REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS

Abstract

Important software applications need to be secured by choosing the suitable security services. In this paper, a shopper program is designed and implemented using VB.NET to follow up the movement of goods in the store and the shopping place. The program uses five files to store: the passwords, the information of goods in the store and the shopping place. A literature review is carried out to collect the information system and software trade-offs. The applied security services are then analyzed in light of these trade-offs. For security purposes, files and folders are hidden and files are set to Read-Only. The files' contents are encrypted by applying XOR operation with a random key generator. The file's contents are hashed and signed by the user to protect the integrity and authenticity of the files' contents. The applied security services do not result in much complexity and thus it does not affect the system resources. The program usability is easy to handle. The software is not freely available and in case of hunting a copy, it would be hard to run it without disclosing the needed keys. Applying the Arabic letter coding adds more credit to the program usability and availability.

Authors and Affiliations

Kamel Hussein Rahouma

Keywords

Related Articles

GUESSING, MODEL CHECKING AND THEOREM PROVING OF STATE MACHINE PROPERTIES – A CASE STUDY ON QLOCK

It is worth understanding state machines better because various kinds of systems can be formalized as state machines and therefore understanding state machines has something to do with comprehension of systems. Understan...

DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for comput...

A REVIEW OF SINGLE AND POPULATION-BASED METAHEURISTIC ALGORITHMS SOLVING MULTI DEPOT VEHICLE ROUTING PROBLEM

Multi-Depot Vehicle Routing Problem (MDVRP) arises with rapid development in the logistics and transportation field in recent years. This field, mainly, faces challenges in arranging their fleet efficiently to distribute...

METAMODELLING APPROACH AND SOFTWARE TOOLS FOR PHYSICAL MODELLING AND SIMULATION

In computer science, metamodelling approach becomes more and more popular for the purpose of software systems development. In this paper, we discuss applicability of the metamodelling approach for development of software...

AN EVALUATION OF IMPROVED CLUSTER-BASED ROUTING PROTOCOL IN AD-HOC WIRELESS NETWORK

In this paper we presents a performance comparison of Dynamic Source Routing (DSR), Ad hoc On Demand Vector (AODV), Cluster Based Routing Protocol (CBRP) and Improved Cluster Based Routing Protocol (i-CBRP) routing proto...

Download PDF file
  • EP ID EP254104
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

Kamel Hussein Rahouma (2017). REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS. International Journal of Software Engineering and Computer Systems, 3(1), 71-87. https://europub.co.uk/articles/-A-254104