Posts filed under: My Articles

My Articles

As part of the Master of Science in Software Engineering field that I am actually undertaking with the Liverpool’s University, I am asked to write weekly small articles about different topics related to modules of this speciality.
I am glade to share with you some of these articles.

Author : DAOUDI Samir | Context : MSc Software Engineering – Computer Structure Computers run thank to a collaboration of different components. The execution of our applications is handled by the CPU that interprets the machine code and executes the different instructions. The...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Computer Structure We assume the processes are P1 and P2 and the resources are R1 and R2. P1 needs R1 and R2 (in this order), P2 needs R2 and R1 (in this...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Computer Structure Professional software may require a lot of work and investment. With great teams of architects, developers, testers …etc software’s companies may spent a lot of money and human efforts on...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Computer Structure Granting access to computer’s resources can be a real challenge in multitasking environment. An important part of the Operating System called the Scheduler is responsible for selecting and granting access...
Continue Reading →
Nowadays, most of the communications are done over the Internet, which are all based upon IP (internet protocol), though it is worth looking at methods to secure at TCP IP protocol’s level. IPSec operates at the network layer and does...
Continue Reading →
= Full support  = Partial support   = No support Note   If a specific browser version is not listed in the following table, it is not supported The following table shows the specific browsers that are compatible with...
Continue Reading →
The efficiency of software cannot only be determined by the performance and business efficiency, but also the security and bug free characteristics Even after all the software planning and tests, vulnerabilities could be detected later ...
Continue Reading →
What is open source software? Open source software is a solution where not only the complied version of the product is provided, but also the source code So advanced users can have a look on the source of the software...
Continue Reading →
Internet has opened new market ways and gave a new vision and new methods of selling products PayPal micropayment is an example of many other platforms of micropayment, and the same challenges apply to all these systems: Micropayments revisited ...
Continue Reading →
Protecting images is not obvious, considering the wide spread of images especially after the appearance of Internet Images are used in different areas (products, banners, logos …etc.) and sometimes it’s crucial to protect images from illegal usage same as audio...
Continue Reading →
Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken Do you think it is possible to protect the copyright of digital contents The goals of DRM technics have evolved since the first versions, initially it...
Continue Reading →
Since the appearance of ARPANET and the interconnection of networks, security was in most debates for new network design, existing networks audit or systems design Some of the tools are very robust and provided a very acceptable and hard to...
Continue Reading →
Different kind of attacks exist nowadays, such the viruses, spams, phishing, DOS or DDOS …etc. If we think about phishing in another context rather than computing, the first image I get in mind is the fish phishing using a hook...
Continue Reading →
0-    Introduction to physical tamper-resistant devices Anti-tamper device contains tamper detection, tamper resistance, tamper response and tamper detection (Rannenberg et.al, 2010). Different types of physical tamper-resistant devices exist Physical Tamper Resistance Tamper resistant devices ...
Continue Reading →
Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography If we deploy Identity Based Cryptosystem, do we still need password? Will identity based cryptosystem replace PKI? ...
Continue Reading →
One of the interesting aspects of security is the tamper resistance, which are couple of technics and approaches aiming to avoid data, software or devices getting changed or altered by unauthorized persons or processes Tamper resistance can be used to...
Continue Reading →
Trying to build an efficient and secure system is a hard task and no exact method or technique has been developed allowing computer experts to submit a software or a system for security check and have exact results whether the...
Continue Reading →
One of the security concerns is the access control, which consists in managing who (person or system) could access which object and how (operation) In the context of multi users and multi applications, the Role based access control is a...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis The user interface is the final representation of our systems, and is the only view users and customers can have. A simple interface and easy to use windows and...
Continue Reading →
Author : DAOUDI Samir | Context : MSc Software Engineering – Object Oriented Analysis Introduction Due to the complexity of some software-solutions and especially the complexity of the inner design and objects composing the solution, software architects tend to use graphical tools to...
Continue Reading →
Show Buttons
Hide Buttons