Internet Scale DoS Attacks

Author/s name: 
د. رضوان طهبوب و الطالبة سناء سراحنة .
Conference Name: 
The 7th international Conference Information Technology (ICIT15) on May 12, 2015
Corresponding Author Name: 
د. رضوان طهبوب والطالبة سناء سراحنة .
Corresponding Author Email: 
radwant@ppu.edu sanaaa_mm@hotmail.com
Conference Date: 
Tuesday, May 12, 2015
Conference Location: 
Alzaytoonah University الاردن – عمان .
Abstract: 

Abstract—Electronic data interchange can be classified as one

of the important areas of information technology, where the

need for data sharing increasingly required in almost every

field. Data sharing concept can be defined as the process of

interchanging, analyzing, retrieving and integrating data among

multiple data sources in a controlled access manner. The use of

information technology in different areas began to increase since

1980s; the exchange and sharing different types of information

was required at that time. Although data sharing facilitates the

way that data can be exchanged, security concerns arise as

a challenge for conducting data sharing, many polices include

confidentiality and privacy must be taken into consideration. This

study will provide a literature review of security policies, focusing

on privacy models to facilitate data sharing among different

organizations in different areas.As a result for the study there

are diffrent data sharing model that applies diffrent polices to

preserve privacy such as Semantic Privacy-Preserving Model,

Capability-based Access Control Model, and OneSwarm data

sharing Model.

Dean Office
Wadi Al Harya
Building C
Tel : 02-2233050
Ext : 9299
Email : dsr@ppu.edu

مكتب العميد
واد الهرية
مبنى C
هاتف : 02-2233050
داخلي : 9299
بريد الكتروني : dsr@ppu.edu