to a file when need
it. Only the file manager has access to these information and other applications should have
access to their information with authentication.
5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
5
CTs allow the file system when adding a file to the file tree, the tree is no longer need to update
the parent data of the file and only is needed to add one entry to its CT. After restarting the card,
SDFS select the MF automatically. In this structure, each DF refers to its CT via a pointer. CT
contains information about location of the file children. Each EF is connected to its PT that
contains address of file pages in memory. Using this table helps SDFS to allocate new page to the
file easily and prevent from external fragmentation in memory. Also when SDFS delete a file,
then file pages can be allocated to other programs. This structure exhibited in Figure 3.
Figure 3. A sample implementation of file tree, that shown in Figure 2, in SDFS
All information about the programs and codes are stored in the elementary files. Unlike files in
windows, EFs on the smart card have an internal structure that is defined in according to the file
target. This feature allows the data components to be accessed very fast and efficient.
All memory accesses will be done only through the file management system, this work prevent
illegal access to the memory. Figure 4 illustrates how to manage accesses to memory. Steps of
running commands in SDSF described in the follow:
All applications or operating system commands to access the memory should be sent to
the file manager unit.
Input command is sent to the command interpreter unit through the file manager unit.
If the command is successfully interpreted, command interpreter unit send information
related to the command to the file manager unit. Otherwise, warning and error center unit
send a message proportional to the occurred error to output
After extracting information from the command, file manager unit send a message to
security policy manager unit. Security policy manager unit has a duty to check the
security policy defined for the selected file and input requests. If the access request is not
6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
6
consistent with the defined policies, the file manager is announced. Otherwise security
policy manager return an appropriated error message.
File manager checks the returned answer from the security policy manager unit. If the
response is an error, file manager return a warning message via warning and error center
unit to the output. Otherwise file manager based on the security modes are defined in
system, a request for checking keys, encrypting or decrypting input data to be sent to
cryptography and key management unit.
Cryptography and key management unit has duty to perform encryption/decryption
operations and key management. This unit checks file manager requests and after
performing cryptographic operations return appropriate answer to it.
Figure 4. Input instructions management in SDFS
If previous step done without any errors, the file manager will send the required
information to the memory manager unit. Otherwise, warning and error center unit return
an appropriated error message to output.
Memory manager unit has duty to converting logical addresses to physical memory
addresses and controlling legal accesses to memory addresses. If an error occurs, the error
is sent to output through the warning and error center unit. Otherwise, via memory
interface unit requested operations are performed in memory.
7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
7
Memory interface unit is an interface between memory manager and memory and has
duty to access memory cells. Memory interface unit after performing operations on
memory return appropriate answer to memory manager.
If the memory manager will receive an error message from the memory interface, an error
is sent to output through the warning and error center unit. Otherwise it returns the results
to the file manager.
If necessary, file manager send the obtained information to cryptography and key
management unit.
After these processes, file manager unit delivers the results of input request to the user,
operating system or application.
Three types of security policy is considered in SDFS: public security (including general security
policy), file specific security (including security policies such as access rules associated with a
particular file), and instruction specific security (related to security policies applied for before,
during and after execution of an instruction).
SDFS supports the standard cryptographic algorithms including AES, DES, Triple-DES, RSA,
and SHA-1 [6, 7] and allows to operating system developers based on their needs select suitable
cryptography algorithm in configuration time. In addition, conditions are provided to developers
that they can easily implement their own cryptography algorithms and use them in SDFS.
Usually the smart card operating systems cede responsibility of authentication process to
applications. This work can cause security problems on smart cards [8]. SDFS using
authentication method that described in [8, 10], with slightly modified for compatibility with
SDFS, for ensure the accuracy of the authentication process. This work ensures developers that
don’t worry about design, implementation, test and evaluation of theirs communication protocol.
In In this method, for each user (application) that aims to establish a secure connection with
system we need to have a public key certificate on the card.
The authentication operation is briefly as follows:
Request for communication starts from the user (application). The request is sent to card
via a message.
In the second step the user and card agree on a temporary common session key CSK.
Algorithm using Diffie-Hellman key exchange algorithm for doing this work. After this
stage, the parties have agreed on one key for encryption operations but still not
authenticate each other.
After agreeing on a common key, user hash own public key certificate by a hash function
(using the algorithm RSA) and send it to the card.
Card compare certificate that submitted by user with user certificate that stored in card. If
the certificate was approved and user has legal access, then card create an encrypted
message M, with user public key, and send it to the user. M obtained from random
number R, key K that obtained from hashed CSK by using hash function F1 and card
serial number S.
User decrypts M with his private key and extracts R as R’, K and S. user generate key K’,
that obtained from hashed CSK by hash function F1, and compare it with K. If K and K’
are equal then user can confirm the identity of the card.
After authentication card by user, user generates temporary key Kt by using function F.
User encrypt R’ and final session key, that used for future communications, with Kt and
send it to the card.
8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
8
Card regenerate key Kt by function F and decrypt user message. Card extract R’ from
user message and compare it with R, if R and R’ are equal then card can confirm the
identity of the user. User and card using final session key for future communications.
Using this work will ensure the parties that the message has not retransmitted by an intermediate
(attacker). If all steps are executed successfully, the session key help card and user can have a
secure connection for the exchange of information.
4. IMPLEMENTATION
Implementation of SDFS has been done by using the NetBeans IDE 7.2, which use java card
manager Tool that provides functionality to manage content loaded on smart cards of java card
technology. Contains APDU manager which enables sending of APDU commands to card or
JCWDE simulator [12]. For maximum compatibility with existing operating systems, SDFS is
designed and implemented completely modular and based on the international standards so each
file system features in one module can easily be added to, or removed from the system.
Modular implementation of system allow us to easily configure the SDFS suit to our needs and
paved the way for future developments. To avoid programming faults in a configuration of SDFS,
a GUI for system configuration is designed. This interface allows the system designer to choose
the required properties.
SDFS can have a separate encryption mechanism so that the operating system and applications
can benefit from it (For example, the technique that used in the authentication). Based on this,
possibility of select a default cryptography and hash algorithms is provided for designers and
developers. If user selects this option, SDFS defined cryptographic classes as standard structure
(The input and output parameters and functions name) for programmers that they can easily write
their own codes and don't need to know about other parts of file system.
To review a practical example, the paper will continue to investigate the CREATE FILE
command. This command has the task of creating a file in the defined path in file tree. With the
correct run of the command, SDFS assign required memory to the file. Immediately after creating
the file, file system select the file. APDU format in SDFS is as Figure 5 and Figure 6 represent a
command for creating an EF file exactly under the MF in file tree that shown in Figure 2.
Figure 5. APDU format in SDFS is standard APDU format that defined in international standard ISO/IEC
7816. CLA represent class byte of instruction; Instruction encoded by INS; P1-P2 indicates controls and
options for processing the command; Lc encode the number of bytes in the command data field; Data field
contain data value of instruction; Le encode the maximum number of bytes expected in the response data
field; Response Data contain card answer to the request; Status bytes denoted SW1-
SW1-SW2
Response
Data
LeDataLcP1-P2INSCLA
←2 B →←Nr B →
←0,1,2 or 3 B
→
←Nc B
→
←0,1 or 3 B
→
←2 B→←1 B →←1 B →
9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
9
SW2
Figure 6. Create an EF under the MF in file tree that shown in Figure 2. The picture is part of java card
console windows in NetBeans IDE. The status bytes SW1-SW2: 9000 means that the command
successfully done.
5. DISCUSSION AND EVALUATION
The results of our practical experience in execution different commands of SDFS show that
between 69% to 86% of running time is related to cryptographic algorithms. These results
Obtained from the average Ratio of executing commands without using cryptographic algorithms
to commands using cryptographic algorithms (software implementation) in different conditions
and with repeated 100 times. Therefore selecting a fast cryptographic algorithm could greatly
enhance the speed of execution. However should be noted that taking a fast encryption algorithm
does not lead to low levels of system security.
Since some of cryptographic algorithms such as DES or SHA-1 can implement on java card
hardware, therefore choose of embedded cryptographic algorithms can greatly enhance execution
speed. In addition to support this type of cryptographic algorithms (implemented using library
functions to run on hardware), the file system provide conditions that designers and developers
can use of their desire cryptographic algorithms (however, due to the structure defined for the
cryptographic class in configuration time).
Another key feature proposed for the file system is reliability. SDFS ensuring the reliability of the
system with the following characteristics:
File system by using a secure key management system ensures that only programs that
have a legal condition can access to a particular file.
The file system by using information encryption and random allocation of memory
pages ensures that if memory data disclosed, by attacks like full memory read attack,
information of applications stay highly safe. Although we can't fully ensure that
information remains confidential, but it can helps to information to be highly safe.
Files that are in the steady state before failures occur shouldn’t be damaged. SDFS
with temporary storage of changes in journal file ensure that until a transaction
successful not complete, files don't change.
Card ready to use
Select SDFS
Create file INS:E0
File Data that used by
SDFS for create and
initialize header and
body of new file
10. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
10
If system crash, file system journaling technique help to ensure the recovery of
damaged file and lead to stable state.
Keys and PINs are sensitive information that security of other information in memory largely
depend on it. Based on this, file system using secure one-way hash algorithms to ensure that
sensitive data can’t be recovered under any circumstances.
The algorithm was introduced using one-way and two-way authentication and agrees on a session
key to provide establishing a secure connection. This structure provides the possibility of
communicating with different keys for each session with storing a certificate key. The file system
allows when need to change keys of an application, after authentication, application keys can
rewrite by file system (Except for special cases where the key is stored on ROM memory).
Although the algorithm is slower than the simple exchange of keys for authentication, but using
this method greatly increases the security of the authentication and prevent many attacks like man
in the middle attacks. Also, since the different steps of the algorithm using functions on standard
algorithms such as RSA, if using the authentication algorithm in cards that have hardware
implementation of cryptographic algorithms, execution speed will improve greatly.
One of the goals in SDFS design is design a comprehensive file management system that can be
used in all Java card operating systems or as a separate application. Based on this, system design
and implementation is completely modular.
File system is compatible with existing international standards of smart card (especially ISO /
IEC 7816) and as much as possible tried to made high consistency between the implementation of
commands and standards. Also modular structure allows the programmers to define and
implement their cryptographic algorithms and use them in SDFS (by consider predefined format
of input and output). For simplicity and to avoid possible faults in the configuration steps, a
graphical interface designed to help users to configure DFS based on their needs.
To enhance the software code security, from point of information flow security at run-time on
smart cards, different configurations of file systems have been analyzed by JCSI (Java Card
Secure Information flow) [11]. JCSI is a tool for checking secure information flow in Java Card
applications. The tool performs a static analysis of Java Card CAP files. The analysis is based on
the theory of abstract interpretation and on a multi-level security policy assignment. Actual values
of variables are abstracted into security levels, and bytecode instructions are executed over an
abstract domain. This tool used for discovering security issues due to explicit or implicit
information flows and for checking security properties of SDFS.
6. CONCLUSION
This article deals with a new file management system for Java Cards. Dynamics and safety are
features of this new file management system (SDFS). SDFS allows to system developers for
configure file System with their needs. Using of cryptography algorithms and key management
system in SDFS enables it to provide high level of security commensurate with the needs of users.
As well as use of a modular structure in system design allow developers to use of their intended
encryption algorithms in control conditions.
The authors intend to continue this process to design and implement a dynamic and secure
operating system for java cards. The new operating system will be designed, like SDFS, fully
compatible with java cards until users can simply configure the operating system according to
their needs to having a safe and secure operating system.
11. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
11
REFERENCES
[1] Keith, E., & Konstantinos M., (2008) Smart Cards, Tokens, Security and Applications, Springer.
[2] Rankal, W., & Effing, W., (2010) Smart Card handbook 4th edition, Wiley & Sons Publishing.
[3] Hendry, M., (2007) Multi Application Smart Cards Technology and Applications, Cambridge
University Press.
[4] Gustavo, B., Cristina, C., Nora, S., & Tasistro, A., (1999) “Specification of a Smart Card Operating
System”, International Workshop on Types for Proofs and Programs, pp. 77-93.
[5] (2003) “Identification cards — Integrated circuit cards — Part 4: Organization, security and
commands for interchange”, International Organization for Standardization and the International
Electrotechnical Commission.
[6] Eisenbarth, T., & Kumar, S., (2007) “A Survey of Lightweight-Cryptography Implementations”,
Design & Test of Computers, Vol. 24, pp. 522 – 533.
[7] Bart, P., (2007) “A survey of recent developments in cryptographic algorithms for smart cards”,
Computer Networks, Vol. 51, pp. 2223–2233.
[8] Konstantinos, R., & Konstantinos, M., (2004) “An Asymmetric Cryptography Secure Chanel Protocol
for Smart Cards”, 19th International Information Security Conference, France, pp. 22-27.
[9] Karger, P., McIntosh, S., Palmer, E., Toll, D., & Weber, S., (2011) “Lessons Learned Building the
Caernarvon High-Assurance Operating System”, Security & Privacy, IEEE, Vol. 1, pp. 22-30.
[10] Scherzer, H., Canetti, R., Karger, P. A., Krawczyk, H., Rabin, T., Toll, D. C., (2003) “Authenticating
Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card”, Computer
Security – ESORICS, Springer, pp 181-200.
[11] Marco, A., Cinzia, B., Nicoletta, F., & Paolo, M., (2012) “JCSI: A tool for checking secure
information flow in Java Card applications”, Systems and Software, Vol. 85, pp. 2479-2493.
[12] http://plugins.netbeans.org/plugin/10935/java-card-manager.
Authors
Reza Asgari
Reza Asgari was born in Iran, Ghazvin. He recieved his BSc degree from university of
Guilan, Iran in 2011. He is now MSc student at university of Guilan, Iran. His research
interests in operating system and database security.
Reza Ebrahimi Atani
Reza Ebrahimi Atani received his BSc degree from university of Guilan, Rasht, Iran in
2002. He also recieved MSc and PhD degrees all from Iran University of Science and
Technology, Tehran, Iran in 2004 and 2010 respectively. Currently, he is the faculty
member and assistant professor at faculty of engineering, University of Guilan. His
research interests in cryptography, computer security, network security, information
hiding and VLSI design.