Volume 8 Number 2 June 2017

    
Enhancing Security Privileges to Access SAP-HANA Using UCTD-ABE Scheme

Surajrasal, Kuldeep Prakash, Varsha Rasal, Shraddha Shelar

https://doi.org/

Abstract SAP HANA is widely used emerging relational database management system. Sensitive data is shared and retrieved through network. Existing cryptographic approach works with security techniques like Attribute Based Encryption, Cipher Text, Decentralized Approach, & Mediator approach. Multiple approaches enhances the security level but in dept individual approaches keens to enhance security level. In proposed approach, UCTD-ABE scheme is applied where User,... Read More


Constructing Self-Adaptive Software in Ubiquitous Computing Space

Hui Liu, Bo Ding, Tianzuo Wang, Shan Yao

https://doi.org/

Abstract Self-adaptation endows software with the ability to adjust its behavior according to the changes in its environment. It is an effective approach in dealing with many changing dynamics, such as ubiquitous computing spaces. However, adaptability will significantly complicate software implementation and brings great challenges to software engineering practices. This paper presents an engineering approach for self-adaptive software, which systematically enables the reuse of software... Read More


Implementation and Design of an Intrusion Prevention System Inspired Immune Systems

Youseff Farhaoui

https://doi.org/

Abstract In view of the recent advances of communication and information technology along with the growing need for online networking, computer security has become a challenge to almost all the studies that have been carried out in this research axis. So far, various tools and mechanisms have been developed in order to guarantee a safety level up to the requirements of modern life. Among... Read More