Tawfiq S. M. Barhoom

Learn More
Appropriate security mechanisms used in an application will not significantly impair system's performance but will greatly enhance its application scope. Point-to-point security mechanisms such as SSL and TLS are good for ensuring data integrity, confidentiality and authenticity but not non-repudiation. Ensuring non-reputability of multi-signed digital(More)
Security has become ubiquitous in every area of malware newly emerging today pose a growing threat from ever perilous systems. As a result to that, Worms are in the upper part of the malware threats attacking the computer system despite the evolution of the worm detection techniques. Early detection of unknown worms is still a problem. In this paper, we(More)
Pharming attacks can be performed at the client-side or into the internet. In pharming attack, attackers need not targeting individual user. If pharming is performed by modifying the DNS entries, than it will be affecting to all users who is accessing the web page through that DNS. We propose an approach to protect user at client-side from pharming attacks(More)
This study proposes a method for encrypting the sender's messages using new algorithm with a secret key which is generated from using color image and the difference in the LSB of the image pixels. This key will be used for encrypting and decrypting the messages which are transmitted between two sides. The length of the key varies according to the size of(More)
i Acknowledgements Praise is to Allah, First and foremost, I wish to thank Allah for giving me strength and courage to complete this thesis and research. I would like to express my gratitude to my supervisor Dr. Tawfiq Barhoom, for providing me the opportunity to develop this work over the master years. He was not only a good advisor; he also introduced me(More)
Utilization of contextual information considered very useful for improving access decision making process against systems resources, to be more effective in providing authorized service for a large number of end users.We selected model makes decisions based on context information sensed and collected from user environment. Then we enhanced context(More)
  • 1