The International Arab Journal of Information Technology (IAJIT)

Representing Access Control Policies in Use Cases Khaled Alghathbar

Abstract:  Security  requirements  of  a  software  product  need  to   receive  attention  throughout  its  development  lifecycle.  This 

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

Representing Access Control Policies in Use Cases Khaled Alghathbar

Abstract:  Security  requirements  of  a  software  product  need  to   receive  attention  throughout  its  development  lifecycle.  This 

Flexible Fair and Collusion Resistant Pseudonym Providing System

Belal Amro1, Albert Levi2, and Yucel Saygin2 1College of IT, Hebron University, Palestine 2Faculty of Engineering and Natural Sciences, Sabanci University, Turkey

A Contrivance to Encapsulate Virtual Scaffold with Comments and Notes

Nagarajan Balasubramanaian1, Suguna Jayapal2, and Satheeshkumar Janakiraman3 1Department of Computer Applications, Arunai Engineering College, India 2Department of Computer Science, Vellalar College for Women, India 3Department of Computer Science, Bharathiar University, India

MCA-MAC: Modified Cooperative Access MAC Protocol in Wireless Sensor Networks

Aya Hossam1, Tarek Salem2, Anar Abdel Hady2, and Sherine Abd El-Kader2 1Electrical Engineering Department, Faculty of Engineering (Shoubra), Benha University, Egypt