Virtual Browser: An On-Demand Service
to Prevent Phishing Attacks
-- Swapan Purkait
Phishing has grown significantly in the last decades or so, becoming the most common web threat today. Ranging from security toolbars to web browser add-ons, hundreds of anti-phishing mechanisms currently concentrate on how to inform the user whether the website is fake or not. Our findings reveal that different approaches proposed in the past are all preventive by nature. Phishers continually target the weakest link in the security chain, namely, consumers in their attacks. Various usability studies have demonstrated that neither server-side security indicators nor client-side toolbars and warnings are successful in preventing the vulnerable users from being deceived. In this study, we propose a new mechanism—‘Virtual Browser (VB)’—to counter phishing attacks. Instead of identifying the fake ones, VB will allow access only to the genuine sites. Users will be given an on-demand browsing service over the Internet, where they can remotely connect to a secure server and use pre-configured browsers to securely connect to any websites of their choice. © 2012 IUP. All Rights Reserved.
A Data Mining Approach to Identify Key Factors
for Systematic Reuse
--Satya Ranjan Biswal, Subhendu Kumar Pani and Santosh Kumar Swain
Software reuse has the potential to improve the productivity and quality of software significantly. Systematic reuse is a promising means to reduce the development time and cost of software by leveraging existing reusable software artifacts. There are many factors, both technical and nontechnical, which influence the successful reuse in software development. Identifying as well as adopting these factors in a company-wide reuse practice is essential for project success. Towards this end, data mining is an established approach to extract relevant information in order to aid decision making. In this paper, we have proposed an approach to identify key factors for systematic reuse in software projects using data mining. We have used popular data mining algorithms to discover the most important factors which predict the success and failure of software reuse projects. © 2012 IUP. All Rights Reserved.
Communicative Acts for Argumentation-Based Negotiation
--Ananta Charan Ojha and Sateesh Kumar Pradhan
Negotiation is a technique through which two agents having conflicting interests reach an agreement that is beneficial for both of them. During negotiation, software agents utilize Agent Communication Language (ACL) to specify messages and Interaction Protocol (IP) to sequence these messages. Argumentation-based negotiation is a better form of negotiation wherein one negotiating agent argues with another to justify its position and influences on the other agent to follow it. It increases the likelihood and quality of agreement in a negotiation process. Foundation for Intelligent Physical Agents (FIPA)-ACL, which is a leading standard in agent communication, does not support argumentation scenario yet. In this paper, we propose a set of communicative acts essential for argumentation scenario and present their semantics following the standard. © 2012 IUP. All Rights Reserved.
Implementing Constraints in Entity-Relationship Models
for Enhancing Normalization
-- Deepa Bura and R K Singh
Normalization is a significant aspect of relational database theory. It organizes the data to make the database easy to manage. Normalizing a database enables the user to create relationship strands between the pieces of information and eliminates redundancies. In this paper, an algorithm is presented, which if used in Entity Relationship Diagram (ERD) leads to database that is always be in a normalized form. In this algorithm, some constraints are imposed so that the Entity Relationship (ER) model when mapped to relational database leads to a normalized database. This paper enhances the process of normalization by proposing an algorithm up to the third normal form. © 2012 IUP. All Rights Reserved.
An Overview of Question Answering System
--Muthukrishnan Ramprasath and Shanmugasundaram Hariharan
A couple of decades ago research on Question Answering System (QAS) was started. Presently, there are many QASs available in the world. Still there is a need for development of QAS. The web is increasingly becoming an idle source of answer to different questions because of the tremendous amount of information that is now available online. The paper provides a complete overview of QAS. It presents the Question Answering (QA) task from an information retrieval perception and emphasizes the significance of retrieval models. The study suggests the architecture of QAS, gradually increasing the complexity of representation level of question and information object. © 2012 IUP. All Rights Reserved.
|