Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "2f5f102b-9cce-48d2-8e9d-cd99b8fc04bc"}, "_deposit": {"id": "3698", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3698"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3698", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Transportation of Business Messages by using Data Encryption System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In today’s business environment, controlling access to data is critical to long-term business survivability. We present the system for encrypting the data types such as text files; word documents and images of different formats. Data in transit, across and between company networks, are usually the focus of extensive security efforts. In this paper, we also describe the design, implementation and testing of a security system that enhances the capability of small business to protect information within the boundary of their networks by using DES algorithm. Within the specified network, transactions are encrypted, decrypted and processed by the Internal Control and Employee Agents. The test results indicate that this additional security layer provides a simple solution to the data sharing and transition within an organization’s network. The results of this study will be of significance to owners, managers, and the security personnel responsible for small business network."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "business information"}, {"interim": "security system"}, {"interim": "Internal Control"}, {"interim": "private keys"}, {"interim": "organization’s network"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-29"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "54004.pdf", "filesize": [{"value": "320 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 320000.0, "url": {"url": "https://meral.edu.mm/record/3698/files/54004.pdf"}, "version_id": "03708047-7a26-4154-ac3f-1c8dd43ba2fd"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Thet Htet"}, {"subitem_authors_fullname": "Mar, Win"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1437"}, "item_title": "Transportation of Business Messages by using Data Encryption System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003698", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-29"}, "publish_date": "2019-07-29", "publish_status": "0", "recid": "3698", "relation": {}, "relation_version_is_last": true, "title": ["Transportation of Business Messages by using Data Encryption System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Transportation of Business Messages by using Data Encryption System

http://hdl.handle.net/20.500.12678/0000003698
http://hdl.handle.net/20.500.12678/0000003698
dc4eee09-f4e6-4931-af0c-4f9e6c66987d
2f5f102b-9cce-48d2-8e9d-cd99b8fc04bc
None
Preview
Name / File License Actions
54004.pdf 54004.pdf (320 Kb)
Publication type
Article
Upload type
Publication
Title
Title Transportation of Business Messages by using Data Encryption System
Language en
Publication date 2009-12-30
Authors
Aung, Thet Htet
Mar, Win
Description
In today’s business environment, controlling access to data is critical to long-term business survivability. We present the system for encrypting the data types such as text files; word documents and images of different formats. Data in transit, across and between company networks, are usually the focus of extensive security efforts. In this paper, we also describe the design, implementation and testing of a security system that enhances the capability of small business to protect information within the boundary of their networks by using DES algorithm. Within the specified network, transactions are encrypted, decrypted and processed by the Internal Control and Employee Agents. The test results indicate that this additional security layer provides a simple solution to the data sharing and transition within an organization’s network. The results of this study will be of significance to owners, managers, and the security personnel responsible for small business network.
Keywords
business information, security system, Internal Control, private keys, organization’s network
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1437
Journal articles
Fourth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:20:19.088765
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL