Volume 3 Number 3 September 2012

    
Security Requirements Engineering Using Outsourcing

A. Meligy, H. Diab, M. Torky

https://doi.org/

Abstract Now days several organizations started to build their security system during SDLC depending on an Outsourcing companies. The purpose of this study is to show how the outsourcer represented in Managed Security Service Provider (MSSP) can define and specify security requirements during software requirement engineering process. This paper introduced a new model that aims to define and specify security requirements... Read More


Enhancing Digital Signature Schema Using Fingerprint Minutiae Point and RSA Algorithm

Rima DJELLAB, Aicha ABDENNABI

https://doi.org/

Abstract Digital signature method is inspired from the handwriting signature, which must be unique and representative of an individual. The digital signature is a technique that allows identification of a user by relating one entity to one identity. Digital signature has many other applications in security field; including authentication, data integrity, and non-repudiation. The digital signature can be performed using asymmetric... Read More


Grover’s Algorithm Applied to Quantum Cryptography

Z. Sakhi, A. Tragha, R. Kabil, M. Bennai

https://doi.org/

Abstract We are interested in some applications of a new quantum algorithm in the case of quantum cryptography. We have analyzed in particular Grover algorithm and its implementation in the case of many qubits system. Some features of quantum cryptography are also presented and quantum cryptographic protocol, especially, Quantum Secret-Sharing protocol based on Grover’s algorithm is studied.... Read More


Risk Analytic Approach and Cost Analysis for Interworking on the New Secured IMS Architecture

Hamid Allouch, Mostafa Belkasmi

https://doi.org/

Abstract The IP Multimedia subsystem (IMS) is the technologies of convergence and interworking environment, with services flexibility, it‘s more than technical issue, it will prevail as core of Next Generation Network (NGN). The challenge and strategies of IMS architecture come from this convergence and the complexity of these technologies. In this work we present a novel design of architecture, that turns... Read More