i-Meliore
  Use i-Meliore's e-Learning center to browse articles, white papers and research papers on technologies that make a difference today and that can be used to build the systems of tomorrow






 

e-Learning Center
Project Management
Risk Management
Software Engineering
Privacy
Research

Client Resources
Log-In
Sign Up
Newsletter Subscription



e-Learning: Research

Business Uses of Peer to Peer (P2P) Technologies
Business to Business (B2B) trade is a potentially huge use of the Internet. The initial solutions to this via independent aggregating hubs are now being discredited as the early movers fail to generate revenue. The various alternatives of Industry Sponsored Markets (ISM), Private markets, Supply chain automation and others have their own problems particularly in the areas of content management, scalability and privacy. Almost all the thinking around this has been in terms of straight line value chains, or one to many aggregation dominated by big business. The smaller players and Small to Medium Enterprises (SME) have largely been ignored. It is now being realized that successful internet B2B systems are going to have to reflect the constantly shifting web of interconnections that characterizes business trade. While this has been happening, the end of 2000 saw an explosion of interest in P2P systems driven by the huge take up of Napster and the large amounts of press this generated. While Napster (and it’s clones) was all about finding and transferring files directly between clients, there are several ideas in this area which may well have application to B2B trade. This document examines some of the current problems in B2B systems and explores ways in which a P2P approach might solve them. This is summarized in a brief proposal for a business P2P system that allows trade to happen directly between partners rather than via central hub.

Detection of Promiscuous Nodes Using ARP packets
On a local network, security is always taken into consideration. When plain text data is being sent onto the network, it can be easily stolen by any network user. Stealing data from the network is called sniffing. By sniffing the network, a user can gain access into confidential documents and cause intrusion into anyone's privacy. Many freely distributed software on the Internet provide this functionality. Despite the easiness of sniffing, there is no good way to detect such malicious act yet. This document explains the mechanism used by PromiScan, a piece of software that can effectively scan sniffers on the network.

Security in a Web Services World: a Proposed Architecture and Roadmap
Securing E-Business

This document describes a proposed strategy for addressing security within a Web service environment. It defines a comprehensive Web service security model that supports, integrates and unifies several popular security models, mechanisms, and technologies (including both symmetric and public key technologies) in a way that enables a variety of systems to securely interoperate in a platform- and language neutral manner. It also describes a set of specifications and scenarios that show how these specifications might be used together.

The Cloud is a Scary Place -- a Strategy for Small- and Medium-sized Companies to Deploy Web-based Applications
What’s the point of Internet security? As IBM’s Lou Gerstner put it, "More than any other single factor, the potential of e-commerce hinges on people's confidence that the network can keep confidential transactions confidential, and private records private." Yet despite the critical importance of Internet security, the market has not yet built an ideal Web security product for the small- to medium-sized company. Before specific practices for deploying Web-based security solutions can be recommended, it is necessary to assess the need for Internet security, and to determine which factors are crucial to the development of those solutions.
 

 

  Submit an RFP to receive a quote and a proposal (click here).  
  Questions/Comments? Email us for more information at .