• List of Articles حریم

      • Open Access Article

        1 - A Review of the Semantic and Physical Structure of Sacred Places Inviolable Zone; Based on Works of Travel Literatures written from the fifth to the fourteen centuries A.H
        Mohamad Saeed izadi Nasim Asgari Shahriar Nasekhian
        In Islamic teachings, especially the Shia school of thought, the sanctity of every element is dependent on the divine essence; the closer the element’s attachment, the higher its sanctity. For this reason, the places of worship and sites of pilgrimage cities have for lo More
        In Islamic teachings, especially the Shia school of thought, the sanctity of every element is dependent on the divine essence; the closer the element’s attachment, the higher its sanctity. For this reason, the places of worship and sites of pilgrimage cities have for long been revered, attracting those seeking spirituality. It’s unfortunate that in recent times, overlooking the sanctity of sacred places, also called Inviolable Zones (Ha’rim), has led to the disturbance of integrity in the surrounding area and the distortion of the authenticity of these monuments, often with the excuse of urban development and on occasion for facilitating the pilgrimage itself. Undoubtedly, considering and reviewing related documents such as works of travel literature even if in an overall format, can provide a useful framework for the reconsideration of such destructive activities. This research is an effort to examine the semantic and physical structure of the inviolable zone of sacred places by relying on interpretive-historical methods with the inductive approach. It will discuss here, the contexts, literature and illustrated images of 48 pieces of travel literature dating back to fifth to the fourteenth centuries AH. It concludes that these sacred places have been perceived as “symbols and indications of a pilgrimage city” and were “individual and unique in their surrounding area” with due respect for their “integrated cohesion,” while preserving their interaction with the surrounding residential, commercial, educational, and other functions. Such structures were given the “spatial hierarchy” of the unique urban systems in which they were located. The conclusion explains the respect and sanctity regarding both physical and metaphysical aspects while conserving all tangible and intangible elements of the typology of religious heritage throughout the aforementioned era. The physical structure of the inviolable zone of these sacred places can be divided into three different scales: the core zone, the buffer zone and the sacred precinct which indicates that the holy shrines were not only limited to their surroundings but were deemed to emanate sanctity to the entire city. Finally, it should be considered that traditions, rituals and religious values play an active role in creating the semantic structure of the surrounding inviolable zone. Manuscript profile
      • Open Access Article

        2 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the manag More
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the management and privatization of access to their shared information by other users. In this article, using the concept of social graph, a new model of user access control was proposed to the user, which allows the expression of privacy policies and more accurate and professional access control in terms of pattern and depth of relationships between users in social networks. In this article, by using the regular index method, indirect relationships among users are examined and analyzed, and more precise policies than previous models are presented. The evaluation of the results showed that for 10 neighbors for each user, the probability accumulation of a qualified path for the first three counter loops is 1, 10.5 and 67.3%, respectively, and finally for the fourth counter it reaches 100%. As the defined counting characteristic increases, the average execution time of the proposed algorithm and previously proposed algorithms increases. However, for the higher limits of the counting characteristic, the proposed algorithm performs better than the previous ones. Manuscript profile
      • Open Access Article

        3 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
        As the Internet of Things (IoT) expands and becomes more widespread, we will soon see the dependence of human life on its services. At that time, it would be difficult to imagine the survival without the IoT, and disruption of its services would cause great loss of life More
        As the Internet of Things (IoT) expands and becomes more widespread, we will soon see the dependence of human life on its services. At that time, it would be difficult to imagine the survival without the IoT, and disruption of its services would cause great loss of life and property. Disruption of IoT services can occur for two reasons: network errors due to congestion, collision, interruption and noise, and disruption due to the malicious activities of infiltrator. Also, the destructive activities of infiltrators can lead to various cyber attacks and violation of the privacy of individuals. Therefore, before the interdependence between human life and IoT, it is necessary to consider measures to ensure the quality and security of service and privacy. In this study, a solution to reduce service delay (improve quality) and ensure security and privacy of things by relying on the computing power of nodes available in the Fog Layer has been proposed. The proposed solution simultaneously improves service quality and maintains security and privacy. Other features of presented algorithm in proposed solution of fairness between objects are in terms of the quality of service received and minimizing overhead processing and transfer of expired packages (packages that will certainly experience a consumedly threshold delay). Adherence to fairness ensures that the quality of service of any of the things does not be a subject of the reduction of the delay of the service of the entire network; These aforementioned objects may be subjects of critical applications, such as health. Manuscript profile
      • Open Access Article

        4 - Protecting privacy in cyberspace by emphasizing ethical and legal principles
        hasan badini qafour khoeini hamzeh karami
        Educating privacy and adhering to code of ethics in cyberspace is an important and challenging issue because it is a global, high-speed, accessible, transcendent, transcendental, fluid, augmented and dense reality; Ethical rules and order become more important. At the l More
        Educating privacy and adhering to code of ethics in cyberspace is an important and challenging issue because it is a global, high-speed, accessible, transcendent, transcendental, fluid, augmented and dense reality; Ethical rules and order become more important. At the lower level, at least in the national cyberspace, binding ethical codes need to be approved by the Majlis to become binding law. However, in the cyber space, the issue of disseminating information that is the nature of this environment seems to conflict with the right to privacy. The principles, rules and softwares of the cyber environment have been formulated primarily to facilitate and expedite communication. Whereas in the real environment, the core of morality is the provision of material and spiritual well-being. Thus, in cyber-space privacy violations, especially where the breach is merely cyber-infringement and not real-life cyberbullying, there appears to be an inherent philosophy of cyberspace that facilitates the enforcement of law, which facilitates Is the diffusion and exchange of information, Deterrence should be considered ethical as far as possible, but assumed that breach of privacy in cyberspace will result in material and intellectual damages to individuals; It used civil and criminal bail guarantees in response to them Manuscript profile
      • Open Access Article

        5 - Mutual Continuous Lightweight Authentication Based on Node Prioritization Using Traffic Rates for Internet of Things
        reza sarabi miyanaji sam jabbehdari nasser modiri
        Today, billions of devices are connected via the Internet of Things, often through insecure communications. Therefore, security and privacy issues of these devices are a major concern. Since devices in IoT are typically resource-constrained devices, the security solutio More
        Today, billions of devices are connected via the Internet of Things, often through insecure communications. Therefore, security and privacy issues of these devices are a major concern. Since devices in IoT are typically resource-constrained devices, the security solutions of this environment in terms of processing and memory must be secure and lightweight. However, many existing security solutions are not particularly suitable for IoT due to high computation. So there is a need for a lightweight authentication protocol for IoT devices. In this paper, a mutual lightweight authentication protocol between nodes with limited resources and IoT servers is introduced that uses node prioritization based on traffic rates. This scheme is light due to the use of lightweight XOR and Hash operations. The proposed is resistant to cyber-attacks such as eavesdropping attack, and replay attack. The proposed is also secure using the AVISPA tool in the Dolev-Yao threat model. The security risks of this scheme are low compared to other lightweight methods. In addition, the proposal is compared with existing authentication schemes reduces the computational cost, protects privacy through anonymity of nodes, and provides forward secrecy. In our method, the execute time of authentication is reduced by 15% compared to the other methods. Manuscript profile
      • Open Access Article

        6 - Evaluation of forest road characteristics and comparison with environmental and technical standards (Case study: Tang-e-Sulk Bahmii Protected Area, South Zagros)
        Seyed Ata ollah Hosseini
        The aim of the study is to compare road geometric characteristics with standard road construction values. The study area is Tang-e-Sulak, protected area located in Bahmiy (Kohgiluyeh and Boyerahmad), at the southern Zagros forests. First, the existing road location was More
        The aim of the study is to compare road geometric characteristics with standard road construction values. The study area is Tang-e-Sulak, protected area located in Bahmiy (Kohgiluyeh and Boyerahmad), at the southern Zagros forests. First, the existing road location was taken using GPS and then placed on a topographic map. In the next step, the slopes were graded (from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and > 60 percent), then 11 samples were randomly selected on each slope. In the next step, the size of the samples was compared with the standard values (Booklet No. 131 and 161). The width of the running surface and path of the way were analyzed on the basis of analytical and other road geometric characteristics based on descriptive statistics. Soil samples were taken from each of the slopes’ grades. Data analysis was done by T-test and Pearson correlation in SPSS 22. The results show that the width of the road and the construction area of the road on the slopes 10-20, 40-50, 60-50, and 60 were less than the standard values and it is statistically significance (P<0.01), and in other slopes wasn’t significant differences. Analytical descriptive statistics showed that the average slope of excavation and embankment walls is 15% higher than the standard value. The results of soil texture analysis by unified classification method showed silty- clay texture.Analytical descriptive statistics showed that the average slope of excavation and embankment walls is 15% higher than the standard value.The results of soil texture showed siltyclay texture. Manuscript profile
      • Open Access Article

        7 - The role of territorial behavior in improving the desirability of students' social interactions in academic environments (Case study: Shahid Rajaee University)
        MONA MOHAMMADI hamidreza azemati
        The desirability of students' social interactions plays a fundamental role in enhancing the quality of formal and informal academic spaces. The present study aims to investigate the territorial behavior in the academic environment concerning the concept of "boundary" to More
        The desirability of students' social interactions plays a fundamental role in enhancing the quality of formal and informal academic spaces. The present study aims to investigate the territorial behavior in the academic environment concerning the concept of "boundary" to improve students' social interactions. This study is applied and mixed-method research, in which a survey study is applied to A) evaluate the individuals' views and develop the objective table and contents. Through data collection and employing written sources and semi-structured interviews with psychology and architecture professors B) develop a visual questionnaire, according to the table and distribute them among the research population. In the present study, to fill out the questionnaire, 17 professors are interviewed, and 45 architecture students of Shahid Rajaee University are asked. Data are collected using interviews, observations, and questionnaires. The statistical population includes architecture students of Shahid Rajaee University. Also, the samples are selected by a cluster sampling technique. After classifying the obtained data using SPSS software, they are investigated and analyzed to extract desired boundaries from the students' views utilizing a t-test. Findings indicate that students consider in-between boundaries to be more desirable for spatial privacy in the presence of individuals and friendly gatherings. Manuscript profile
      • Open Access Article

        8 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, More
        With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, including systems, smart devices, industrial systems, and many others. With the immense number of connected objects, information security, and privacy have become significant challenges in IoT computing. This article explores the concept of secure computing in the Internet of Everything. It investigates the impact of the Internet of Things on the concept of security and its related needs. Furthermore, the methods and technologies used to establish secure computing in the Internet of Everything are discussed, including topics such as data encryption, identification and authentication, access management, privacy protection, and threat detection. Additionally, the challenges and drawbacks of secure computing in the Internet of Everything are examined, addressing issues such as the complexity of the connected environment, dynamic security threats, the need for standards and security-related concerns, and the influence of technological changes on secure computing. Finally, solutions and recommendations are provided to enhance secure computing in the Internet of Everything, including the use of strong encryption, centralized access management, user education and awareness, and advanced threat detection and monitoring systems. This article aims to provide a better understanding of secure computing in the Internet of Everything and to develop suitable security solutions for this domain. Manuscript profile
      • Open Access Article

        9 - 1
        1 1
      • Open Access Article

        10 - Open Data Accessing Policymaking in Iran, in the Aspect of Preserving Privacy and Personal Data Ownership
        Behrooz Eliasi معصومه صادقی نسرین دسترنج Mehdi Hosseinpour Tahereh Mirsaeedghazi
        Enhancing accessibility to open data ensures to promote the research, innovation, and extension of solutions confronting with complex social challenges in our country. Offered policies by OECD and other scientific associations, is an emphasis on this strategy. Certainly More
        Enhancing accessibility to open data ensures to promote the research, innovation, and extension of solutions confronting with complex social challenges in our country. Offered policies by OECD and other scientific associations, is an emphasis on this strategy. Certainly, implementing the strategy needs stablishing governance systems, clarifying processes, and trustiness guarantee to research and business areas. The main part of valuable data resources is personal in nature and gathering, storage, and processing them in cybernet is an enormous source of earning for data-driven businesses. Including the main challenges in trustiness issue, are decision making on privacy policies and ownership. In this paper, considering the complexity in ownership concept for personal data ecosystem, challenges on offered policies like OECD reports will be negotiated to enhance open data. Also, shortages in E-trade and cybercrime rules in our country are briefly debated. Then, aiming to suggest an accessing policy to open data, referring to public sensitiveness to personal data, firstly the detailed conclusions of a field study including realizing criterias of goal and possibly policymaking will be extracted by Delphi method. This work shows the public awareness in this subject, even in an excellence target community, is not desirable. Moreover, trustiness in privacy for personal data, hoping to effective law performance on violations, is not satisfiable. Finally, with a field evaluation by FAHP method, policymaking options will be measured and analysed and strategic requirements for performing elected policy will be suggested. Manuscript profile
      • Open Access Article

        11 - U.S. Judicial Opinion on Civil Liability Resulting from Breaches in Privacy
        Masoumeh  Mazaheri Mahsa Jamshidi Shahmiri
        Civil liability rights play a significant role in supporting privacy rights of people. Civil liability laws shall guarantee fair indemnification of losses sustained to people and shall prevent emergence of tort in the society. In U.S. law, along with conventional civil More
        Civil liability rights play a significant role in supporting privacy rights of people. Civil liability laws shall guarantee fair indemnification of losses sustained to people and shall prevent emergence of tort in the society. In U.S. law, along with conventional civil liability, modern civil liability has clarified the fundamentals and pillars of various types of civil liability resulting from breaches in privacy. This paper, developed through descriptive-analytical method, reviews fundamentals, pillars and exceptions of various types of civil liability resulting from breaches in privacy in the legal system of the United States. Findings of the paper indicate that in the civil liability resulting from breaches in privacy, the U.S. legal system has duly recognized privacy right as an independent right and has accordingly established an integrated judicial procedure related to civil liability resulting from breaches in privacy. Manuscript profile
      • Open Access Article

        12 - Explanation the role of standardization in the proposed solutions for privacy protection in health data
        batool mehrshad Mohammad mehraeen Mohammad Khansari saeed mortazavi
        Introduction: Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection,this article aims to answer a critical question that is,does standardization play a role in the proposed More
        Introduction: Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection,this article aims to answer a critical question that is,does standardization play a role in the proposed solutions for health data privacy protection? Methods: The present study is a systematic review conducted by searching databases such as Web of Science, PubMed, ScienceDirect, Springer, Magiran and SID and by applying a time limit filter.After applying the criteria for inclusion and exclusion and evaluating the results,relevant studies were selected. Findings: Articles addressing standardization and privacy protection in health data have been analyzed by taking 5 indicators into account. The need for standardization and its role to preserve privacy in health data have also been explained by examining the findings and discussing various laws related to privacy in the health field and its relationship with standardization.After the investigation,our study reveals that due to the technical structure of the fourth and fifth generation of health care, which has facilitated standardization, privacy protection can also be achieved through standardization.Finally,directions for future research on this topic are also suggested. Conclusion: The results of this research showed that the fourth- and fifth-generation health care systems that are technology-oriented; are formed based on standards,and these standards provide the possibility of their evaluation. Thus if laws related to health data privacy protection are developed based on standards,they will have a high execution guarantee. This further highlights the critical role of standard development organizations in this field. Manuscript profile
      • Open Access Article

        13 - Explanation of Standardization Role in the Proposed Solutions for Privacy Protection in Health Data
        batool mehrshad mohammad mehraeen Mohammad Khansari saeed mortazavi
        Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection, this article aims to answer a critical question that is, does standardization play a role in the proposed solutions f More
        Due to the importance of data sharing in the digital era and the two main considerations related to it that are; standardization and privacy protection, this article aims to answer a critical question that is, does standardization play a role in the proposed solutions for health data privacy protection? The present study is a systematic review conducted by searching databases such as Web of Science, PubMed, ScienceDirect, Springer, Magiran and SID and by applying a time limit filter. After applying the criteria for inclusion and exclusion and evaluating the results, relevant studies were selected. Articles addressing standardization and privacy protection in health data have been analyzed by taking 5 indicators into account. The need for standardization and its role to preserve privacy in health data have also been explained by examining the findings and discussing various laws related to privacy in the health field and its relationship with standardization. After the investigation, our study reveals that due to the technical structure of the fourth and fifth generation of health care, which has facilitated standardization, privacy protection can also be achieved through standardization. Finally, directions for future research on this topic are also suggested. The results of this research shows that the fourth- and fifth-generation health care systems that are technology-oriented; are formed based on standards, and these standards provide the possibility of their evaluation. Thus if laws related to health data privacy protection are developed based on standards, they will have a high execution guarantee. This further highlights the critical role of standard development organizations in this field. Manuscript profile