Idongesit Mkpong-Ruffin

Learn More
Has voting technology ever allowed all segments of the voting population to vote privately, securely and independently with equal access? In short the answer is no. In an effort to address this very issue a usable and secure (usable security), multimodal electronic voting system that allows voters to vote using voice, touch or both was developed, Prime III.(More)
Risk analysis is a process for considering possible risks and determining which are the most significant for any particular effort. Determining which risks to address and the optimum strategy for mitigating said risks is often an intuitive and qualitative process. An objective view of the risks inherent in a development effort requires a quantitative risk(More)
Mr. Wilson never votes. He doesn't vote because he is not confident in his reading capabilities; however, he decided that he will vote this year because he heard that blind people will be able to privately cast their vote. He said, " If blind people can vote, then so can I ". At the voting precinct, he shows his identification and receives a blank, numbered(More)
Java's original security architecture was designed to facilitate the execution of software from remote systems while simultaneously preventing downloaded code from performing unauthorized operations on host machines. The sandbox model of the Java Development Kit (JDK) 1.0's security architecture was found to be too restrictive; therefore the model was(More)
S oftware security deals with the ability to protect software and its underlying systems from being exploited by unauthorized users and from mishaps from authorized users. This includes safeguarding against direct attacks [1], detecting and preventing indirect attacks that take advantage of software defects, removing defects, and preserving the intrinsic(More)
  • 1