scholarly journals APPLICATION OF THE SECURE HASHING ALGORITHM (SHA) METHOD AND ROLE-BASED ACCESS SECURITY AUTHENTICATION IN LARAVEL 7

2021 ◽  
Vol 7 (2) ◽  
pp. 43-62
Author(s):  
Thomson Mary. ◽  
Anggri Yulio Pernanda ◽  
Satrio Junaidi
2019 ◽  
Vol 8 (1) ◽  
pp. 53-61
Author(s):  
S. Hendry Leo Kanickam ◽  
L. Jayasimman

Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.


Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing


2019 ◽  
Vol 42 ◽  
Author(s):  
Daniel J. Povinelli ◽  
Gabrielle C. Glorioso ◽  
Shannon L. Kuznar ◽  
Mateja Pavlic

Abstract Hoerl and McCormack demonstrate that although animals possess a sophisticated temporal updating system, there is no evidence that they also possess a temporal reasoning system. This important case study is directly related to the broader claim that although animals are manifestly capable of first-order (perceptually-based) relational reasoning, they lack the capacity for higher-order, role-based relational reasoning. We argue this distinction applies to all domains of cognition.


2012 ◽  
Author(s):  
Jessica L. Siegel ◽  
Michael S. Christian ◽  
Adela S. Garza ◽  
Aleksander P. J. Ellis

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Author(s):  
Erwin Erwin ◽  
Nasarudin Nasarudin ◽  
Husnan Husnan

The purpose of this research is to explain the importance of the student organizations and describe their efforts to improve the speaking skills of students at the Mahad Khalid Bin Al Waleed at the University of Muhammadiyah Mataram. This research uses the qualitative approach with the descriptive type. The result shows the student organizations play an important role based on their objectives and functions. The objectives are to help the foundation and all parties in the Ma'had develop the students’ potential and qualification, and to be the place for the students to share their problems and complaints, while the functions are as one of the media to develop students’ quality, both the members of the non-member, and as the good examples and pioneers of any good deeds. The efforts done by student organizations in improving speaking skills are such as by making activities that lead to improving students' speaking skills like sticking vocabularies in each class and Friday activities such as language game, Arabic debate and short lecture.


2020 ◽  
pp. 70-74
Author(s):  
Anastasia Katkova ◽  
Elena Andriyanova

Currently, the leading socio-psychological problem in modern health care is role overloads and role conflicts among medical professionals. Role-based problems can lead to neuropsychiatric stress and become a source of professional stress for doctors. Therefore, in order to provide social assistance and support to doctors, it is necessary to study the sociopsychological factors that determine role conflicts in the professional activity of a doctor and further implement a socially oriented approach in the conditions of modernizing the modern healthcare system.


2009 ◽  
Vol 20 (9) ◽  
pp. 2495-2510 ◽  
Author(s):  
Zhi-Gang CHEN ◽  
Jin-Song GUI ◽  
Ying GUO

Sign in / Sign up

Export Citation Format

Share Document