Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (3)
- Computer Sciences (2)
- Physical Sciences and Mathematics (2)
- Business (1)
- Business Intelligence (1)
-
- Communication (1)
- Communication Technology and New Media (1)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
- E-Commerce (1)
- Information Literacy (1)
- Information Security (1)
- Library and Information Science (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Science and Technology Studies (1)
- Social Media (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems Architecture (1)
- Technology and Innovation (1)
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng
A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng
Journal of International Technology and Information Management
The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …
Security For 5g Mobile Wireless Networks, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
Security For 5g Mobile Wireless Networks, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
Department of Electrical and Computer Engineering: Faculty Publications
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding …
Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang
Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang
Masters Theses
The objective of this thesis is to improve the security for physical paper documents. Providing information security has been difficult in environments that rely on physical paper documents to implement business processes. Our work presents the design of a digital information security system for paper documents, called "CryptoPaper", that uses 2-dimensional codes to represent data and its security properties on paper. A special scanner system is designed for "CryptoPaper" which uses image recognition techniques and cloud-based access control to display plaintext of encrypted and encoded data to authorized users.
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Electrical and Computer Engineering Publications
Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.