Joined-up government depends fundamentally on semantics---on the computable representation of meaning, so that data is associated with appropriate metadata from the start, and this association is maintained as the data is manipulated.... more
Joined-up government depends fundamentally on semantics---on the computable representation of meaning, so that data is associated with appropriate metadata from the start, and this association is maintained as the data is manipulated. This paper summaries a tutorial and workshop on semantic technologies for supporting electronic government.
The connection of an internal network to an external network such as Internet has made it vulnerable to attacks. One class of network attack is unauthorized penetration into network due to the openness of networks. It is possible for an... more
The connection of an internal network to an external network such as Internet has made it vulnerable to attacks. One class of network attack is unauthorized penetration into network due to the openness of networks. It is possible for an attacker or hackers to sum access to an internal network, this pose great danger to the network and network resources. Our objective and major concern of network design was to build a secured network, based on software firewall that ensured the integrity and confidentiality of information on the network. We proposed an Object-Oriented Methodology and developed an improved software based solution that allows all the inbound and outbound traffic to pass through the firewall. The firewall in turn determines which traffic should be allowed in or out of the network. The firewall algorithm was implemented using Java programming language, which was based on java security architecture. It also utilizes the concept of XML and HTML programming which enables ne...
—Recently the world of web applications has witnessed a huge wave of attacks that caused a lot of web applications to get defaced and for a lot of businesses to lose financially and to lose the integrity between those companies and their... more
—Recently the world of web applications has witnessed a huge wave of attacks that caused a lot of web applications to get defaced and for a lot of businesses to lose financially and to lose the integrity between those companies and their users .since web hacking became common knowledge on the Internet and most of the defacements that happens on daily basis are going under a random way, the security specialists are trying to get new solutions that will help reduce the possibility of causing much damage to web applications even after the process of infiltration. In this research an enhanced web application solution was proposed, which is a validation and integrity component that can be easily installed on any web application firewall (WAF), in order to help in solving the problem mentioned and raise the level of trust between user's and web application hosts/owners also restore the lost data caused by hacking attempts in simple and systematic way.