Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shadi R. Masadeh is active.

Publication


Featured researches published by Shadi R. Masadeh.


International Journal of Cloud Applications and Computing archive | 2013

A Secure Data Transmission Mechanism for Cloud Outsourced Data

Abdullah Alhaj; Shadi Aljawarneh; Shadi R. Masadeh; Evon M. O. Abu-Taieh

The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service QoS constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism SDTM with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System MPDS which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.


Network Security | 2012

A secure model for building e-learning systems

Shadi R. Masadeh; Nedal Turab; Farhan Obisat

E-learning involves the use of the Internet as a communications medium between instructors and students who are separated by physical distance. 1 Wireless networks have become very common in this environment, often replacing wired networks, in order to provide mobile access to educational systems and the Internet for students and staff. But these networks must be secured.


networked digital technologies | 2010

Copyright Protection of Relational Database Systems

Ali Al-Haj; Ashraf Odeh; Shadi R. Masadeh

Due to the increasing use of databases in many real-life applications, database watermarking has been suggested lately as a vital technique for copyright protection of databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in Arabic character attributes. Experimental results demonstrate the robustness of the proposed algorithm against common database attacks.


International Journal of Information Security and Privacy | 2013

Secure Communication: A Proposed Public Key Watermark System

Shadi R. Masadeh; Shadi Aljawarneh; Ashraf Odeh; Abdullah Alhaj

The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.


intelligent semantic web services and applications | 2010

A study of secure deployment of wireless technology in the medical fields

Nedal Turab; Shadi Aljawarneh; Shadi R. Masadeh

Wireless Local Area Networks (WLANs) offer the organizations and users many benefits such as mobility, increased productivity and low cost of installation. This paper presents a proposal of deploying WLAN technology in hospitals. It starts with a brief review of the Health Level 7 (HL7), which is used to transfer medical records and data. In addition, a proposal of hospital network that makes use of a new Wi-Fi protocol, called Wi-Fi Protected Setup (WPS). The WPS is used to setup WLAN in easy and secure manner that meets the different requirements of hospitals, and the HL7 standard security requirements.


intelligent semantic web services and applications | 2010

The impact of web applications on decision-making process in the public sector

Mohamad Al-Jedaiah; Shadi R. Masadeh; Aymen M. Abu-Errub; Ahmad Yousef Areiqat

This paper aims to identify the impact of Web Applications on the decision-making process in the public sector. By citing international experiences (The Taxation System in Europe Union) and the Solid Waste Association of North America as case studies. The most important findings were firstly that the public sector has to gather complex information through using technological equipments and software. Secondly, public sector organizations can build their own web applications. And finally, Web applications provide a significant help to the decision maker, and enable to exchange information with other governments.


networked computing and advanced information management | 2010

A comparison of data encryption algorithms with the proposed algorithm: Wireless security

Shadi R. Masadeh; Shadi Aljawarneh; Nedal Turab; Aymen M. Abu-Errub


International Journal of Computer Networks & Communications | 2013

CLOUD COMPUTING CHALLENGES AND SOLUTIONS

Nidal M. Turab; Anas Abu Taleb; Shadi R. Masadeh


Archive | 2011

A Formal Evaluation of the Security Schemes for Wireless Networks

Shadi R. Masadeh; Nidal M. Turab


Archive | 2014

CPU Utilization for a Multiple Video Streaming Over a Fiber Optic ATM-Network when Varying the Quality of Service

Ahmad Azzazi; Hesham Abusaimeh; Shadi R. Masadeh

Collaboration


Dive into the Shadi R. Masadeh's collaboration.

Top Co-Authors

Avatar

Shadi Aljawarneh

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aymen M. Abu-Errub

Al-Ahliyya Amman University

View shared research outputs
Top Co-Authors

Avatar

Nedal Turab

Applied Science Private University

View shared research outputs
Top Co-Authors

Avatar

Abdullah Alhaj

Information Technology University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ali Al-Haj

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Farhan Obisat

Applied Science Private University

View shared research outputs
Top Co-Authors

Avatar

Mohamad Al-Jedaiah

Al-Ahliyya Amman University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge