Spelling suggestions: "subject:"verver"" "subject:"cerver""
61 |
Open Source SIP Application Servers For IMS Applications: A SurveyKumlin, Veronica January 2007 (has links)
<p>I ett IMS-nät (IP Multimedia Subsystem) finns Applikations Servrar (AS) som tillhandahåller tjänster, dessa AS är ofta SIP-servrar (Session Initation Protocol).</p><p>Målet för det här examensarbetet var att finna den SIP-server som är mest lämpad att använda när man ska lägga till en tjänst i ett IMS-nät.</p><p>Först gjordes en undersökning av tillgängliga SIP AS och ett tiotal hittades. Några av dem valdes ut för att jämföras och utredas mer noggrant. Inledningsvis inspekterades deras dokumentation, sedan analyserades proceduren att installera AS och att lägga till en tjänst på dem. Till sist lades tjänsten till i ett IMS-nät.</p><p>Eftersom varken deras fördelar eller nackdelar utmärkte sig på ett sådant sett att någon av dem sammantaget var bättre än den andra, kunde tyvärr inte någon av dem pekas ut som den mest lämpade.</p> / <p>In an IMS (IP Multimedia Subsystem) network there are Application Servers (ASs) which host and execute services. These are often SIP (Session Initiation Protocol) servers. The goal for this thesis was to evaluate a selection of open source SIP ASs to see which one was most suited for IMS service development.</p><p>Ten different SIP ASs was found in an initial search. They were briefly reviewed and some of them were chosen as candidates for further investigation.</p><p>The documentation of the chosen servers were thoroughly explored and evaluated; as was the installation process and how to deploy a service to them.</p><p>Finally the servers were installed and a service was implemented and deployed to an IMS network.</p><p>Unfortunately, I could not point out one of the ASs to be more suited than another for deploying an IMS service on. This was because they had different pros and cons and none of them were distinguishing in a way that made them superior to the other.</p>
|
62 |
Der Mailbox-Server in ProduktionRichter, Frank 26 April 2000 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und
Professur Rechnernetze und verteilte Systeme (Fakultaet fuer
Informatik) der TU Chemnitz.
Workshop-Thema: Infrastruktur der ¨Digitalen Universitaet¨
Der Vortrag stellt Konzept und Eigenschaften
des seit Dezember 1999 im Einsatz befindlichen
Mailboxservers der TU Chemnitz vor.
Es werden Erfahrungen und Pläne vorgestellt.
|
63 |
Bankweites Wertschöpfungspotential einer Informatik-Plattform : eine Modellbetrachtung am praktischen Beispiel unter besonderer Berücksichtigung des integrierten Kundenbetreuer-Arbeitsplatzes im Retail Banking und von Verrechnungsaspekten /Wicki, Louis-Paul. January 1996 (has links)
Thesis (doctoral)--Universität St. Gallen, 1996.
|
64 |
Interneto serverių apsaugos priemonių tyrimas / Security tools analysis for Internet ServersŽabinskas, Vidas 01 June 2004 (has links)
Transferring the activities to electronic space, each Internet user could be involved in a risk that the information accessed and transmitted by network might be read, retrieved and, supposedly, trespassed. Therefore, the preventive protection of personal computer and computer system security is relevant in order security gaps in a computer system would appear as less as possible.
Subject of the Work: “PC Security” Internet service website designated to check-out personal computer system security by users on their own.
Goal of the Work: computer security measures analysis and computer security control system development.
The current study contain the analysis of measures that support system to be more attack-resistant: rules necessary for network security resistance; information coding measures; actions disturbing normal system operation; actions to be undertaken in case of successful intruder attack. Requirements for the models of Internet server security and testing system were set therein. Observing the aforementioned requirements computer system security testing system was designed and implemented, system testing carried out, and system user specifications described. For flexibility purposes two check-out options were involved in the testing system: system user performs the computer IP testing himself/herself or testing is performed by a system operator with report sending.
This particular testing system should be very useful for the users because the latter would be... [to full text]
|
65 |
Integrating SciSPARQL and MATLABHe, Xueming January 2014 (has links)
Nowadays many scientific experiment results involve multi-dimensional arrays. It is desirable to store these results in a persistent way and make queries against not only well-structured data objects like arrays but also the metadata that describe the experiments. SPARQL is a Semantic Web standard query language for data and metadata stored in terms of RDF. SciSPARQL is an extended version of SPARQL designed for scientific applications. It includes numeric multi-dimensional array operations and user-defined functions. The SciSPARQL Database Manager (SSDM) is a query processing engine for SciSPARQL. MATLAB is a popular and powerful scientific computing application programming language. We implemented an interface between MATLAB and SciSPARQL called MATLAB SciSPARQL Link (MSL). MSL provides SciSPARQL queries in MATLAB through a client/server interface. It optionally also provides an interface to enable calls to MATLAB in SciSPARQL queries. With MSL MATLAB users can populate, update, and query SSDM databases it in terms of SciSPARQL queries. For the implementation we use C interfaces of MATLAB and SSDM, and the networking capabilities of SSDM. The DLL we made extends MATLAB with MSL interface functions.
|
66 |
Serverių saugumo užtikrinimo sistema Šiaulių valstybinei kolegijai / Server Security System for Šiauliai State CollegePachomov, Artiom 02 July 2012 (has links)
Šiame darbe analizuojami populiarūs įsilaužimo būdai, apsaugos būdai bei viena įdomesnių apsaugos sprendimų technologijų. Taikant įprastus apsaugos būdus, yra analizuojamas naujas apsaugos būdas ir jo galimybės kurios padės efektyviau apsaugoti serverio nuotolinį administravimą ir palengvinti programinės apsaugos įrangos naudojimą, nereikalaujant didelių papildomų finansinių kaštų. / This project is about computer network server security vulnerabilities, basic security options and “Honey Pot” technology solution. This project analyzes by applying basic security options to the presented system, how it makes remote administration security more effective, making it easier and more reliable as well as not requiring big financial investments.
|
67 |
Attack on WiFi-based Location Services and SSL using Proxy ServersFeng, Jun Liang 02 January 2014 (has links)
Wireless LANs are very common in any household or business today. It allows access to their home or business network and the Internet without using wires. Their wireless nature allows mobility and convenience for the user and that opens up a lot of new possibilities in mobile devices such as smartphones and tablets. One application that makes use of wireless LANs is positioning, which can be used in areas where Global Positioning Systems may have trouble functioning or not at all. However, a drawback of using wireless communication is that it is susceptible to eavesdropping and jamming. Once the wireless signal is jammed, an attacker can set up fake access points on different channels or frequencies to impersonate a legitimate access point. In this thesis, this attack is performed specifically to trick WiFi-based location services. The attack is shown to work on Skyhook, Google, Apple and Microsoft location services, four of the major location service providers, and on dual-band hardware. Some countermeasures to such an attack are also presented.
The web is an important part of many people???s lives nowadays. People expect that their privacy and confidentiality is preserved when they use the web. Previously, web traffic uses HTTP which meant traffic is all unencrypted and can be intercepted and read by attackers. This is clearly a security problem so many websites now default to using a more secure protocol, namely HTTPS which uses HTTP with SSL, and forces the user to HTTPS if they connect to the no SSL protocol. SSL works by exchanging keys between the client and server and the actual data is protected using the key and the cipher suite that is negotiated between the two. However, if a network uses a proxy server, it works slightly different. The SSL connection is broken up into two separate ones and that creates the potential for man-in-the-middle attacks that allow an attacker to intercept the data being transmitted. This thesis analyzes several scenarios in which an adversary can conduct such a man-in-the-middle attack, and potential detection and mitigation methods.
|
68 |
Webserver Betrieb, Sicherheit, CodebeispieleHofer, Reinhard January 2006 (has links)
Zugl.: Eisenstadt, Fachhochsch.-Studiengänge Burgenland, Diplomarbeit, 2006
|
69 |
Architectures for service differentiation in overloaded internet servers /Voigt, Thiemo. January 2002 (has links)
Diss. Uppsala : Univ., 2002.
|
70 |
Algorithmische Aspekte der Fluid-Struktur-Wechselwirkung auf kartesischen GitternBrenk, Markus. January 2007 (has links)
Stuttgart, Univ., Diss., 2007. / Druckausg. beim Logos Verl., Berlin erschienen.
|
Page generated in 0.0375 seconds