- Full text PDF available (3)
With the increase of the software complexity, the defect measurement becomes a task of high priority. We give a new software defect analytical methodology based on orthogonal classification. This method has two folds. Then a set of orthogonal defect classification (ODC) reference model is given which includes activity, trigger, severity, origin, content and… (More)
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey)… (More)
Nowadays data security is making a way into market. New techniques of data security have gained interest of many researchers. Encryption-Decryption technique is one such way of data security. These techniques not only provide confidentiality, integrity of data but also help in authentication of user. Authentication is possible because encryption-decryption… (More)
The Fourth Party Logistics (4PL) information system used today is comprised of disconnected legacy system, and lacks the support for interoperability for whole supply chain integration. This situation often prevents the 4PL provider from fully exploring market opportunities in a timely fashion. To address this problem, we propose an agent-based framework… (More)
Secure mobile payment is the most important link for a mobile phone to realize full payment. At the present stage, there are many researches about security of mobile information in the country. Those researches are mainly based on Windows Mobile, BREW or software of J2ME, and limited to specific areas. On the aspect of the hardware cryptograph, they focus… (More)
teacher to schedule the balance of study and work term.