A performance evaluation of common encryption techniques with secure watermark system (SWS)
Authors : Ahmad Azzazi, Ashraf Odeh, Shadi Masadeh
Abstract : "Ciphering algorithms play a main role in information security systems. Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides evaluation of four of the most common encryption algorithms namely: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS). A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, and finally encryption/decryption speed. In addition compared with different platforms such as Windows 8, Windows XP and Linux Experimental results are given to demonstrate the efficiency and performance of each algorithm. "
Keywords : AES, DES, Blowfish, Secured Watermark System (SWS) and Computer Security
Visit
Security Software Engineering: Do it the right way
Authors : Ahmad Azzazi, Asim El Sheikh
Abstract : Secure software development is one of the most information system issues that raised through the use of the internet and networked systems. The importance of developing secure software increases. In this work we present a process for the development of security critical software projects and an overview of some of the existing processes, standards, life cycle models that support the secure software development. It is a guide to the common body of knowledge for producing, acquiring, and sustaining secure software
Keywords : "Software engineering for Secure Systems, Software Engineering, SSE-CMM, Security Quality Requirements, and Engineering (SQUARE)"
Visit
A framework using NLP to automatically convert user-stories into use cases in software projects
Authors : Ahmad Azzazi
Abstract : To develop quality software within time and cost we have to follow the available rules and methods of modern software engineering. There are many different approaches used. At one hand we have in the analysis stage of a software engineering project the so called user stories that capture what the user does or needs to do within the developed Software System. User stories provide the functions that the system should have. User Stories are considered as a tool for rapid requirements gaining in the Analysis Phase of a Software Engineering Project. They are considered as a very effective way to communicate requirements but still inexpensive and easy to develop. But when we are going from the analysis phase to the design phase we face the lack of details in the requirements with user stories, therefore we better use the called Use Case instead of user stories. The use cases are a list of steps to achieve functionality or a goal within a software system. This interaction is normally done between a user and the software system. Therefore we want to combine both techniques in the approach of developing and validating requirements without extra efforts to rewrite the user stories into use cases. In this work I will provide a framework to automatically convert the user stories into use cases with the use of Natural language processing techniques. A case study is developed for this framework with results showing the percentage of correctly detected actors and use cases.
Keywords : User Stories, Use Cases, Conversion from user stories to use case, NLP
Visit
A novel Paradigm In Authentication System Using Swifi Encryption/Decryption Approach
Authors : Ahmad Azzazi, Shadi Masadeh, Bassam Alqaralleh, Ali Al Sbou
Abstract : Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of security threats can be challenging. Verifying data integrity and authentication are essential security services in order to secure data transmission process. In this paper the authors propose a novel security technique which uses new encryption and decryption algorithms to achieve authenticated communication and enhanced data integrity. The proposed technique is very complex for attackers to decode, and it is applicable to client-server architecture
Keywords : Authentication, PGP, sWIFI, HMAC, Encryption\Decryption, integrity
Visit
CPU Utilization for a Multiple Video Streaming Over a Fiber Optic ATM-Network when Varying the Quality of Service
Authors : Ahmad Azzazi, Shadi Masadeh, Hesham Abusaimeh
Abstract : The Asynchronous Transfer Protocol (ATM) gives the broadband services users a high quality demands with a good opportunity to operate their networks. One important feature of the ATM-Network is the Quality of Service (QoS) attribute. In this paper, we are explaining the effect of varying the QoS on the CPU usage of a workstation. This effect can be studied by getting multiple video streaming flooding over a fiber optic ATM-Network for real time usage with the variation of the frame rates per second. The Q-factor and the Q-variable are used to measure the percentage of the idle processor. Measure of the lost PDUs with the variation of Q-factor and Q-variable has been calculated
Keywords : ATM-Network, QoS (Quality of Service), Q-factor, Q-variable, CPU utilization of ATM
Visit
Importance of WBAN and Its Security: An Overview
Authors : Ahmad Azzazi, Mohammad Ali Kamoona
Abstract : Importance of WBAN and Its Security: An Overview
Keywords :
Visit
A real time secured voice framework using the totally reconstructed discrete wavelet transformation
Authors : Ahmad Azzazi
Abstract : In our life today and with the upraise of the mobile computation and mobile phones we are using more voice applications. The voice application could then send voice information with different information over different communication channels, with an increasing need to protect this information without any delay when applying any modification on it. To protect this voice information, we encrypt it. In this paper, we are proposing a Framework using the totally reconstructed Discrete Wavelet Transformation (DWT) to encrypt the voice information in real time, where the sample rate of the encrypted voice signal is equal to the original voice signal sample rate. The framework is designed and tested with sample tests to measure the performance of this Framework, showing the speed and complexity of this Framework.
Keywords :
Visit
A Knowledge-based Expert System for Supporting Security in Software Engineering Projects
Authors : Ahmad Azzazi, Mohammad Shkoukani
Abstract : "Building secure software systems requires the intersection between two engineering disciplines, software engineering and security engineering. There is a lack of a defined security mechanism for each of the software development phases, which affects the quality of the software system intensively. In this paper, the authors are proposing a framework to consider the security aspects in all the phases of the software development process from the requirements until the deployment of the software product, with three additional phases that are important to automatically produce a secure system. The framework is developed after analyzing the existing models for secure system development. The key elements of the framework are the addition of the phases like physical, training, and auditing, where they improve the level of security in software engineering projects. The authors found so a solution for the replacement of the knowledge of the security engineer through the construction of an intelligent knowledge-based system, which provides the software developer with the security rules needed in each phase of the software development lifecycle and it improves the awareness of the software developer about the securityrelated issues in each phase of the software development lifecycle. The framework and the expert system are tested on a variety of software projects, where a significant improvement of security in each phase of the software development process is achieved "
Keywords : A Knowledge-based Expert System for Supporting Security in Software Engineering Projects
Visit
A study approach for online marketing over social media
Authors : Ahmad Azzazi, Areej Hasan Khataibeh
Abstract : This research proposes a study approach for electronic commerce and online advertising over social media and present vital contributions. First, we exhibit traditional E-commerce approaches, discuss all its related topics and we provide a brief description of the history of social media. Second, we discuss the current state of E-commerce and social media in Jordan and propose solutions to enhance it. Finally, we propose a new approach that provides better way to do online business using social media rather than using classical ways, which can dramatically influence E-commerce and expand business revenue.
Keywords :
Visit
Using SWIFI ENCRYPTION/DECRYPTION APPROACH
Authors : Ahmad Azzazi, Shadi Masadeh, Bassam Alqaralleh, Mousa Ali, Al Sbou
Abstract : "Maintaining the security of your computer, network and private/sensitive data against unauthorized access and a wide variety of security threats can be challenging. Verifying data integrity and authentication are essential security services in order to secure data transmission process. In this paper we propose a novel security technique which uses new encryption and decryption algorithms to achieve authenticated communication and enhanced data integrity. The proposed technique is very complex for attackers to decode, and it is applicable to client-server architecture. "
Keywords : Authentication, PGP, sWIFI, HMAC, Encryption\Decryption, integrity
Visit
Towards better Interaction between Students and Lecturer in Computer Lab Environment through a different Lab Design: Survey Results
Authors : Ahmad Azzazi, Shadi Masadeh, Nidal Turab
Abstract : "Abstract- In this research, we are presenting the results of a survey done in a computer lab at the faculty of information technology. The computer lab was redesigned into a new lab design which should serve the goal of better interaction between the lab instructor and the students taking the lab. This new lab design is shaped as double V's where there were no obstacles for the instructor while moving in the lab helping the students on their computers."
Keywords : Computer lab design, Instuctor student interaction in a computer lab environment
Visit
The Capability Maturity Model Integration (CMMI) as an information System Analysis and Implementation Choice
Authors : Ahmad Azzazi
Abstract : "Strategic Information System and the Capability Maturity Model Integration (CMMI) are both fundamentally process focused with common objectives. CMMI is used to advance process capabilities and performance as a strategic Information System analysis and implementation tool. In this work the idea of strategic Information System planning is conducted through the use of the CMMI. Examples of the benefits using it from the biggest organizations are given, and then the benefits of using the CMMI are categorized into eight categories. A detailed view of the CMMI is depicted and the representation of it is described. "
Keywords : " CMMI, CMM, Capability Maturity Model Integration, IIS Analysis and Implementation, IIS planning, benefits of using the CMMI, Software Engineering."
Visit