Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.
Cybersecurity for Jordanians’ adolescents/teens has become a complicated phenomenon representing complex socio-technical concerns for the personalities of adolescents in Jordanian society. Recent cyberattacks have had a significant impact on teens in Jordan, both personally and in terms of their quality of life. As such, it is important to develop strategies to increase cybersecurity awareness among teens in Jordan. This research was conducted in both planned and random areas in Jordan, with the aim of understanding the differences in risk-aware cultures and teens’ opinions and activities after introducing cybersecurity awareness in cyberspace. The study was based on 400 responses, and numerous statistical analyses were applied to the responses from each area, including the validity and reliability test, feasibility test of a variable, correlation test, and carried out using SPSS. Moreover, multiple coefficients of determination, hypothesis testing and partial statistical tests were carried out. The research hypotheses indicate that there is a mediation effect of the cyber scale and personal factors (planned/random) with a 76% acceptance rate. This suggests that understanding the significant association between the cyber scale and the quality-of-life scale is important, and that effective cyber-risk management is critical to realizing the importance of cybersecurity awareness. As such, it is recommended that national cybersecurity programs be launched in all sectors in Jordan. Overall, this research highlights the importance of increasing cybersecurity awareness among teens in Jordan. It is essential that teens are educated on the risks associated with cyberattacks, and that effective strategies are developed to protect them from such attacks. By doing so, teens in Jordan can be better equipped to protect themselves and their society from the dangers of cyberattacks.
Coherent Signal-Subspace (CSS) is a technique to separate the wide frequency band into narrowband components which can be applied in many applications such as smart antennas for wireless communications and radar. However, CSS is computationally intensive and may not achieve the real-time requirement. Therefore, this work aims to propose an efficient implementation of the CSS method on Field-Programmable Gate Array (FPGA) to achieve the desired performance. Different parallelization and optimization techniques such as loop unrolling, loop pipelining, dataflow, and loop flattening are adopted and applied to explore the opportunities of any computation and storage that could be eliminated in order to achieve high efficiency. The results of the proposed optimized implementation achieve the highest performance compared with other related implementations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.