Posts filed under: My Articles

What is open source software? Open source software is a solution where not only the complied version of the product is provided, but also the source code So advanced users can have a look on the source of the software...
Continue Reading →
Internet has opened new market ways and gave a new vision and new methods of selling products PayPal micropayment is an example of many other platforms of micropayment, and the same challenges apply to all these systems: Micropayments revisited ...
Continue Reading →
Protecting images is not obvious, considering the wide spread of images especially after the appearance of Internet Images are used in different areas (products, banners, logos …etc.) and sometimes it’s crucial to protect images from illegal usage same as audio...
Continue Reading →
Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken Do you think it is possible to protect the copyright of digital contents The goals of DRM technics have evolved since the first versions, initially it...
Continue Reading →
Since the appearance of ARPANET and the interconnection of networks, security was in most debates for new network design, existing networks audit or systems design Some of the tools are very robust and provided a very acceptable and hard to...
Continue Reading →
Different kind of attacks exist nowadays, such the viruses, spams, phishing, DOS or DDOS …etc. If we think about phishing in another context rather than computing, the first image I get in mind is the fish phishing using a hook...
Continue Reading →
0-    Introduction to physical tamper-resistant devices Anti-tamper device contains tamper detection, tamper resistance, tamper response and tamper detection (Rannenberg et.al, 2010). Different types of physical tamper-resistant devices exist Physical Tamper Resistance Tamper resistant devices ...
Continue Reading →
Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography If we deploy Identity Based Cryptosystem, do we still need password? Will identity based cryptosystem replace PKI? ...
Continue Reading →
One of the interesting aspects of security is the tamper resistance, which are couple of technics and approaches aiming to avoid data, software or devices getting changed or altered by unauthorized persons or processes Tamper resistance can be used to...
Continue Reading →
Trying to build an efficient and secure system is a hard task and no exact method or technique has been developed allowing computer experts to submit a software or a system for security check and have exact results whether the...
Continue Reading →
One of the security concerns is the access control, which consists in managing who (person or system) could access which object and how (operation) In the context of multi users and multi applications, the Role based access control is a...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The user interface is the final representation of our systems, and is the only view users and customers can have. A simple interface and easy to use windows and...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis Introduction Due to the complexity of some software-solutions and especially the complexity of the inner design and objects composing the solution, software architects tend to use graphical tools to...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The computing and software development can be considered young if compared to other industry branches. However, the speed in growth of the software development allowed this last to reach...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The software development as a field has seen a significant improvement since the earlier ages. In fact, in a short, some significant changes have been made in the programming...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis Software solutions are developed to fill in business process, they  apply or represent (for companies) how business or part of the business is being done, they have interface throw...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The software development as a field has significantly increased in term of technologies and possibilities. We are now seeing some software solutions that were impossible or considered science fiction...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis Question: FoodCo Company has some requirements that should be categorized into functional and non-functional. For each software application in particular or any project in general, it is important really...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The software development process is taking an important place within business and companies processes, the simple fact that software is impacting finance, business, humans, procurements …etc. It is being...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The analysis and design of any software system should follow some standards and methods to that have been enhanced during the years and with the experience gained with the...
Continue Reading →
Show Buttons
Hide Buttons