Preferred Language
Articles
/
jih-1680
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose  a mechanism  for the client to provide authemication  data, based on the service definition , and  for the service  provider to retrieve those data . We also  show  how XMl.

Digital Signatures  and encryption can  be exploited to achieve a level

of  trust.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Evaluation of Information Security Management System in the Iraqi Commission for Computers and Informatics according to the International Standard (ISO 27001: 2013)
...Show More Authors

    The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations  dependence on computers and information technology in work and communication  with others. The international legitimacy (represented by the  International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 18 2022
Journal Name
International Journal Of Early Childhood Special Education
The effectiveness of a proposed teaching strategy according to The Common Knowledge Construction Model in Mathematical Proficiency for middle school student
...Show More Authors

This research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo

... Show More
Publication Date
Sun Jul 13 2025
Journal Name
Jornal Of Al-muthanna For Agricultural Sciences
A Proposed Approach to Agricultural Extension in Iraq for a Better Response to the Needs of farmer’s to Address Their Challenges
...Show More Authors

View Publication
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Role of School in Promoting Intellectual Security of Students in Qurayyat Governorate
...Show More Authors

The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Intellectual Security and Its Relation to Psychological Resilience of Secondary School Students
...Show More Authors

The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security

The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:

  1. The members of the sample have an intellectual Security.
  2. The members of the sample have

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory
...Show More Authors

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref