The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment....
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2004
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/1200/1/HASNIRA_MD._LAZIM.pdf https://etd.uum.edu.my/1200/2/1.HASNIRA_MD._LAZIM.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.1200 |
---|---|
record_format |
uketd_dc |
spelling |
my-uum-etd.12002013-07-24T12:10:53Z The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment 2004 Hasnira, Md. Lazim Sekolah Siswazah Graduate School QA76 Computer software The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption. 2004 Thesis https://etd.uum.edu.my/1200/ https://etd.uum.edu.my/1200/1/HASNIRA_MD._LAZIM.pdf application/pdf eng validuser https://etd.uum.edu.my/1200/2/1.HASNIRA_MD._LAZIM.pdf application/pdf eng public masters masters Universiti Utara Malaysia Benjamin, LaiL (2002) .Broadband Network & Device Security. Brandon A Nordin.18-21 Bradley, J. (2000). The SSLP Refeference Implementation Project. Retrieve 28 April 2004 from http://ww.cs.bris.ac.uk/~bradley/publish/SSLP/contents.html Danesh, A., Mehrassa, A & Lau, F. (2002). Safe and Secure - Your Home Network and Protect Your Privacy Online. Indiana:Sams Publishing ELSIE FOH.(2002). DBS to ensure safety, hacker incident not taken lightly. Retrieve 24 March 2004 from http: //www.sensecurity.org/dbs.htm Kangas, E. (2003). The Care For Secured Email. Retrieve 24 March 2004 from http: //www.luxsci.com/extranet/articles/email-security.html#1 Karagiannis, K (2002). Securing Your E-Mail, Retrieve 24 March 2004 from http:// www.pcmag.com/category2/0,1738,671308,00.asp Lawnham, D. (2001). Student expelled for Email Fraud Australian IT. Retrieve 10 March 2004 from http://australianit.news.com.au Miller, G. (2002). Infomation Hiding:Past, Present, Future. Retrieve 24 March 2004 from http: //www.eco.utexas.edu/faculty/Norman/BUS.FOR/course.mat/SSim/ Netscape.com. (2004). Netscape’s Tech Briefs. Retrieve 8 April 2004 from http:// home.netscape.com/security/techbriefs/index.html Noorulsadiqin Azbiya (2003). Utilizing Snort in the Analysis of Intrusion Detection System. Universiti Utara Malaysia. Rabaiotti, J. (2003). In+Implementing an RSA Crypptographt System for Windows. Retrieve 28 March 2004 from hm://www.cs.cf.ac.uk/user/Antonia.J.jones/Freeware/Encryption/JRabaiottiReport.pdf Schneier, B. (1996). Applied Cryptogtaphy: Protocols, Algorithms and Source Code in C. Second Edition. USA : John Wiley & Sons Inc Schneier, B. (1995). E-Mail Security- How to Keep Your Electronic Message Private. USA: John Wiley 8 Sons Inc Setco.org. (2004). SET Secure Electronic Transaction LLC. Retrieve 8 April 2004 from http://www.setco.org/setmark/ Singh, S (1999) The Code Book. USA: Fourth Estate Soft Alley Inc. (2003). Cryptographic Technologies-A Comparison. Retrieve 28 March 2004 from http: //ww.softalley.com/products/gargoyle/3.11/eSecure.html Splaine, S. (2002). Testing Web Security Assessing the Security of Web Sites and Application. Indiana: John Wiley & Sons Inc Stein, L.D. (1998). Web Security: A Step by Step Reference Guide. Massachussetts: Addison-Wesley. Tuban, E. & Aronson, J. E. (2001). Decision Support Systems and Intellegent Systems. New Jersey: Prentice Hall. VeriSign.com. (2004). VeriSign, int. Retrieve 8 April 2004 from http: //www.verisign.com/ Whitman, M. E. & Mattord, H. J. (2003). Principles of Information Security. Massachusetts:Thomson Course Technologies |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Hasnira, Md. Lazim The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment |
description |
The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. The methodology and testing procedure which are used during this evaluation is based on a simulation model. Result from the evaluation set constructed is found able to show the performance of the cryptography system. ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Hasnira, Md. Lazim |
author_facet |
Hasnira, Md. Lazim |
author_sort |
Hasnira, Md. Lazim |
title |
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
|
title_short |
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
|
title_full |
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
|
title_fullStr |
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
|
title_full_unstemmed |
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
|
title_sort |
implementation of securing plaintext file using cryptography method in web based environment |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Sekolah Siswazah |
publishDate |
2004 |
url |
https://etd.uum.edu.my/1200/1/HASNIRA_MD._LAZIM.pdf https://etd.uum.edu.my/1200/2/1.HASNIRA_MD._LAZIM.pdf |
_version_ |
1747827094077833216 |