The International Arab Journal of Information Technology (IAJIT)

Representing Access Control Policies in Use Cases Khaled Alghathbar

Abstract:  Security  requirements  of  a  software  product  need  to   receive  attention  throughout  its  development  lifecycle.  This 

Representing Access Control Policies in Use Cases Khaled Alghathbar

Abstract:  Security  requirements  of  a  software  product  need  to   receive  attention  throughout  its  development  lifecycle.  This 

Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud

Pradeep Suthanthiramani1, Muthurajkumar Sannasy 2, Ganapathy Sannasi 3, and Kannan Arputharaj1 1Department of Information Science and Technology, Anna University, India 2Department of Computer Technology, Anna University, India 3Research Centre for Cyber-Physical Systems and School of Computer Science and Engineering, Vellore

A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-

Based IIoT Security, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba