A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Swapna, K.
- Performance Estimates of Cryptographic Hash vis-à-vis Secret Key and Public/Private Key Operations
Authors
Source
AADYA -National Journal of Management and Technology, Vol 3 (2014), Pagination:Abstract
Cryptography is the lynchpin of data security- besides providing message confidentiality it facilitates message integrity, authentication and digital signatures. The design of a secure application is not possible without the use of some encryption and decryption techniques. An important task for cryptographers is the analysis and recommendation of parameters, crucially including key size and thus implying key strength, for cryptographic primitives.
Cryptographic hash functions are important tool in cryptography to achieve certain security goals such as authenticity, digital signature, and digital time stamping and entity authentication. This paper presents an analysis of the speed and the performance of various security algorithms by varying key size and file size. Comparative study is based on symmetric encryption algorithm Data Encryption Standard (DES), asymmetric encryption technique RSA proposed by Rivest, Shamir, and Adelman and the widely used cryptographic hash function Secure Hash algorithm (SHA1).
Keywords
Cryptography, Hashing, RSA, DES, SHA1, Performance Estimates.- Cloud Computing:Security Issues and Challenges
Authors
1 YMT College of Management, Kharghar, Navi Mumbai, IN
Source
AADYA -National Journal of Management and Technology, Vol 3, No 2 (2015), Pagination: 149-154Abstract
Today is the age of information technology. The facets of work and personal life are moving towards the concept of availability of everything online. The cloud makes it possible to access the information from anywhere at any time. Cloud computing is an internet based computing, where shared resources, software and information are provided to computers and devices on demand. In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Generally, cloud services are provided by a third-party supplier who possesses the arrangement. Cloud computing has completely transformed the way business organizations use IT both inside and outside of their organization. Cloud computing has many advantages like cost efficiency, convenience and continuous availability, scalability and performance, flexibility and increased storage capacity. However, Many enterprises are reluctant to move critical cloud applications out of their own data centers and into the public cloud due to security concerns. Security is a top concern for IT management because it is a most important requirement to protect the company information and to ensure system integrity. This paper mainly focuses on the security issues and challenges in cloud computing and enlightened the steps that an enterprise can take to reduce the security issues.Keywords
Cloud Computing, Information Security, Integrity, Challenges.- A New SDLC Frame Work for Website Development
Authors
1 YMT College of Management, Kharghar, Navimumbai, IN
Source
AADYA -National Journal of Management and Technology, Vol 7, No 2 (2017), Pagination: 47-57Abstract
SDLC, Software Development Life Cycle is a process used by software industry to design, develop and test high quality software. There are various software development life cycle models defined and designed which are followed during software development process. These models are also referred as "Software Development Process Models". Each process model follows a Series of steps unique to its type, in order to ensure success in process of software development. In today's business having a web site or customer suite is very important for smooth functioning of its operations and due to the aggressive competition in the market .It is significant to select a SDLC model that will not only allow the team to meet the client requirements but also provide high quality software (website) in the least amount of time. This paper focuses on developing a new SDLC frame work to suit the dynamic and highly automated environment of today.Keywords
SDLC, New Fame Work, Web Site Development.References
- Dr. Deepshikha Jamwal “Analysis of Software Development models”
- Roger S pressman “ Software Engineering – A practitioner’s Approach”
- A Research Study on importance of Testing and quality Assurance in Software Development Life Cycle (SDLC) Models by Maneela Tuteja , Gaurav Dubey International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3,July 2012
- Evolving A New Model (SDLC Model-2010)For Software Development Life Cycle (SDLC)PK Ragunath, S. Velmourougan ,P. Davachelvan S. Kayalvizhi, R. Ravimohan, IJCSNS International Journal of Computer Science and Network Security , VOL.10 No.1, January 2010
- A comparative study of different software development life cycle models in different scenarios by Mr.Apoorva Mishra and Deepty Dubey –International journal of advance research in computer science an management studies (Volume 1,issue 5, October2013