Marn-Ling Shing

Learn More
Teaching a mathematics foundation course such as Discrete Mathematics for an information technology curriculum is always a challenge. The challenge involves with identifying students' mathematical background early and then use different teaching techniques in the classroom. Besides, an even bigger challenge is that many topics have to be covered in a short(More)
—There are many possible threats in nowadays computer networks when they are connected to Internet. There are many different defense strategies against those threats. This paper proposes to use a mixed strategy among those defense strategies for unknown chances of threats occurrence based on the game theory approach. The results showed that the mixed(More)
In a simplified secured database access model, privileged group and public group can access data with any distribution. In order to secure the database, the confidentiality policy must be applied. Often, the management of the database privacy is neglected because data integrity has a higher priority in an environment dealing with insensitive data. This(More)
In an e-commerce environment, databases are accesses constantly. This paper looks into the confidentiality issues involved in a simplified database access. In a simplified secured database access model, there are two groups involved: privileged group and public group which they can access data with any distribution. In order to secure the confidentiality(More)
In a simplified secured database access model, privileged group and public group can access data with any distribution. In order to secure the database, the confidentiality policy must be applied. Often, the management of the database privacy is neglected. This paper looks into the data confidentiality management and suggests to use semi-Markov chains to(More)
  • 1