 |
|
  |
 |
 |
 |
|
Use
i-Meliore's e-Learning center to browse articles, white papers
and research papers on technologies that make a difference today
and that can be used to build the systems of tomorrow  |
 |
 |
|
 |
e-Learning:
Research
Business
Uses of Peer to Peer (P2P) Technologies
Business to Business (B2B) trade is a potentially huge use of the
Internet. The initial solutions to this via independent aggregating
hubs are now being discredited as the early movers fail to generate
revenue. The various alternatives of Industry Sponsored Markets (ISM),
Private markets, Supply chain automation and others have their own
problems particularly in the areas of content management, scalability
and privacy. Almost all the thinking around this has been in terms
of straight line value chains, or one to many aggregation dominated
by big business. The smaller players and Small to Medium Enterprises
(SME) have largely been ignored. It is now being realized that successful
internet B2B systems are going to have to reflect the constantly shifting
web of interconnections that characterizes business trade. While this
has been happening, the end of 2000 saw an explosion of interest in
P2P systems driven by the huge take up of Napster and the large amounts
of press this generated. While Napster (and it’s clones) was
all about finding and transferring files directly between clients,
there are several ideas in this area which may well have application
to B2B trade. This document examines some of the current problems
in B2B systems and explores ways in which a P2P approach might solve
them. This is summarized in a brief proposal for a business P2P system
that allows trade to happen directly between partners rather than
via central hub.
Detection
of Promiscuous Nodes Using ARP packets
On a local network, security is always taken into consideration. When
plain text data is being sent onto the network, it can be easily stolen
by any network user. Stealing data from the network is called sniffing.
By sniffing the network, a user can gain access into confidential
documents and cause intrusion into anyone's privacy. Many freely distributed
software on the Internet provide this functionality. Despite the easiness
of sniffing, there is no good way to detect such malicious act yet.
This document explains the mechanism used by PromiScan, a piece of
software that can effectively scan sniffers on the network.
Security
in a Web Services World: a Proposed Architecture and Roadmap
Securing E-Business
This document describes a proposed strategy for addressing security
within a Web service environment. It defines a comprehensive Web service
security model that supports, integrates and unifies several popular
security models, mechanisms, and technologies (including both symmetric
and public key technologies) in a way that enables a variety of systems
to securely interoperate in a platform- and language neutral manner.
It also describes a set of specifications and scenarios that show
how these specifications might be used together.
The
Cloud is a Scary Place -- a Strategy for Small- and Medium-sized Companies
to Deploy Web-based Applications
What’s the point of Internet security? As IBM’s Lou Gerstner
put it, "More than any other single factor, the potential of
e-commerce hinges on people's confidence that the network can keep
confidential transactions confidential, and private records private."
Yet despite the critical importance of Internet security, the market
has not yet built an ideal Web security product for the small- to
medium-sized company. Before specific practices for deploying Web-based
security solutions can be recommended, it is necessary to assess the
need for Internet security, and to determine which factors are crucial
to the development of those solutions.
|
|
|
 |