Preferred Language
Articles
/
jih-1680
New Proposed Method For Web Services Security

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose  a mechanism  for the client to provide authemication  data, based on the service definition , and  for the service  provider to retrieve those data . We also  show  how XMl.

Digital Signatures  and encryption can  be exploited to achieve a level

of  trust.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Cyberspace Security : Reading in the Legal Concept

After the tremendous development witnessed by the world of communications at the beginning of the third millennium, the activities that are performed through cyberspace have increased, and its importance has therefore increased, and the risks to which this space is exposed have increased, and in view of the global trend towards regulating this space and the practices that take place through it, as well as finding legal and technical ways to secure it. And to secure the services that are provided through it, it was necessary to determine the nature of this space and therefore its security. In order to create an appropriate theoretical framework around it that may be used if the Iraqi legislator goes towards organizing this space and secur

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Spatial Disparities of Primary Education Services in Sulaimaniyah Province

Levels of primary education are varying in Sulaimaniyah Province, which defines as a lower stage of education process and seems to be found in most settlements to save the individual and community from illiteracy in its traditional notion which means the individuals, potentiality for reading and writing if he/she graduated from this stage successfully. The research can put the priority for goodness of primary education service within Sulaimaniyah Province that includes Sulaimaniyah city as a dominance based on statistical indicator which called the standardized score (z). The indicator (z) calculated for the basic items of primary education to diagnosis the range of developing that service in Sulaimaniyah city especially and put

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
The Effect of Services system in Architectural form developments

Architecture forms theoretical summaries and multi systems that have the essence of change, and that what distinguishes Architecture from other sciences and their systems. Architecture means way of life via its expressional products and that appears through its systems. These systems are based on formative and technological properties in form, structure, services and materials as well as
their moral forms. All these are associated with techniques and facilities in order to establish integrated system.
Architectural creation does not come from void but it depends on a conception base to create a new condition for creative architectural product. The general problem of the research concentrated on limited theoretical and practica

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Semiparametric Bayesian Method with Classical Method for Estimating Systems Reliability using Simulation Procedure

               In this research, the semiparametric Bayesian method is compared with the classical  method to  estimate reliability function of three  systems :  k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Security and Its Relation to Motivation for Achievement of Social Researchers Working in the Courts

The research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Bifurcation Analysis of Food Web Prey- Predator Model with Toxin
Abstract<p>Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point <italic>E</italic> <sub>0</sub>, and it revealed the existence of saddle-node bifurcation occurred at equilibrium points <italic>E</italic> <sub>1</sub>, <italic>E</italic> <sub>2</sub> and <italic>E</italic> <sub>3</sub>. At any point, the occurrence of bifurcation of the pitch for</p> ... Show More
Scopus Crossref
View Publication
Publication Date
Mon May 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Suggestion and Upgrading Extreme Programming Methodology in Web-Based Project Development

In this research, we will discuss how to improve the work by dealing with the factors that
participates in enhancing small IT organization to produce the software using the suitable
development process supported by experimental theories to achieve the goals. Starting from
the selecting of the methodology to implement the software. The steps used are and should be
compatible with the type of the products the organization will produce and here it is the Web-Based Project Development.
The researcher suggest Extreme Programming (XP) as a methodology for the Web-Based
Project Development and justifying this suggestion and that will guide to know how the
methodology is very important and effective in the software dev

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication