National Informatics Center

Hyderabad, India

National Informatics Center

Hyderabad, India

Time filter

Source Type

Pyarelal S.,National Informatics Center | Das A.K.,Indian Institute of Technology Guwahati
Smart Innovation, Systems and Technologies | Year: 2017

The E-Government Systems built for Government to Citizen (G2C) services are with the objective of providing quality services, in the minimum possible time. The user experience of a citizen begins from the time of receiving the information about a service and its benefits and accessing the service through multiple channels to the final interaction with the system itself. The end-to-end experience of the interaction that the citizen has with the system can be termed as the human-system or human-computer interaction (HCI). The different stages combine to form the user experience. This paper highlights the present challenges in the existing Government Websites, focused for those under the Government of Assam and the efforts being taken by the Government of Assam in ‘Standardization of Websites’. It takes into consideration many important aspects but key among them being: the role that the interaction nature of citizens play while designing such citizen-facing websites: what are the deeper problems in the system that is preventing its wider usage; how the citizens interact with the system and their experience in terms of usability, usefulness and the level of satisfaction; are the interaction patterns of the service delivery to the users adequate. Are the services being provided in the right manner; do the citizens get what they look for in the minimum time with minimal efforts. Since there are many departments within the Government of Assam, how does one resolve the question that the user is within the Government of Assam website and not out of it? The principles for establishing a generic framework for building effective, interactive and usable systems are brought out in this paper so that these can be embedded during the design stage life cycle of systems. © Springer Nature Singapore Pte Ltd. 2017.

Gosain A.,Guru Gobind Singh Indraprastha University | Arora A.,National Informatics Center
Procedia Computer Science | Year: 2015

As Data Warehouse store huge amount of data with the span of more than decades, the security of this huge information base is crucial for the sustainability and reliability of data warehouse. Since its advent the data warehouse has gone through various technological changes, which has prompted changes in the security strategies as well. This article, is taking a deep look at the various changes in the security mechanisms of the Data Warehouse, along with the changes in the strategies for the data warehouse development. It helps in understanding the various security aspects related to Data Warehouse, in coherence with the different methodologies employed for its development and functioning. © 2015 The Authors. Published by Elsevier B.V.

Elekar K.S.,National Informatics Center
IEEE International Conference on Computer Communication and Control, IC4 2015 | Year: 2015

As Internet continues to influence our day to day activities like eCommerce, eGoverence, eEducation etc. the threat from hackers has also increased. Due to which many researcher thinking intrusion detection systems as fundamental line of defense. However, many commercially available intrusion detection systems are predominantly signature-based that are designed to detect known attacks. These systems require frequent updates of signature or rules and they are not capable of detecting unknown attacks. One of the solution is use of anomaly base intrusion detection systems which are extremely effective in detecting known as well as unknown attacks. One of the major problem with anomaly base intrusion detection systems is detection of high false alarm rate. In this paper, we provide solution to increase attack detection rate while minimizing high false alarm rate by combining various data mining techniques. © 2015 IEEE.

Das R.K.,National Informatics Center | Patra M.R.,Berhampur University
International Journal of Electronic Governance | Year: 2010

This paper puts forth our experience while implementing the 'e-Grama' project in one of the relatively developed districts of Orissa Province in India which was later extended to other underdeveloped districts of the province. Further the paper describes how the project helped as a tool to bridge the digital divide and capacity building in the rural areas. It also highlights the role of youth clubs and NGOs in the successful implementation of the project. Further, it is shown how the problems encountered during project implementation in the rural areas could be solved through the public-private-people partnership model of 'e-Grama'. © Copyright 2010 Inderscience Enterprises Ltd.

Kundu A.,National Informatics Center
2012 International Conference on Informatics, Electronics and Vision, ICIEV 2012 | Year: 2012

The paper introduces a decentralized chat system (developed in J2SE - Java Server Edition) for both intranet and internet. It is a zero-configuration model allowing users to simply run the application to communicate. Core to the system is an index table which notifies each user about the presence of other peers using the application over the network. Features include: Simultaneous communication between 'n' numbers of peers, multi-user communication invitees, conference, and file transfer between two peers. The communication system is based on simple Socket programming with IP and Port Address being detected by the Index. The user interface is prepared using Swing and AWT functionality. © 2012 IEEE.

Banik S.,Technical University of Denmark | Jha S.,National Informatics Center
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

Over the past few years, an attractive design paradigm has emerged, that aims to produce new stream cipher designs, by combining one or more independently produced RC4 states. The ciphers so produced turn out to be faster than RC4 on any software platform, mainly because the average number of internal operations used in the cipher per byte of keystream produced is usually lesser than RC4. One of the main efforts of the designers is to ensure that the existing weaknesses of RC4 are not carried over to the new ciphers so designed. In this work we will look at two such ciphers RC4B (proposed by Zhang et. al.) and Quad-RC4/m-RC4 (proposed by Maitra et. al.). We will propose distinguishing attacks against all these ciphers, and look at certain design flaws that made these ciphers vulnerable. © Springer International Publishing Switzerland 2015.

Muttoo S.K.,University of Delhi | Kumar V.,National Informatics Center
International Journal of Information Security and Privacy | Year: 2010

In this paper, an algorithm to embed information in a map along Hamiltonian path is presented. A file based data structure in which a graph is treated as a composition of three components, node, segment and intermediate points that constitute a segment, is used to store a graph. In a map with N nodes, each node can repre sent ⌈log 2N⌉ bits from message bit strings. Any bits (≥ 0) from message between bit strings represented by adjacent nodes are embedded in a segment. In the case of a multi graph, a segment is selected based on the last two bits in the nodes. A pre Hamiltonian path is determined in the map starting from node represented by the first ⌈log 2N⌉ bits from message string to the last bit string ⌈log 2N⌉. The method is tested on different maps and messages of different sizes and robust results have been observed. Retrieval is based on the key (S, |m|, Σ) and traversing along the pre Hamiltonian path starting from node S. Copyright © 2010, IGI Global.

Sharma R.,Himachal Pradesh University | Sood M.,Himachal Pradesh University | Sharma D.,National Informatics Center
Communications in Computer and Information Science | Year: 2011

Cloud computing, a more recent computing paradigm, has evolved from a variety of legacy technologies that include Service oriented Architecture (SOA) and Web services besides several others. The software services in a cloud must be developed based on the service-oriented approach, in order to derive their full potential and benefits. Since, SOA inherently nurtures interoperability; it will enhance the integration and interaction among the cloud software services. Also, leveraging the Model Driven Architecture (MDA) approach to develop individual cloud software services will result in services that are more robust, flexible and agile in the wake of ever changing technologies. This paper is an attempt by the authors to lay emphasis on the convergence of Cloud computing, SOA and MDA in development of optimum business solutions. © 2011 Springer-Verlag.

Gosain A.,Guru Gobind Singh Indraprastha University | Arora A.,National Informatics Center
Communications in Computer and Information Science | Year: 2016

Data Warehouse (DW) security has emerged as a crucial aspect since for the sake of high availability data warehouses started connected to internet. In order to comply with the security requirements, the authentication of legitimate users by verification of user credentials like username, password, etc. has become a standard. On successful verification, different variations of Role Based Access Control (RBAC) techniques are being used restricting user access to the facts and dimensions. But these RBAC’s can only restrict the user access as per their respective roles and there is no check on the behavior pattern of the user access. In this paper, a two level signature based behavior analysis model has been introduced to keep a check on the user’s access pattern. At the first level, the user provides its authentication credentials. On successful verification of these credentials, the user has been allowed to access elements as per its role. Once the user tries to access the DW elements his access pattern will be recorded to form usage access signature. Over the period of time user access profile is created which is used to match the signature of the user. If in case, the user’s signature does not fit in the user access profile created over the period of time, the second level of verification will be performed in a form of secret question etc. The user query will be processed only on successful clearing of the second authentication level; else the current query will be suspended with regret message from the system. This further strengthens the security of the DW even on the compromise of the user’s initial entry credentials. © Springer Nature Singapore Pte Ltd. 2016.

National Informatics Center | Date: 2011-05-24

Computer software, namely, for collaborative use with computer aided design and computer aided manufacturing which can be accessed via a global computer network.

Loading National Informatics Center collaborators
Loading National Informatics Center collaborators