Search Results

Results (3)

Search Parameters:

Keyword: Security Breach
Order results
Results per page
Open AccessArticle
7 Pages, 681 KB Download PDF

An Operational Responsibility and Task Monitoring Method: A Data Breach Case Study

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1157–1163, 2021; DOI: 10.25046/aj0601130
Abstract:

As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 546 KB Download PDF

Modified Blockchain based Hardware Paradigm for Data Provenance in Academia

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 66–77, 2021; DOI: 10.25046/aj060108
Abstract:

Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
10 Pages, 992 KB Download PDF

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 46–55, 2018; DOI: 10.25046/aj030604
Abstract:

This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026