Corporate Policy Governance in Secure MD5 DataChanges and Multi Hand Administration

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

Abstract: Policy based management is an administrative approach that simplify the management of a givenendeavor by establishing policies to deal with situation that are likely to occur. Most of the social network andmobile application in today’s world define a very flexible policy that are used by user, easily which allowshacker to intrude in such social network and access user’s private information, hence there is a need of strongpolicy for a social network application. The proposed approach verifies and analyzes the existing similarapplication and arrives at new policies by collaborating with the previous one to enforce security to theapplication and modification can be done with key generated by admin on permission by member. A text miningmethodology proves to be simpler and stronger as more information about the application is not leaked out, itrequires prior permission provided by user to track application information, thus policy admin forms aneffective rule based system.

Authors and Affiliations

M. Saranya , S. Muthukumurasamy

Keywords

Related Articles

 A Comprehensive lossless modified compression in  medical application on DICOM CT images

 In current days, Digital Imaging and Communication in Medicine (DICOM) is widely used for viewing medical images from different modalities, distribution and storage. Image processing can be processed  by pho...

 Correlation Preserving Indexing Based Text Clustering

 In Document clustering previously they presented new document clustering method based on correlation preserving indexing. It simultaneously maximizes the correlation between the documents in the  local patc...

 Data Usage Monitor for a Shared Wireless NetworkConnection

 Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wirelessconnection. The main objective of this technique is to balance and restrict the shared network data. It faci...

 An Overview of Localization for Wireless Sensor Networks

Abstract: Localization is an important issue for location-dependent applications of wireless sensor networks. In Sensor networks, data collected by sensor nodes need to be tagged with time and location information. Local...

Back Office E-Commerce Application for X Store

Abstract: X store is a company which their focus on sales computer accessories. In doing their business process, all sales recorded manually. Their sales using whatsapp, BBM and email for online services. The sales depar...

Download PDF file
  • EP ID EP132263
  • DOI -
  • Views 80
  • Downloads 0

How To Cite

M. Saranya, S. Muthukumurasamy (2015).   Corporate Policy Governance in Secure MD5 DataChanges and Multi Hand Administration. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 18-23. https://europub.co.uk/articles/-A-132263