REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS
Journal Title: International Journal of Software Engineering and Computer Systems - Year 2017, Vol 3, Issue 1
Abstract
Important software applications need to be secured by choosing the suitable security services. In this paper, a shopper program is designed and implemented using VB.NET to follow up the movement of goods in the store and the shopping place. The program uses five files to store: the passwords, the information of goods in the store and the shopping place. A literature review is carried out to collect the information system and software trade-offs. The applied security services are then analyzed in light of these trade-offs. For security purposes, files and folders are hidden and files are set to Read-Only. The files' contents are encrypted by applying XOR operation with a random key generator. The file's contents are hashed and signed by the user to protect the integrity and authenticity of the files' contents. The applied security services do not result in much complexity and thus it does not affect the system resources. The program usability is easy to handle. The software is not freely available and in case of hunting a copy, it would be hard to run it without disclosing the needed keys. Applying the Arabic letter coding adds more credit to the program usability and availability.
Authors and Affiliations
Kamel Hussein Rahouma
FINGERPRINT WATERMARKING WITH TAMPER LOCALIZATION AND EXACT RECOVERY USING MULTI-LEVEL AUTHENTICATION
This paper presents the tamper localization and exact recovery using multi-level authentication in fingerprint watermarking. The proposed scheme will be detecting the tampered sector of fingerprint images when the waterm...
AN EVALUATION OF IMPROVED CLUSTER-BASED ROUTING PROTOCOL IN AD-HOC WIRELESS NETWORK
In this paper we presents a performance comparison of Dynamic Source Routing (DSR), Ad hoc On Demand Vector (AODV), Cluster Based Routing Protocol (CBRP) and Improved Cluster Based Routing Protocol (i-CBRP) routing proto...
INDONESIAN TEXT-TO-SPEECH SYSTEM USING DIPHONE CONCATENATIVE SYNTHESIS
In this paper, we describe the design and develop a database of Indonesian diphone synthesis using speech segment of recorded voice to be converted from text to speech and save it as audio file like WAV or MP3. In design...
A SMART MONITORING SYSTEM FOR CAMPUS USING ZIGBEE WIRELESS SENSOR NETWORKS
The wireless sensor networks are autonomous sensors that are distributed to monitor environmental and physical conditions and pass them across the network to other areas, which is considered one of the key elements that...
THE DAWN OF METAHEURISTIC ALGORITHMS
Optimization has become such a favored area of research in recent times necessitating the need for technical papers and tutorials that will properly analyze and explain the basics of the field. At the heart of efficiency...