Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(571.31KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website
Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah
Pages - 85 - 95     |    Revised - 31-03-2015     |    Published - 30-04-2015
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 9   Issue - 2    |    Publication Date - March / April 2015  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Personal Computer, Encryption, Decryption, Web Links, Privilege, Semi-Restricted, Smart Phones, User Interface.
ABSTRACT
This paper provides the security level for employees in the organization that prevents them to use or to browse some website that are not allowed to be seen during work time. However, there are many ready software tools have available which do the same task, but we will try finding a new algorithm to investigate the better solution for this research question. The main reason of our research is to provide an open source software that can be easily manipulated by providers rather than ready software. For example, tools that cannot be updated by the organization administrator (none open source software).
ABSTRACTING & INDEXING
1 Google Scholar 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
REFERENCES
Abdullah, A., Baban, M. and Hama Aziz, R. (2014). A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification. A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification, 15(2), pp.83 87.
B. Blakley. The Emperor’s Old Armor. Proceedings of the New Security Paradigms Workshop, 1996.
Basu, A., Vaidya, J., Kikuchi, H., Dimitrakos, T. and Nair, S. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. J Cloud Comput Adv Syst Appl, 1(1), p.8.
Baun, C., Kunze, M., Kurze, T. and Mauch, V. (2011). Private Cloud-Infrastrukturen und Cloud-Plattformen. Informatik-Spektrum, 34(3), pp.242-254.
ERIC, M. and Goetz, E. (2007). Embedding information security into the organization.
Hudson, J. and Bruckman, A. (2005). Using empirical data to reason about internet research ethics. pp.287--306.
Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S. and Farrell, J. (1998). The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. Vol. 10, pp.303-314.
Martin-Flatin, J. (2014). Challenges in Cloud Management. IEEE Cloud Computing, 1(1), pp.66-70.
Mostarda, Leonardo, and Alfredo Navarra. 'Distributed Intrusion Detection Systems For Enhancing Security In Mobile Wireless Sensor Networks'. International Journal of Distributed Sensor Networks 4.2 (2008): 83-109.
NIST, "A Survey of Access Control Models," NIST Privilege (Access) Management Workshop, available at: http://csrc. nist. gov/news-events/privilege-managementworkshop 2009.
President’s Commission On Critical Infrastructure Protection. Research and Development Recommendations for Protecting and Assuring Critical National Infrastructures, September 1997.
S. Garfinkel. Web Security and Commerce. O’Reilly & Associates, Cambridge, 1997.
Sill, A. (2014). Setting Cloud Standards in a New World. IEEE Cloud Computing, 1(1), pp.50-53.
Tarannum, N. and Ahmed, N. (2013). Efficient and Reliable Hybrid Cloud Architecture for Big Database. IJCCSA, 3(6), pp.17-29.
Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud Computing, 1(1), pp.54-57.
Xing, L., Pan, X., Wang, R., Yuan, K. and Wang, X. (n.d.). (2012). Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating, pp. 1-16.
MANUSCRIPT AUTHORS
Mr. Roza Hikmat Hama Aziz
University of Sulaimani - Iraq
Mr. Miran Hikmat Mohammed Baban
University of Sulaimani - Iraq
miran.baban29@yahoo.com
Mr. Ako Muhammad Abdullah
University of Sulaimani - Iraq


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions