REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS

Abstract

Important software applications need to be secured by choosing the suitable security services. In this paper, a shopper program is designed and implemented using VB.NET to follow up the movement of goods in the store and the shopping place. The program uses five files to store: the passwords, the information of goods in the store and the shopping place. A literature review is carried out to collect the information system and software trade-offs. The applied security services are then analyzed in light of these trade-offs. For security purposes, files and folders are hidden and files are set to Read-Only. The files' contents are encrypted by applying XOR operation with a random key generator. The file's contents are hashed and signed by the user to protect the integrity and authenticity of the files' contents. The applied security services do not result in much complexity and thus it does not affect the system resources. The program usability is easy to handle. The software is not freely available and in case of hunting a copy, it would be hard to run it without disclosing the needed keys. Applying the Arabic letter coding adds more credit to the program usability and availability.

Authors and Affiliations

Kamel Hussein Rahouma

Keywords

Related Articles

AFRICAN BUFFALO OPTIMIZATION

This is an introductory paper to the newly-designed African Buffalo Optimization (ABO) algorithm for solving combinatorial and other optimization problems. The algorithm is inspired by the behavior of African buffalos, a...

PREDICTING THE EFFECTIVENESS OF WEB INFORMATION SYSTEMS USING NEURAL NETWORKS MODELING: FRAMEWORK & EMPIRICAL TESTING

The information systems (IS) assessment studies have still used the commonly traditional tools such as questionnaires in evaluating the dependent variables and specially effectiveness of systems. Artiļ¬cial neural network...

EFFECTS OF VIDEO DISPLAY TERMINAL RESOLUTIONS TO THE LEGIBILITY OF TEXT ON A WEB PAGE

Higher Video Display Terminal (VDT) resolutions have been proven to provide better quality in improving image quality displayed. The higher the resolution means more pixels per-inch-square available to display an image....

PERFORMANCE EVALUATION OF SELECTED DISTANCE-BASED AND DISTRIBUTION-BASED CLUSTERING ALGORITHMS

Clustering is an automated search for hidden patterns in a datasets to unveil group of related observations. The technique is one of the viable means by which the patterns or internal structure of the data within the sam...

PERFORMANCE EVALUATION OF SINGLE-PATH AND MULTIPATH MANETS ROUTING PROTOCOLS FOR DENSE AND SPARSE TOPOLOGY

Mobile Ad Hoc Network (MANET) is a multi-hop wireless network in which fixed infrastructure is not used. A single-path routing protocol is mainly proposed as a single route from source node to destination node, while a m...

Download PDF file
  • EP ID EP254104
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Kamel Hussein Rahouma (2017). REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS. International Journal of Software Engineering and Computer Systems, 3(1), 71-87. https://europub.co.uk/articles/-A-254104