Conceptual model for communication

SA Fedaghi, A Alsaqa, Z Fadel - arXiv preprint arXiv:0912.0599, 2009 - arxiv.org
A variety of idealized models of communication systems exist, and all may have something
in common. Starting with Shannons communication model and ending with the OSI model …

Modeling communication: one more piece falling into place

S Al-Fedaghi - Proceedings of the 26th annual ACM international …, 2008 - dl.acm.org
A variety of idealized models of communication systems exist, and all may have something
in common. Starting with Shannon's communication model and ending with the seven layers …

Scrutinizing the rule: Privacy realization in HIPAA

S Al-Fedaghi - … Journal of Healthcare Information Systems and …, 2008 - igi-global.com
Privacy policies, laws, and guidelines have been cultivated based on overly verbose
specifications. This article claims that privacy regulations lend themselves to a firmer …

Modeling attacks

S Al-Fedaghi, S Moein - International journal of safety and security …, 2014 - witpress.com
The aim of this paper is to develop a general conceptual model of attack progression that
can be applied to modeling of computer and communication threat risks. This paper focuses …

Flow-based description of conceptual and design levels

S Al-Fedaghi - 2009 International Conference on Computer …, 2009 - ieeexplore.ieee.org
Building an information system involves a first phase of conceptual modeling of the
ldquoreal world domain, rdquo then a second phase of design of the software system. For …

[PDF][PDF] On security development lifecycle: Conceptual description of vulnerabilities, risks, and threats

S Al-Fedaghi, A Alkandari - … of Digital Content Technology and its …, 2011 - researchgate.net
Abstract Security Development Lifecycle (SDL) is a software assurance methodology that
aims at assisting software developers in improving the security of software production …

Scrutinizing UML activity diagrams

S Al-Fedaghi - Information Systems Development: Towards a Service …, 2010 - Springer
Building an information system involves two processes: conceptual modeling of the “real
world domain” and designing the software system. Object-oriented methods and languages …

Anatomy of personal information processing: application to the EU privacy directive

SS Al-Fedaghi - … Journal of Liability and Scientific Enquiry, 2007 - inderscienceonline.com
The term'processing'(in relation to personal data) and its derivatives occur 213 times in the
EU Privacy Directive. Yet the directive defines it in imprecise language. This paper …

[PDF][PDF] Engineering privacy revisited

S Al-Fedaghi - Journal of Computer Science, 2012 - researchgate.net
Problem statement: Information Privacy Engineering (IPE) is the field that studies the
protection of privacy in information and communication systems. The theoretical …

Information stream based model for organizing security

B Thalheim, S Al-Fedaghi… - 2008 Third International …, 2008 - ieeexplore.ieee.org
One of the most important aspects of security organization is to establish a framework to
identify security-significant points where policies and procedures are declared. The …