• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Design Patterns for Building Context-Aware Transactional Services in PaaS-Enabled Systems

  • Ettazi Widad;Riane Driss;Nassar Mahmoud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.91-100
    • /
    • 2023
  • Pervasive computing is characterized by a key characteristic that affects the operating environment of services and users. It places more emphasis on dynamic environments where available resources continuously vary without prior knowledge of their availability, while in static environments the services provided to users are determined in advance. At the same time, Cloud computing paradigm introduced flexibility of use according to the user's profile and needs. In this paper, we aimed to provide Context-Aware Transactional Service applications with solutions so that it can be integrated and invoked like any service in the digital ecosystem. Being able to compose is not enough, each service and application must be able to offer a well-defined behavior. This behavior must be controlled to meet the dynamicity and adaptability necessary for the new user's requirements. The motivation in this paper is to offer design patterns that will provide a maximum of automatism in order to guarantee short reaction times and minimal human intervention. Our proposal includes a cloud service model by developing a PaaS service that allows CATS adaptation. A new specification for the validation of CATS model has been also introduced using the ACTA formalism.

The Effect of Using WhatsApp on EFL Students' Medical English Vocabulary Learning During the Covid-19 Pandemic

  • Saud Alenezi;Elias Bensalem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.143-149
    • /
    • 2024
  • The role of social networking mobile applications such as WhatsApp in enhancing second language vocabulary learning among English language learners continues to be a subject of interest for many scholars. The current study aimed at examining medical English vocabulary learning among undergraduate students using WhatsApp compared to learning vocabulary via the Blackboard platform during the Covid-19 pandemic. To this end, 108 medical students (51 males, 57 females) enrolled in a first semester English for a specific English course participated in the study. A quasi-experimental design was adopted for two groups. Fifty-three students participated in the WhatsApp group and 55 students formed the Blackboard group. A pretest-posttest design was employed to collect data. Results of t-test scores did not show a significant difference between the WhatsApp and Blackboard groups on a vocabulary test. Results of a survey that measured students' opinion of the use of WhatsApp as a platform for learning new vocabulary showed positive perceptions since participants thought that WhatsApp enhanced their learning experience.

A Study on User Experience on Ant Insurance Claims China's Mobile Insurance Platform -Focused on Alipay- (중국 모바일 보험 플랫폼 개미 보험청구에 관한 사용자 경험 연구 -알리페이 중심으로-)

  • Son, Young-Ho;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.317-322
    • /
    • 2021
  • This study focuses on user experience of Ant Insurance Platform(insurance product of Alibaba) and provides insights and improvement advises based on the survey conducted. Given that insurance claim is the most controversial part during the whole process, it is essential to conduct corresponding research from users' prospective. Some Chinese users between their 20's and 40's, who are major users of mobile insurance platforms, were selected as a sample group. Questionaire survey, which was made based on measurement items from Information systems success model, as well as in-depth interview was conducted within the group. According to the result, health, among all kinds, is the most difficult insurance to claim, which was mainly cause by security and information concerns. In order to enhance security, more options should be given to users. As for information, complains should be delt carefully and transparently. This study is expected to be used as referential material for mobile insurance platforms and user experience of insurance claims.

Design of Application Module for the Excel File Security Management (엑셀 파일의 보안 관리를 위한 응용 프로그램 모듈 설계)

  • Jang, Seung Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1173-1178
    • /
    • 2019
  • In this paper, we design a security management application module for an Excel VBA password file. You will set a password for the important VBA program file. If this password is lost, you set a new password. If you forgot the password after setting the password in the Excel VBA file, you will not be able to change the VBA source code. In this paper, we design a function to modify VBA file passwords conveniently. The VBA password modification module extracts VBA files from Excel files. The password can be modified by modifying specific field information in the extracted VBA program file. This allows you to modify the password for the VBA program file. The experiments were performed by implementing the contents proposed in this paper. As a result of the experiment, we can confirm that the password can be used by modifying the VBA file password.

Designing a Micro-Learning-Based Learning Environment and Its Impact on Website Designing Skills and Achievement Motivation Among Secondary School Students

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.335-343
    • /
    • 2021
  • The study aimed to elucidate how to design a learning environment on the premise of micro-learning (ML) and investigate its impact on website designing skills and achievement motivation among secondary school students. Adopting the experimental approach, data were collected through an achievement test, a product evaluation form, and a test to gauge motivation for achievement. The sample was divided into two experimental groups. Results revealed statistically significant differences at 0.05≥α between the mean scores of the two groups that experienced ML, irrespective of the two modes of presenting the video in the pre-test and post-test, as for the test of websites design skills, product evaluation form, and achievement motivation test. Besides, there have been statistically significant differences at 0.05≥α between the mean scores of the first experimental group that had exposure to ML using the split-video presentation style and the scores of the second experimental group that underwent ML using continuous video presentation style in the post cognitive test of website design and management skills in favor of the group that had segmented-video-presentation ML. Another salient finding is the nonexistence of significant differences at 0.05≥α between the mean scores of the first experimental group that underwent segmented-video-presentation ML and the grades of the second experimental group that received ML with continuous video presentation style in the post-application of the product scorecard of websites designing skills and the motivation test. In light of these salient findings, the study recommended using ML in teaching computer courses at different educational stages in Saudi Arabia, training computer and information technology teachers to harness ML in their teaching and using ML in designing courses at all levels of education.

Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 개인정보 보호를 위한 효율적인 비밀분산 데이터 관리 방안)

  • Lee, Sung-Yong;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.311-318
    • /
    • 2013
  • It is very important to design security policy and technical framework on sensitive private data in order to protect user privacy in smart grid environment. This paper introduces secret data sharing schemes proposed for privacy protection in smart grid, and presents technical problems of them. The proposed scheme in this paper, reduces the number of rounds in sharing process and also in restoration process, and can select how many databases would be used, so eventually it shows enhancements in terms of efficiency and security.

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

Critical Factors Influencing Adoption of Cloud Computing for Government Organizations in Yemen

  • Salem, Mubarkoot Mohammed;Hwang, Gee-Hyun
    • Journal of Distribution Science
    • /
    • v.14 no.11
    • /
    • pp.37-47
    • /
    • 2016
  • Purpose - Many countries nowadays look at cloud computing as an opportunity because it holds great advantages for governments. Public sector in Yemen still uses traditional computing. This study tends to explore the factors that would affect cloud computing adoption in government organizations in Yemen. Research design, data and methodology - We used a combination of DOI theory and TOE framework with some changes to suit the context of government organizations. Eight hypotheses were proposed with a questionnaire developed and sent to people in Yemen. 118 responses were collected to assess the hypotheses. Results - Results indicate that Yemen lacks some prerequisites of cloud technology in terms of technological readiness and regulations. The factors: relative advantage, compatibility, security concern, perception of benefits and government support were accepted. Perception of benefits, in particular, is found to affect the decision of adoption. Security concern also showed a direct and indirect influence on cloud adoption in the government. Respondents consider security a key issues of the technology. The factors: complexity, technology readiness and regulatory support were rejected. Conclusions - Based on all analysis results, this study proposed some steps toward adopting cloud computing in Yemen.

A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

  • Chen, Ying;Ge, Yangming;Wang, Wenyuan;Yang, Fengyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1779-1798
    • /
    • 2018
  • Heterogeneous wireless sensor networks (HEWSN) is a kind of wireless sensor networks (WSN), each sensor may has different attributes, HEWSN has been widely used in many aspects. Due to sensors are deployed in unattended environments and its resource constrained feature, the design of security and efficiency balanced authentication scheme for HEWSN becomes a vital challenge. In this paper, we propose a secure and lightweight user authentication and key agreement scheme based on biometric for HEWSN. Firstly, fuzzy extractor is adopted to handle the user's biometric information. Secondly, we achieve mutual authentication and key agreement among three entities, which are user, gateway and cluster head in the four phases. Finally, formal security analysis shows that the proposed scheme defends against various security pitfalls. Additionally, comparison results with other surviving relevant schemes show that our scheme is more efficient in term of computational cost, communication cost and estimated time. Therefore, the proposed scheme is well suitable for practical application in HEWSN.

Improved Integrated Monitoring System Design and Construction (개선된 통합모니터링 시스템 설계 및 구축)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.25-33
    • /
    • 2017
  • In order to prevent information leakage, companies are monitoring the information leakage by internal staff by building individual security system and integrated monitoring system of firewall and DLP function. Especially, many log data of the integrated monitoring system cause time and money, and it is difficult to detect information leak of fast malicious personnel due to system slowdown. It is necessary to speed up the system by digitizing large log data for each day and person for fast information leakage detection and there is a need to develop and manage a continuous monitoring program for the information leakage indications personnel. Therefore, we propose an improved integrated monitoring system using log data by date and individual data.