Shadi R. Masadeh
Al-Isra University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shadi R. Masadeh.
International Journal of Cloud Applications and Computing archive | 2013
Abdullah Alhaj; Shadi Aljawarneh; Shadi R. Masadeh; Evon M. O. Abu-Taieh
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service QoS constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism SDTM with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System MPDS which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.
Network Security | 2012
Shadi R. Masadeh; Nedal Turab; Farhan Obisat
E-learning involves the use of the Internet as a communications medium between instructors and students who are separated by physical distance. 1 Wireless networks have become very common in this environment, often replacing wired networks, in order to provide mobile access to educational systems and the Internet for students and staff. But these networks must be secured.
networked digital technologies | 2010
Ali Al-Haj; Ashraf Odeh; Shadi R. Masadeh
Due to the increasing use of databases in many real-life applications, database watermarking has been suggested lately as a vital technique for copyright protection of databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in Arabic character attributes. Experimental results demonstrate the robustness of the proposed algorithm against common database attacks.
International Journal of Information Security and Privacy | 2013
Shadi R. Masadeh; Shadi Aljawarneh; Ashraf Odeh; Abdullah Alhaj
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal access and stopping the illegal operation. Such system combines the watermarking techniques with the cryptography methods in order to provide the highest visible security component that influences on the end user through its daily payment interaction with business.
intelligent semantic web services and applications | 2010
Nedal Turab; Shadi Aljawarneh; Shadi R. Masadeh
Wireless Local Area Networks (WLANs) offer the organizations and users many benefits such as mobility, increased productivity and low cost of installation. This paper presents a proposal of deploying WLAN technology in hospitals. It starts with a brief review of the Health Level 7 (HL7), which is used to transfer medical records and data. In addition, a proposal of hospital network that makes use of a new Wi-Fi protocol, called Wi-Fi Protected Setup (WPS). The WPS is used to setup WLAN in easy and secure manner that meets the different requirements of hospitals, and the HL7 standard security requirements.
intelligent semantic web services and applications | 2010
Mohamad Al-Jedaiah; Shadi R. Masadeh; Aymen M. Abu-Errub; Ahmad Yousef Areiqat
This paper aims to identify the impact of Web Applications on the decision-making process in the public sector. By citing international experiences (The Taxation System in Europe Union) and the Solid Waste Association of North America as case studies. The most important findings were firstly that the public sector has to gather complex information through using technological equipments and software. Secondly, public sector organizations can build their own web applications. And finally, Web applications provide a significant help to the decision maker, and enable to exchange information with other governments.
networked computing and advanced information management | 2010
Shadi R. Masadeh; Shadi Aljawarneh; Nedal Turab; Aymen M. Abu-Errub
International Journal of Computer Networks & Communications | 2013
Nidal M. Turab; Anas Abu Taleb; Shadi R. Masadeh
Archive | 2011
Shadi R. Masadeh; Nidal M. Turab
Archive | 2014
Ahmad Azzazi; Hesham Abusaimeh; Shadi R. Masadeh