As a one-stop source for all IT security needs, www.darkreading.com delivers timely news, malware alerts, product reviews and technical analysis for the urgent minded security professional. With original research, insightful opinion and our close affil...
Stiftung Secure Information and Communication Technologies SIC offers a wide range of cryptography- and security-related Java products, covering all aspects of data and communication security.
Penrose is a java-based virtual directory server. Virtual directory enables federating (aggregating) identity data from multiple heterogeneous sources like directory, databases, flat files, and web services - real-time - and makes it available to identity consumers via LDAP.
VELO is an Open Source Identity and Access Provisioning server.
Features
* SPML V2 compliance. new!
* Role Based Access Control (RBAC)
* Consolidated Employee Identity Attributes repository
* Accounts Attribute Synchronization
* User and Access Reconciliations
* Integrated work-flow engine for complex business processes
* Self Service interfaces
* Support many resources
* Support Complete Account Operations
* Specific typed actions can be added easily
* Centralized Password Policy and Password Synchronization.
* Auditing & Compliance.
* Powerful scripting support for complex processes via Scripting expressions
* Supports more than 20 different scripting languages! new
* Remote services access via Web-Services.
* Extensible via Events.
* Advanced Report Designer & Web-based Reporting Manager.
* Pluggable Authentication Handlers.
* Jboss and Glassfish Support
JUG is a pure java UUID generator, that can be used either as a component in a bigger application, or as a standalone command line tool (a la 'uuidgen'). UUIDs are 128-bit Universally Unique IDentifiers (aka GUID, Globally Unique IDentifier used in Windows world).
JUG generates UUIDs according to the IETF UUID draft specification (and further clarified in UUID URN name space IETF draft ) – all 3 'official' types defined by the draft – is fast, portable and Open Source (as well as Free Software ).
You can use JUG in your application according to the license terms of LGPL (Lesser General Public License); or, from version 2.0 on, ASL . See Download page for more details.
From version 1.0.0 on, native code (invoked via JNI) for accessing Ethernet MAC address is included with Jug distribution. Big thanks to Paul Blankenbaker and DJ Hagberg (amongst others) for their code contributions!
Note that using this functionality is optional: only time+location - based generation needs MAC address, and even with it, one can just pass the address from a configuration file.
Currently JNI-based Ethernet MAC address support is available on following platforms:
* Linux / x86
* Windows (98, ME, NT, 2K, XP?) / x86
* Solaris / Sparc
* Mac OS X
* FreeBSD / x86
Note: if anyone can recompile Mac OS X JNI code on Open/NetBSD and try if if it works, that would be useful (FreeBSD JNI code was compiled this way).
D. Arora, N. Jha, S. Ravi, и A. Raghunathan. Design Automation Conference, (2005)Could this soultion suggest us some interesting<br/>approach to DPM monitoring techniques?.
V. Atluri, и J. Warner. SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, стр. 49--58. New York, NY, USA, ACM Press, (2005)
R. Baker, и I. Martinovic. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, стр. 35--46. New York, NY, USA, ACM, (2016)
D. Balzarotti, M. Monga, и S. Sicari. Quality of Protection: Security Measurements and
Metrics, том 23 из Advances in Information Security, Springer, New York, (июня 2006)
Basha, Abdulreda, и Hatem. IRJCS:: International Research Journal of Computer Science, Volume VI (Issue III):
38-46(марта 2019)1. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, pp. 599-616, 2009. 2. P. Mell and T. Grance, "The NIST definition of cloud computing," 2011. 3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., Ä view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, 2010. 4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., Äbove the clouds: A berkeley view of cloud computing," Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley2009. 5. I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008. GCE'08, 2008, pp. 1-10. 6. B. Hayes, "Cloud computing," Communications of the ACM, vol. 51, pp. 9-11, 2008. 7. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, et al., "The eucalyptus open-source cloud-computing system," in Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International Symposium on, 2009, pp. 124-131. 8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 23-50, 2011. 9. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, Ä break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2008. 10. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, pp. 176-189, 2011. 11. A. D. Basha, I. N. Umar, and M. Abbas, "Mobile applications as cloud computing: implementation and challenge," International Journal of Information and Electronics Engineering, vol. 4, p. 36, 2014. 12. C. Shravanthi and H. Guruprasad, "Mobile cloud computing as future for mobile applications," International Journal of Research in Engineering and Technology, vol. 3, pp. 2319-2322, 2014. 13. N. Patil, N. Patil, A. Bagal, M. Desai, and A. Bhosale, "Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing." 14. A. D. Basha, "Modeling E-Learning Readiness among Instructors in Iraqi Public Universities," Universiti Sains Malaysia, 2015. 15. K. Patil and S. Patil, Ä CASE STUDY ON MOBILE CLOUD COMPUTING." 16. M. A. Mahmod, A. B. M. Ali, A. R. B. Ahlan, A. Shah, and M. S. A. Seman, "E-learning in Iraqi universities: A review," in Computing, Engineering, and Design (ICCED), 2017 International Conference on, 2017, pp. 1-4. 17. A. D. Basha, S. H. Mnaathr, I. N. Umar, and R. Jamaludin, "Insight on Protection of Universities Networks Information Security: The Problems and the Solutions," 2013. 18. E. M. Morgado and R. Schmidt, "Increasing Moodle resources through cloud computing," in Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, 2012, pp. 1-4. 19. M. Wang, Y. Chen, and M. J. Khan, "Mobile cloud learning for higher education: A case study of Moodle in the cloud," The International Review of Research in Open and Distributed Learning, vol. 15, 2014. 20. V. Siládi and V. Mižúrová, "LMS Moodle on Computing Cloud," in 4th Interantional Scientific Conference in V4 Countries, Applied Natural Sciences, Trnava, 2013. 21. V. Kumar and D. Sharma, "Creating Collaborative and Convenient Learning Environment Using Cloud-Based Moodle LMS: An Instructor and Administrator Perspective," International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 11, pp. 35-50, 2016. 22. N. Sclater, "eLearning in the Cloud," International Journal of Virtual and Personal Learning Environments, vol. 1, pp. 10-19, 2012..
K. Becker, G. Stumme, R. Wille, U. Wille, и M. Zickwolff. Knowledge Engineering and Knowledge Management. Methods, Models, and Tools., том 1937 из LNAI, стр. 352-365. Heidelberg, Springer, (2000)
K. Becker, G. Stumme, R. Wille, U. Wille, и M. Zickwolff. Knowledge Engineering and Knowledge Management. Methods, Models, and Tools., том 1937 из LNAI, стр. 352-365. Heidelberg, Springer, (2000)
K. Becker, G. Stumme, R. Wille, U. Wille, и M. Zickwolff. Knowledge Engineering and Knowledge Management Methods, Models, and Tools, том 1937 из Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)