An investigation into unintentional information leakage through electronic publication
- Forrester, Jock, Irwin, Barry V W
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428814 , vital:72538 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/012_Article.pdf
- Description: Organisations are publishing electronic documents on their websites, via email to clients and potentially un-trusted third parties. This trend can be attributed to the ease of use of desktop publishing/editing soft-ware as well as the increasingly connected environment that employ-ees work in. Advanced document editors have features that enable the use of group editing, version control and multi-user authoring. Unfortu-nately these advanced features also have their disadvantages. Metadata used to enable the collaborative features can unintentionally expose confidential data to unauthorised users once the document has been published.
- Full Text:
- Date Issued: 2005
- Authors: Forrester, Jock , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428814 , vital:72538 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/012_Article.pdf
- Description: Organisations are publishing electronic documents on their websites, via email to clients and potentially un-trusted third parties. This trend can be attributed to the ease of use of desktop publishing/editing soft-ware as well as the increasingly connected environment that employ-ees work in. Advanced document editors have features that enable the use of group editing, version control and multi-user authoring. Unfortu-nately these advanced features also have their disadvantages. Metadata used to enable the collaborative features can unintentionally expose confidential data to unauthorised users once the document has been published.
- Full Text:
- Date Issued: 2005
An Open Design and Implementation for the Enabler Component of the Plural Node Architecture of Professional Audio Devices
- Foss, Richard, Fujimori, J I, Okai-Tettey, Harold
- Authors: Foss, Richard , Fujimori, J I , Okai-Tettey, Harold
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427225 , vital:72423 , https://www.aes.org/e-lib/browse.cfm?elib=13327
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. An Open Generic Transporter specification has been developed for the Transporter component. This paper details an open design and implementation for the Enabler component that allows for connection management via abstract, mLAN plugs.
- Full Text:
- Date Issued: 2005
- Authors: Foss, Richard , Fujimori, J I , Okai-Tettey, Harold
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427225 , vital:72423 , https://www.aes.org/e-lib/browse.cfm?elib=13327
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. An Open Generic Transporter specification has been developed for the Transporter component. This paper details an open design and implementation for the Enabler component that allows for connection management via abstract, mLAN plugs.
- Full Text:
- Date Issued: 2005
An Open Generic Transporter Specification for the Plural Node Architecture of Professional Audio Devices
- Foss, Richard, Fujimori, J I, Kounosu, Ken, Laubscher, Ron
- Authors: Foss, Richard , Fujimori, J I , Kounosu, Ken , Laubscher, Ron
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427239 , vital:72424 , https://www.aes.org/e-lib/browse.cfm?elib=13191
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The A/M protocol determines how audio and MIDI data are transported over IEEE 1394 (firewire). The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. Low level control of individual Transporters occurs within the “Hardware Abstraction Layer” (HAL) of the Enabler. Device manufacturers write their own plug-ins for the HAL to interact with their Transporters. The Open Generic Transporter specification provides an open interface between the HAL and Transporter for the convenience of device manufacturers.
- Full Text:
- Date Issued: 2005
- Authors: Foss, Richard , Fujimori, J I , Kounosu, Ken , Laubscher, Ron
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427239 , vital:72424 , https://www.aes.org/e-lib/browse.cfm?elib=13191
- Description: The Plural Node architecture is an implementation architecture for professional audio devices that adhere to the “Audio and Music (A/M)” protocol. The A/M protocol determines how audio and MIDI data are transported over IEEE 1394 (firewire). The Plural-Node implementation architecture comprises two components on separate IEEE 1394 nodes – a “Transporter” component dedicated to A/M protocol handling, and an “Enabler” component that controls the Transporter and provides high level plug abstractions. Low level control of individual Transporters occurs within the “Hardware Abstraction Layer” (HAL) of the Enabler. Device manufacturers write their own plug-ins for the HAL to interact with their Transporters. The Open Generic Transporter specification provides an open interface between the HAL and Transporter for the convenience of device manufacturers.
- Full Text:
- Date Issued: 2005
Comparison of maximal aerobic capacity during running and lifting activities : research article
- Christie, Candice J, Scott, Patricia A
- Authors: Christie, Candice J , Scott, Patricia A
- Date: 2005
- Language: English
- Type: Article
- Identifier: vital:6745 , http://hdl.handle.net/10962/d1009314
- Description: Acknowledging the specificity of assessing maximal output, the purpose of this paper was to compare the physiological and perceptual responses during a traditional running activity and the common industrial task of lifting; both were taken to maximal effort. The responses of eight male participants were measured during both physical activities separated by at least five days: i) a progressive speed protocol (PSP) involved running on a treadmill at increasing speeds, starting at 10 km.h[superscript -1] and increasing by 1 km.h[superscript -1] every minute until exhaustion; ii) a progressive frequency protocol (PFP) required participants to lift a load of 20% body mass at increasing lifting frequencies, starting at one lift every 10s and reducing the time between lifts by 1s every minute until exhaustion. Physiological responses were measured using a portable on-line system, the K4b[superscript 2] (Cosmed(r)). "Central" perceptual measures were obtained every minute using the rating of perceived exertion (RPE) scale. Results: Responses increased progressively with augmented exercise intensity in both protocols; however, oxygen consumption and peak oxygen values were both lower during the lifting protocol compared to the running protocol. In contrast to the oxygen uptake responses, peak RER values were significantly higher during lifting (mean of 1.32) than running (mean of 1.18), while maximal heart rate and perceptual responses revealed no significant difference between the two protocols. These findings caution against using the 'traditional' treadmill protocol to assess the aerobic capacity of manual labourers involved in lifting, as it is evident that the traditional lower body protocol will indicate a higher capacity than the maximum capacity of an upper body activity, which could lead to manual labourers being taxed beyond acceptable limits.
- Full Text:
- Date Issued: 2005
- Authors: Christie, Candice J , Scott, Patricia A
- Date: 2005
- Language: English
- Type: Article
- Identifier: vital:6745 , http://hdl.handle.net/10962/d1009314
- Description: Acknowledging the specificity of assessing maximal output, the purpose of this paper was to compare the physiological and perceptual responses during a traditional running activity and the common industrial task of lifting; both were taken to maximal effort. The responses of eight male participants were measured during both physical activities separated by at least five days: i) a progressive speed protocol (PSP) involved running on a treadmill at increasing speeds, starting at 10 km.h[superscript -1] and increasing by 1 km.h[superscript -1] every minute until exhaustion; ii) a progressive frequency protocol (PFP) required participants to lift a load of 20% body mass at increasing lifting frequencies, starting at one lift every 10s and reducing the time between lifts by 1s every minute until exhaustion. Physiological responses were measured using a portable on-line system, the K4b[superscript 2] (Cosmed(r)). "Central" perceptual measures were obtained every minute using the rating of perceived exertion (RPE) scale. Results: Responses increased progressively with augmented exercise intensity in both protocols; however, oxygen consumption and peak oxygen values were both lower during the lifting protocol compared to the running protocol. In contrast to the oxygen uptake responses, peak RER values were significantly higher during lifting (mean of 1.32) than running (mean of 1.18), while maximal heart rate and perceptual responses revealed no significant difference between the two protocols. These findings caution against using the 'traditional' treadmill protocol to assess the aerobic capacity of manual labourers involved in lifting, as it is evident that the traditional lower body protocol will indicate a higher capacity than the maximum capacity of an upper body activity, which could lead to manual labourers being taxed beyond acceptable limits.
- Full Text:
- Date Issued: 2005
Computers and African languages in education: an ICT tool for the promotion of multilingualism at a South African university: conversations
- Dalvit, Lorenzo, Murray, Sarah, Mini, Buyiswa, Terzoli, Alfredo, Zhao, Xiaogeng
- Authors: Dalvit, Lorenzo , Murray, Sarah , Mini, Buyiswa , Terzoli, Alfredo , Zhao, Xiaogeng
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428911 , vital:72545 , https://hdl.handle.net/10520/EJC87340
- Description: This article describes a web-based application designed to provide meaningful access to the study of Computer Science to speakers of an African language who have limited experience of using English for ac-ademic purposes. Our research is focused upon students of Computer Skills in the Extended Studies Programme at Rhodes University who have studied English as a second language for the matriculation exam-ination. The intervention involves the cooperative production and shar-ing of multilingual support material in both English and the students' home languages. The article illustrates how the use of computers has the potential to solve some of the problems traditionally associated with the use of African languages as additional media of instruction in ter-tiary education (i.e. lack of terminology and resources in the African languages, stigma attached to their use, etc.). We maintain that learning about computers partly in their stronger language (i.e. their home lan-guage) could give students increased and more meaningful access to an educationally and economically empowering field of study.
- Full Text:
- Date Issued: 2005
- Authors: Dalvit, Lorenzo , Murray, Sarah , Mini, Buyiswa , Terzoli, Alfredo , Zhao, Xiaogeng
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428911 , vital:72545 , https://hdl.handle.net/10520/EJC87340
- Description: This article describes a web-based application designed to provide meaningful access to the study of Computer Science to speakers of an African language who have limited experience of using English for ac-ademic purposes. Our research is focused upon students of Computer Skills in the Extended Studies Programme at Rhodes University who have studied English as a second language for the matriculation exam-ination. The intervention involves the cooperative production and shar-ing of multilingual support material in both English and the students' home languages. The article illustrates how the use of computers has the potential to solve some of the problems traditionally associated with the use of African languages as additional media of instruction in ter-tiary education (i.e. lack of terminology and resources in the African languages, stigma attached to their use, etc.). We maintain that learning about computers partly in their stronger language (i.e. their home lan-guage) could give students increased and more meaningful access to an educationally and economically empowering field of study.
- Full Text:
- Date Issued: 2005
Evaluating parts-of-speech taggers for use in a text-to-scene conversion system
- Glass, Kevin R, Bangay, Shaun D
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2005
- Language: English
- Type: Conference paper
- Identifier: vital:6603 , http://hdl.handle.net/10962/d1009323
- Description: This paper presents parts-of-speech tagging as a first step towards an autonomous text-to-scene conversion system. It categorizes some freely available taggers, according to the techniques used by each in order to automatically identify word-classes. In addition, the performance of each identified tagger is verified experimentally. The SUSANNE corpus is used for testing and reveals the complexity of working with different tagsets, resulting in substantially lower accuracies in our tests than in those reported by the developers of each tagger. The taggers are then grouped to form a voting system to attempt to raise accuracies, but in no cases do the combined results improve upon the individual accuracies. Additionally a new metric, agreement, is tentatively proposed as an indication of confidence in the output of a group of taggers where such output cannot be validated.
- Full Text:
- Date Issued: 2005
- Authors: Glass, Kevin R , Bangay, Shaun D
- Date: 2005
- Language: English
- Type: Conference paper
- Identifier: vital:6603 , http://hdl.handle.net/10962/d1009323
- Description: This paper presents parts-of-speech tagging as a first step towards an autonomous text-to-scene conversion system. It categorizes some freely available taggers, according to the techniques used by each in order to automatically identify word-classes. In addition, the performance of each identified tagger is verified experimentally. The SUSANNE corpus is used for testing and reveals the complexity of working with different tagsets, resulting in substantially lower accuracies in our tests than in those reported by the developers of each tagger. The taggers are then grouped to form a voting system to attempt to raise accuracies, but in no cases do the combined results improve upon the individual accuracies. Additionally a new metric, agreement, is tentatively proposed as an indication of confidence in the output of a group of taggers where such output cannot be validated.
- Full Text:
- Date Issued: 2005
Geography of African development : an alternative curriculum
- Authors: Fox, Roddy C
- Date: 2005
- Language: English
- Type: Article
- Identifier: vital:6679 , http://hdl.handle.net/10962/d1006666
- Description: The Geography of African Development module is part of a year-long Third Year level geography course on Africa that has been offered at Rhodes University since 2002. The course is an exception to the dominant trend, both locally and internationally, which has witnessed a major decline in the teaching of regional geography and area studies. This paper examines how adopting a constructivist approach to the module's curriculum enabled learners to develop geographical skills at the same time as Africanising the curriculum.
- Full Text:
- Date Issued: 2005
- Authors: Fox, Roddy C
- Date: 2005
- Language: English
- Type: Article
- Identifier: vital:6679 , http://hdl.handle.net/10962/d1006666
- Description: The Geography of African Development module is part of a year-long Third Year level geography course on Africa that has been offered at Rhodes University since 2002. The course is an exception to the dominant trend, both locally and internationally, which has witnessed a major decline in the teaching of regional geography and area studies. This paper examines how adopting a constructivist approach to the module's curriculum enabled learners to develop geographical skills at the same time as Africanising the curriculum.
- Full Text:
- Date Issued: 2005
Growth, reproduction and population structure of Diplotaxodon limnothrissa in the southeast arm of Lake Malawi
- Kanyerere, Geoffrey Z, Weyl, Olaf L F, Booth, Anthony J
- Authors: Kanyerere, Geoffrey Z , Weyl, Olaf L F , Booth, Anthony J
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124583 , vital:35633 , https://doi.org/10.2989/16085910509503832
- Description: With a surface area of ca 28 800km2, Lake Malawi (9°30’S–14°30’S) is the second largest of the African Rift Valley lakes, supporting at least 500, and possibly 2 000, fish species (Turner 1995). The ichthyofauna is dominated by haplochomine cichlids, most of which are confined to the demersal and littoral zones. As a result of over-fishing, the abundance of many of these species has declined (Turner 1994a, 1995, Bulirani et al. 1999, Allison et al. 2002). In contrast, the lake’s offshore fish stocks are considered to be unexploited or only lightly exploited (Thompson and Allison 1997, Turner et al. 2000) and the redirection of fishing effort to these stocks is a high priority (Thompson and Allison 1997, Turner et al. 2000, Allison et al. 2002). Consequently, the Malawi government is currently collaborating with the African Development Bank to develop the deepwater/ offshore fishery in order to increase yields by an estimated 11 000 tons (MC Banda, National Research co-ordinator, pers. comm.). The most abundant cichlid species in the pelagic zone is the small (<210mm TL) zooplanktivorous Diplotaxodon limnothrissa (Turner 1994, Thompson and Allison 1997). It has been recorded throughout the lake at depths ranging from 20 metres down to the anoxic zone at ca 220 metres (Turner 1994b, Thompson et al. 1996, Duponchelle et al. 2000a) and it makes up ca 52% to the total fish biomass (Thompson and Allison 1997). Diplotaxodon limnothrissa will therefore be a major target species in the pelagic fishery, and already comprises in excess of 50% of the mid-water trawl fishery in the southeast arm (SEA) of the lake (Turner 1996).
- Full Text:
- Date Issued: 2010
- Authors: Kanyerere, Geoffrey Z , Weyl, Olaf L F , Booth, Anthony J
- Date: 2010
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124583 , vital:35633 , https://doi.org/10.2989/16085910509503832
- Description: With a surface area of ca 28 800km2, Lake Malawi (9°30’S–14°30’S) is the second largest of the African Rift Valley lakes, supporting at least 500, and possibly 2 000, fish species (Turner 1995). The ichthyofauna is dominated by haplochomine cichlids, most of which are confined to the demersal and littoral zones. As a result of over-fishing, the abundance of many of these species has declined (Turner 1994a, 1995, Bulirani et al. 1999, Allison et al. 2002). In contrast, the lake’s offshore fish stocks are considered to be unexploited or only lightly exploited (Thompson and Allison 1997, Turner et al. 2000) and the redirection of fishing effort to these stocks is a high priority (Thompson and Allison 1997, Turner et al. 2000, Allison et al. 2002). Consequently, the Malawi government is currently collaborating with the African Development Bank to develop the deepwater/ offshore fishery in order to increase yields by an estimated 11 000 tons (MC Banda, National Research co-ordinator, pers. comm.). The most abundant cichlid species in the pelagic zone is the small (<210mm TL) zooplanktivorous Diplotaxodon limnothrissa (Turner 1994, Thompson and Allison 1997). It has been recorded throughout the lake at depths ranging from 20 metres down to the anoxic zone at ca 220 metres (Turner 1994b, Thompson et al. 1996, Duponchelle et al. 2000a) and it makes up ca 52% to the total fish biomass (Thompson and Allison 1997). Diplotaxodon limnothrissa will therefore be a major target species in the pelagic fishery, and already comprises in excess of 50% of the mid-water trawl fishery in the southeast arm (SEA) of the lake (Turner 1996).
- Full Text:
- Date Issued: 2010
Securing Real-time multimedia: A brief survey
- Cloran, Russell, Irwin, Barry V W, Terzoli, Alfredo
- Authors: Cloran, Russell , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428887 , vital:72543 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Research/020_Article.pdf
- Description: Voice over IP (VoIP) enables cheaper and easier communication but can be less secure than the traditional TDM network. This paper is a guide to securing VoIP networks using current technologies and best practices. Physical and logical segregation of data and multimedia traf-fic is discussed. Current VoIP analysis tools are described with specific reference to their usefulness as a means of evaluating the quality of a secure VoIP system. Protocol enhancements, such as the Secure Re-al-time Transport Protocol and transport layer protection such as of-fered by IPSec, are discussed and evaluated. Finally, various secure VoIP implementation scenarios are discussed, with configurations combining these security solutions presented in the paper.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428887 , vital:72543 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Research/020_Article.pdf
- Description: Voice over IP (VoIP) enables cheaper and easier communication but can be less secure than the traditional TDM network. This paper is a guide to securing VoIP networks using current technologies and best practices. Physical and logical segregation of data and multimedia traf-fic is discussed. Current VoIP analysis tools are described with specific reference to their usefulness as a means of evaluating the quality of a secure VoIP system. Protocol enhancements, such as the Secure Re-al-time Transport Protocol and transport layer protection such as of-fered by IPSec, are discussed and evaluated. Finally, various secure VoIP implementation scenarios are discussed, with configurations combining these security solutions presented in the paper.
- Full Text:
- Date Issued: 2005
Trust on the Web
- Cloran, Russell, Irwin, Barry V W
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428900 , vital:72544 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Full/025_Article.pdf
- Description: This paper forms a backdrop for work investigating trust on the semantic web. With the mass of information currently available on the web, and the low barrier to entry for the publication of information on the web, it can be difficult to classify the au-thority of information found on the web. We use a case study of a suspected phish-ing scam in South Africa to examine the methods an advanced user may use to veri-fy the authenticity of a web site and the information it published. From this case study, we see that a website which is legitimate may easily appear to be a scam, because of the manner in which information is presented and the failure to use es-tablished industry best practices. We discuss a number of ways in which doubt may have been eliminated. We then discuss how a distributed trust system, as favoured by many researchers in trust on the semantic web, may have been implemented in this case to prove the authenticity of the site without the traditional means involv-ing the high cost of a digital certificate from a recognised Certificate Authority.
- Full Text:
- Date Issued: 2005
Unlocking the armour: enabling intrusion detection and analysis of encrypted traffic streams
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Date Issued: 2005
XML digital signature and RDF
- Cloran, Russell, Irwin, Barry V W
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
- Date Issued: 2005
- «
- ‹
- 1
- ›
- »