

Quality Control Approach in Developing Software Projects |
Pages: 1-5 (5) | [Full Text] PDF (304 KB) |
Viktorija Stepanova |
Department of Computer Science and Information Technology, Riga Technical University, Riga, Latvia |
Abstract - Achievements in a unified digital market raise a topical question on provision of high quality software. Mistakes correction and the quality control have impact on the project. The proposed method provides understanding on the software progress condition with its strong and weak sides. |
Index Terms - Process Assessment, Process-Orientation, Six Sigma, Software Quality Management, Software Engineering |
C itation - Viktorija Stepanova. "Quality Control Approach in Developing Software Projects." International Journal of Computer Science and Software Engineering 8, no. 1 (2019): 1-5. |
Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification |
Pages: 6-11 (6) | [Full Text] PDF (466 KB) |
N Gupta, A Saxena |
Department of CSE, Truba Institute of Engineering & Information Technology, Bhopal, India |
Abstract - Here in this paper a new and efficient technique for the Cohort of Keys using Tree based Algorithm is proposed for the Sharing of Data in Secure manner. The Key Group Procedure is implemented for the Sharing of Data where Data Owner who needs to send Data is first Encrypted Information using Tree grounded Key Group and then when Data is received at the other end it is decrypted and Classify as Normal or Abnormal Packet. The Planned Practise realized provides Privacy from various attacks as well as provides less computational and Communication Cost. |
Index Terms - Tree based Key Generation, AES, User Revocation, Entropy, Network Security, Group Key Establishment |
C itation - N Gupta, A Saxena. "Key Generation using Ternary Tree based Group Key Generation for Data Encryption and Classification." International Journal of Computer Science and Software Engineering 8, no. 1 (2019): 6-11. |
An Architecture for Big Data Privacy in the Hybrid Cloud |
Pages: 12-19 (8) | [Full Text] PDF (470 KB) |
WA Shehri |
Department of Computer Science King Abdul-Aziz University Jeddah, KSA |
Abstract - The tremendous increases in the amounts of data generated and gathered by computer systems constitute a growingproblem, as corporations tend to invest in hardware and software infrastructure but then use only a very limitedproportion of these resources. Cloud computing was created to resolve this issue, with the vast amounts of data beingtermed. |
Index Terms - Software Architecture, Big Data, Hybrid Cloud, Privacy |
C itation - WA Shehri. "An Architecture for Big Data Privacy in the Hybrid Cloud." International Journal of Computer Science and Software Engineering 8, no. 1 (2019): 12-19. |