Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(571.31KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website
Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah
Pages - 85 - 95     |    Revised - 31-03-2015     |    Published - 30-04-2015
Volume - 9   Issue - 2    |    Publication Date - March / April 2015  Table of Contents
MORE INFORMATION
KEYWORDS
Personal Computer, Encryption, Decryption, Web Links, Privilege, Semi-Restricted, Smart Phones, User Interface.
ABSTRACT
This paper provides the security level for employees in the organization that prevents them to use or to browse some website that are not allowed to be seen during work time. However, there are many ready software tools have available which do the same task, but we will try finding a new algorithm to investigate the better solution for this research question. The main reason of our research is to provide an open source software that can be easily manipulated by providers rather than ready software. For example, tools that cannot be updated by the organization administrator (none open source software).
CITED BY (0)  
1 Google Scholar
2 refSeek
3 Scribd
4 SlideShare
5 PdfSR
1 Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S. and Farrell, J. (1998). The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. Vol. 10, pp.303-314.
2 Xing, L., Pan, X., Wang, R., Yuan, K. and Wang, X. (n.d.). (2012). Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating, pp. 1-16.
3 Hudson, J. and Bruckman, A. (2005). Using empirical data to reason about internet research ethics. pp.287--306.
4 ERIC, M. and Goetz, E. (2007). Embedding information security into the organization.
5 S. Garfinkel. Web Security and Commerce. OíReilly & Associates, Cambridge, 1997.
6 Presidentís Commission On Critical Infrastructure Protection. Research and Development Recommendations for Protecting and Assuring Critical National Infrastructures, September 1997.
7 B. Blakley. The Emperorís Old Armor. Proceedings of the New Security Paradigms Workshop, 1996.
8 Abdullah, A., Baban, M. and Hama Aziz, R. (2014). A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification. A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification, 15(2), pp.83 87.
9 NIST, "A Survey of Access Control Models," NIST Privilege (Access) Management Workshop, available at: http://csrc. nist. gov/news-events/privilege-managementworkshop 2009.
10 Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud Computing, 1(1), pp.54-57.
11 Sill, A. (2014). Setting Cloud Standards in a New World. IEEE Cloud Computing, 1(1), pp.50-53.
12 Basu, A., Vaidya, J., Kikuchi, H., Dimitrakos, T. and Nair, S. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. J Cloud Comput Adv Syst Appl, 1(1), p.8.
13 Baun, C., Kunze, M., Kurze, T. and Mauch, V. (2011). Private Cloud-Infrastrukturen und Cloud-Plattformen. Informatik-Spektrum, 34(3), pp.242-254.
14 Tarannum, N. and Ahmed, N. (2013). Efficient and Reliable Hybrid Cloud Architecture for Big Database. IJCCSA, 3(6), pp.17-29.
15 Martin-Flatin, J. (2014). Challenges in Cloud Management. IEEE Cloud Computing, 1(1), pp.66-70.
16 Mostarda, Leonardo, and Alfredo Navarra. 'Distributed Intrusion Detection Systems For Enhancing Security In Mobile Wireless Sensor Networks'. International Journal of Distributed Sensor Networks 4.2 (2008): 83-109.
Mr. Roza Hikmat Hama Aziz
University of Sulaimani - Iraq
Mr. Miran Hikmat Mohammed Baban
University of Sulaimani - Iraq
miran.baban29@yahoo.com
Mr. Ako Muhammad Abdullah
University of Sulaimani - Iraq