Bit-Oriented Control Procedures for Computer-to-Computer Communications Systems

Computer ◽  
1973 ◽  
Vol 6 (2) ◽  
pp. 27-31 ◽  
Author(s):  
Brian Tymann
2020 ◽  
Vol 11 (2) ◽  
pp. 371
Author(s):  
Ola Muhammad Khersiat

This study aimed to measure the efficiency of employing the internal control components based on COSO framework to transparently carry out tasks and services, ensure integrity and enhance quality and efficiency, so as to contribute to promoting the adoption of internal control components based on the COSO framework, applying them and analyzing their efficiency in performing tasks transparently, ensuring integrity and enhancing quality and efficiency, particularly with the Amman`s Municipality efforts to create a directorate that operates the internal control while ensuring the integrity of the proceedings, carrying out tasks and services transparently and boosting citizen's confidence in the Greater Amman Municipality resolutions. One of the main findings of the study would be in the fact that the independent study variables represented in the internal audit based on the COSO framework has a highly positive impact in performing tasks transparently to ensure integrity, boost quality and efficiency at the Greater Amman Municipality. Results show that the communications systems component was the most highly applicable, followed by the follow-up and control procedures and activities, whereas the control environment came third, followed by risks and response procedures identification and assessment, and finally came the appropriate follow-up component in the fifth place.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Chingfang Hsu ◽  
Lein Harn ◽  
Shan Wu ◽  
Lulu Ke

Secret sharing (SS) schemes have been widely used in secure computer communications systems. Recently, a new type of SS scheme, called the secure secret reconstruction scheme (SSRS), was proposed, which ensures that the secret can only be recovered by participants who present valid shares. In other words, if any outside adversary participated in the secret reconstruction without knowing any valid share, the secret cannot be recovered by anyone including the adversary. However, the proposed SSRS can only prevent an active attacker from obtaining the recovered secret, but cannot prevent a passive attacker from obtaining the secret since exchange information among participants is unprotected. In this paper, based on bivariate polynomials, we propose a novel design for the SSRS that can prevent both active and passive attackers. Furthermore, we propose a verification scheme which can verify all shares at once, i.e., it allows all shareholders to efficiently verify that their shares obtained from the dealer are generated consistently without revealing their shares and the secret. The proposed scheme is really attractive for efficient and secure secret reconstruction in communications systems.


2012 ◽  
Vol 86 (3) ◽  
pp. 527-549 ◽  
Author(s):  
Christopher McDonald

The current scholarly consensus argues that business failure results from the misalignment of a company's strategy and its environment. The case of Western Union, however, suggests that a third element—momentum—is also part of the explanation for companies' failures. The weight of historically accumulated systems, skills, and workers constrains the speed with which managers can adapt their strategy to the environment. Momentum stood in the way of Western Union's attempt to place itself at the center of the growing world of computer communications systems.


2015 ◽  
Vol 33 (4) ◽  
pp. 768-777 ◽  
Author(s):  
Benjamin G. Lee ◽  
Nicolas Dupuis ◽  
Petar Pepeljugoski ◽  
Laurent Schares ◽  
Russell Budd ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document