Claim Missing Document
Check
Articles

Found 2 Documents
Search

A Noble Security Analysis of Various Distributed Systems Akter, Sworna; Hossain, Md. Alamgir; Rahman Redoy Akanda, Md. Mojibur
International Journal of Engineering, Science and Information Technology Vol 1, No 2 (2021)
Publisher : Department of Information Technology, Universitas Malikussaleh, Aceh Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1132.216 KB) | DOI: 10.52088/ijesty.v1i2.101

Abstract

Distributed systems increased the performance of a system by allowing applications to be processed in parallel. It helps us to share resources like printers, computers, storage facilities, data, files, web pages, networks, and thus it reduces the cost by shaing a single resource among several users instead of multiple resources. Since multiple machines communicate with each other through the network so they can be easily affected by the attacker and the full system should be corrupted. Users can access remote and local resources but they also may not aware of which machines their processes are running on. So, secure communiction of a distributed system is the most important issue. We need to analyze various vulnerabilities and can take proper protection of the system. In this paper, we discuss different architectural styles of distributed systems. Also, hold up different threads and protection mechanisms to get rid of these threads. The most focusing part of this paper is a summary of various distributed systems security. Here we hold up different distributed system security techniques like SSSE algorithm, BLCS architecture, ODIS algorithm, two eavesdropper model, dynamic cuckoo filter, etc. Finally, we summarize the full discussion like used methodology or architecture, advantages, disadvantages, accuracy, and future work in a table by which an author can easily gather knowledge about the summary of this paper. To better understanding, we show the result of various papers with a visual representation. I think it helps authors to know about security techniques and grow interested to work in this area.
Perception of corruption across gender, religion, and socioeconomic status Saha, Asoke Kumar; Dogra, Atanu Kumar; Bairagi, Arunavo; Singh, Vijay Pratap; Hossain, Md. Alamgir; Pata, Sayma Akter
Humanitas: Indonesian Psychological Journal Volume 20 (2) 2023
Publisher : HUMANITAS published by Universitas Ahmad Dahlan.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/humanitas.v20i2.120

Abstract

Corruption is a critical issue for Bangladesh, including corruption in higher education. The present study explored the perception of corruption based on gender, religion, and socioeconomic status with factorial survey research design. One hundred twenty participants were selected by purposive sampling technique from male and female university students aged 20-26 years. All the participants were studying in public and private universities. Personal Information Form (PIF) and Perception of Corruption Scale (PCS) were used for this study. The PCS measured the respondents’ level of perception about corruption consisting of 18 items. One-way analysis of variance and t-test were applied to analyze the data. The result indicates no significant difference in perception of corruption based on gender. In contrast, there is a significant difference in the perception of corruption based on religion, with the Hindus having the lowest perception of corruption. Moreover, there is a significant difference in perception of corruption based on socioeconomic status. Therefore, university students’ perceptions of different corrupt practices need to be addressed.