Home   >   CSC-OpenAccess Library   >    Manuscript Information
An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website
Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah
Pages - 85 - 95     |    Revised - 31-03-2015     |    Published - 30-04-2015
Volume - 9   Issue - 2    |    Publication Date - March / April 2015  Table of Contents
Personal Computer, Encryption, Decryption, Web Links, Privilege, Semi-Restricted, Smart Phones, User Interface.
This paper provides the security level for employees in the organization that prevents them to use or to browse some website that are not allowed to be seen during work time. However, there are many ready software tools have available which do the same task, but we will try finding a new algorithm to investigate the better solution for this research question. The main reason of our research is to provide an open source software that can be easily manipulated by providers rather than ready software. For example, tools that cannot be updated by the organization administrator (none open source software).
1 Google Scholar 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
Abdullah, A., Baban, M. and Hama Aziz, R. (2014). A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification. A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification, 15(2), pp.83 87.
B. Blakley. The Emperor’s Old Armor. Proceedings of the New Security Paradigms Workshop, 1996.
Basu, A., Vaidya, J., Kikuchi, H., Dimitrakos, T. and Nair, S. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. J Cloud Comput Adv Syst Appl, 1(1), p.8.
Baun, C., Kunze, M., Kurze, T. and Mauch, V. (2011). Private Cloud-Infrastrukturen und Cloud-Plattformen. Informatik-Spektrum, 34(3), pp.242-254.
ERIC, M. and Goetz, E. (2007). Embedding information security into the organization.
Hudson, J. and Bruckman, A. (2005). Using empirical data to reason about internet research ethics. pp.287--306.
Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S. and Farrell, J. (1998). The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. Vol. 10, pp.303-314.
Martin-Flatin, J. (2014). Challenges in Cloud Management. IEEE Cloud Computing, 1(1), pp.66-70.
Mostarda, Leonardo, and Alfredo Navarra. 'Distributed Intrusion Detection Systems For Enhancing Security In Mobile Wireless Sensor Networks'. International Journal of Distributed Sensor Networks 4.2 (2008): 83-109.
NIST, "A Survey of Access Control Models," NIST Privilege (Access) Management Workshop, available at: http://csrc. nist. gov/news-events/privilege-managementworkshop 2009.
President’s Commission On Critical Infrastructure Protection. Research and Development Recommendations for Protecting and Assuring Critical National Infrastructures, September 1997.
S. Garfinkel. Web Security and Commerce. O’Reilly & Associates, Cambridge, 1997.
Sill, A. (2014). Setting Cloud Standards in a New World. IEEE Cloud Computing, 1(1), pp.50-53.
Tarannum, N. and Ahmed, N. (2013). Efficient and Reliable Hybrid Cloud Architecture for Big Database. IJCCSA, 3(6), pp.17-29.
Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud Computing, 1(1), pp.54-57.
Xing, L., Pan, X., Wang, R., Yuan, K. and Wang, X. (n.d.). (2012). Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating, pp. 1-16.
Mr. Roza Hikmat Hama Aziz
University of Sulaimani - Iraq
Mr. Miran Hikmat Mohammed Baban
University of Sulaimani - Iraq
Mr. Ako Muhammad Abdullah
University of Sulaimani - Iraq

View all special issues >>