Show simple item record

dc.contributor.authorAl-Saadoon, Ghossoon, .M. W.
dc.date.accessioned2010-08-23T01:23:33Z
dc.date.available2010-08-23T01:23:33Z
dc.date.issued2009
dc.identifier.citationJournal of Computer Science, vol.5(9), 2009, pages 661-665en_US
dc.identifier.issn1549-3636
dc.identifier.urihttp://www.thescipub.com/abstract/?doi=jcssp.2009.661.665
dc.identifier.urihttp://dspace.unimap.edu.my/123456789/8978
dc.descriptionLink to publisher's homepage at http://www.thescipub.com/en_US
dc.description.abstractProblem statement: Open Source technologies are interesting in that they allow free experimentation and integration by anyone and anywhere. A Jabber user can control presence with very little effort. Another user, regardless of external platform, must subscribe to your presence. You have the choice of rejecting or accepting the subscription at the time it is submitted. Approach: Other applications of this system were yet to be discovered. Jabber is a work in progress; the community learns and creates applications of the protocol/platform on an almost daily basis. This study aimed to implement a security algorithm for developed instant messaging. Results: The objective was to make sure that flow of data from client application or computer is not tapped by a hacker and also to make it difficult for a network data sniffer to explore the situation. In this study there were many aspects must be understood such as: Jabber protocol, programming language and security aspect. For this reason it was proposed to develop a new secure connection and makes sure that the connection between clients and server is safe and secure when the instant massage had been transferred using jabber protocol. Conclusion/Recommendations: To develop a new secure connection for instance message using jabber protocol or other names, the Extensible messaging and presence protocol had been used. To make it secure the open secure socket layer will be used for general-purpose encryption. In this study the methodology used to solve security threats like: The ability to control access to IM applications, audit and archive IM conversation, the ability to lockout unauthorized IM and peer-to-peer file sharing connections and Encryption.en_US
dc.language.isoenen_US
dc.publisherScience Publicationsen_US
dc.subjectSecure socket layer and PSIen_US
dc.subjectSecurity aspecten_US
dc.subjectXEPen_US
dc.subjectXMPPen_US
dc.subjectJabber Protocolen_US
dc.titleA platform to develop a secure instant messaging using jabber protocolen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record