The Empirical Study of the Evolution of the Next Generation Firewalls IJTSRD
Even after the adoption of network security policies and practices, unauthorized intrusion occurs. It is an attack in which attacker gets access to the system by means of different hacking and cracking techniques. Firewall is hardware-software based network security system that uses rules to control incoming and outgoing network packet. A firewall controls access to […]
An Efficient Fast Phrase Search with Nth-Gram For Encrypted Cloud Storage IJTSRD
Cloud computing being a new era in the research community because of its many advantages but it also consists of security and privacy concerns. The access of confidential documents and storage have been identified as one of the main issues in the area. To be precise many researchers tried to find solutions to search over […]
Automated Testing: An Edge Over Manual Software Testing IJTSRD
Software Testing is a process of finding errors while executing a program so that we get a zero defect software. It is aimed at evaluating the capability or usability of a program. Software testing is an important means of accessing quality of software. Complex systems are being built and testing throughout the software development cycle […]
A Novel Secure Cloud SAAS Integration for User Authenticated Information IJTSRD
Organizations are spending a lot of money to maintain their business data using legacy Enterprise content management systems [1], tools, hardware support and maintenance, which are not satisfying the consumers. Box is Novel ECM system which allows the users to store, view, search large value of data with lesser bandwidth to increase user experience for […]
AES Algorithm: Encryption and Decryption IJTSRD
Advanced Encryption Standard (AES) algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world. It is extremely difficult for hackers to get the real data when encrypting […]