{"created":"2020-09-01T13:20:16.304847+00:00","id":3698,"links":{},"metadata":{"_buckets":{"deposit":"2f5f102b-9cce-48d2-8e9d-cd99b8fc04bc"},"_deposit":{"id":"3698","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3698"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3698","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Transportation of Business Messages by using Data Encryption System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In today’s business environment, controlling access to data is critical to long-term business survivability. We present the system for encrypting the data types such as text files; word documents and images of different formats. Data in transit, across and between company networks, are usually the focus of extensive security efforts. In this paper, we also describe the design, implementation and testing of a security system that enhances the capability of small business to protect information within the boundary of their networks by using DES algorithm. Within the specified network, transactions are encrypted, decrypted and processed by the Internal Control and Employee Agents. The test results indicate that this additional security layer provides a simple solution to the data sharing and transition within an organization’s network. The results of this study will be of significance to owners, managers, and the security personnel responsible for small business network."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"business information"},{"interim":"security system"},{"interim":"Internal Control"},{"interim":"private keys"},{"interim":"organization’s network"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-29"}],"displaytype":"preview","filename":"54004.pdf","filesize":[{"value":"320 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3698/files/54004.pdf"},"version_id":"03708047-7a26-4154-ac3f-1c8dd43ba2fd"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Thet Htet"},{"subitem_authors_fullname":"Mar, Win"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1437"},"item_title":"Transportation of Business Messages by using Data Encryption System","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-29","publish_status":"0","recid":"3698","relation_version_is_last":true,"title":["Transportation of Business Messages by using Data Encryption System"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:48:06.064088+00:00"}