Abstracted and indexed in:
Future:
A Systematic Literature Review on the Security and Privacy of the Blockchain and Cryptocurrency
Aslinda Hassan, Mohd Zaki Mas'ud, Wahidah Md. Shah, Shekh Faisal Abdul-Latip, Rabiah Ahmad, Aswami Ariffin & Zahri Yunos
A blockchain can be summarized as a decentralized ledger of all transactions across a peer-to-peer network. It is the main technology behind the large number of diverse cryptocurrencies that are currently available in circulation. Since its introduction, the blockchain technology has shown promising application prospects and attracted lot of attention from both academia and industry.
Cloud Forensic Challenges and Recommendations: A Review
Warusia Yassin, Mohd Faizal Abdollah, Rabiah Ahmad, Zahri Yunos & Aswami Ariffin
Cloud computing becomes more popular since the emergence of the Fourth Industrial Revolution (IR 4.0) as almost all internet services are highly dependent on high-end networks of server computers. The large-scale used on the internet around the world may cause the cloud server to be highly exposed to cyber threats and it is very difficult to apply forensic method specifically in conducting cloud forensic investigation.
Digital Certificate’s Level of Assurance Development with Information Value and Sensitivity Measurement
Nikson Badua Putra & Arry Akhmad Arman
This paper presents the research to develop the digital certificate's level of assurance. The level of assurance (LoA) in this paper is a level of assurance which reflects the authenticity degree of digital certificate's ownership. This LoA has a three-level, which define in four LoA standards such as ISO 29115: 2013, NIST SP 800-63-3, STORK, and KANTARA.
Identity-Division Multiplexing Technique for Enhancing Privacy of Paging Procedure in LTE
Abdulrahman Muthana & Abdulraqeb Al-Samei
Despite efforts have been made by Long Term Evolution (LTE) toward enhancing privacy preserving capabilities, LTE is still vulnerable to privacy attacks. This paper evaluates the privacy issues of paging procedure in LTE and suggests a solution for enhancing the privacy of paging procedure in LTE. The solution introduces the Identity-Division Multiplexing (IDM) technique, in which the total sequence of temporary mobile subscriber identifiers M-TMSIs (232 unique M-TMSI identities) is divided into a series of overlapping M-TMSIs ranges, each of which is allocated to one or more user equipment (UE).
Knowledge Impact on Information Quality, Service Quality and System Quality for Security of 1GovUC
Rossly Salleh & Azni Haslizan Ab Halim
The users play a crucial role in information system (IS) implementation. They are the ones who learned, utilized, and experienced the system. Studying and understanding user satisfaction are important since user satisfaction – along with the quality of the system, the utilization by the users, and the support the users received during the system implementation – are all important aspects that influenced the IS success.
Malware Discovery using Lebahnet Technology
Fathi Kamil Mohad Zainudin, Izzatul Hazirah Ishak, Sharifuddin Sulaman, Farah Ramlee, Nur Sarah Jamaludin & Shuaib Chantando
Recent trends indicate that the cyber-crimes caused by the malware is increasing as these malicious tools are authored to spread through multiple platform and affecting the millions of users. In order to explore new attack and exploitation trends, virtual honeypot is used to simulate the virtual computer systems at the network level.
Securing the OLSR Routing Protocol
Amin Nurian Dehkordi & Fazlollah Adibnia
Mobile Ad-hoc networks are self-organized wireless mobile networks that do not rely on any fixed network infrastructure. Due to limited capability including battery, local memory, CPU cycle, any design of protocols in these networks has to consider these limitations. Trust always exists in protocols, which their running are based on cooperation, especially in routing operations between the nodes in these networks.
The Development of Constraints in Role-based Access Control: A Systematic Review
Nazirah Abd Hamid, Rabiah Ahmad & Siti Rahayu Selamat
Role-based access control (RBAC) model attracts many organizations to transform their traditional access control method to RBAC model mainly because of the security features in the RBAC. The RBAC model is generated to achieve security objectives and to do so, RBAC enforces various constraints to accomplish those objectives.