• List of Articles Security.

      • Open Access Article

        1 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
        Fateh  Moradi Abasali  Rahbar
        The main aim of this paper is to investigate Liberalism, Totalitarianism, and security as discourses that related to Bio-Politics. The goal of discourse is making subject that is identified by his/her norms and controls in daily life. In this current text we want to rev More
        The main aim of this paper is to investigate Liberalism, Totalitarianism, and security as discourses that related to Bio-Politics. The goal of discourse is making subject that is identified by his/her norms and controls in daily life. In this current text we want to reveal relation of mentioned discourses to bio-politics and body-politics. Relation of discourses to body- politics have been developing in twenty century in theories and multiple texts. On the considering this texts, legislations and actions that tending to classification of bodies and population is one of main preoccupation of discourses in recent century. Norms of economical body or body which should be a productive body of capital, other body and security comes of mentioned discourses. Part of often researches have used to Michael Foucault though, therefore in recent text we used genealogy. So, our hypothesis is the Liberalism, Totalitarianism, and security are strongly to bio-politics, and originally they comes of elements of bio-politics. Consequently, current systems has been founded as bio-political discourses, due to accruing global/ local subjects. Manuscript profile
      • Open Access Article

        2 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the manag More
        With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the management and privatization of access to their shared information by other users. In this article, using the concept of social graph, a new model of user access control was proposed to the user, which allows the expression of privacy policies and more accurate and professional access control in terms of pattern and depth of relationships between users in social networks. In this article, by using the regular index method, indirect relationships among users are examined and analyzed, and more precise policies than previous models are presented. The evaluation of the results showed that for 10 neighbors for each user, the probability accumulation of a qualified path for the first three counter loops is 1, 10.5 and 67.3%, respectively, and finally for the fourth counter it reaches 100%. As the defined counting characteristic increases, the average execution time of the proposed algorithm and previously proposed algorithms increases. However, for the higher limits of the counting characteristic, the proposed algorithm performs better than the previous ones. Manuscript profile
      • Open Access Article

        3 - Moderation and it's role in security’s Soul in Plato
         
        This study, in order to solve the problem of unrest and anxiety of modern man, leaning on Plato's views, shows that Including ways to gain the Psychological security is man’s persist on virtues that moderation is headed. Plato after drawing of human dignity in being as More
        This study, in order to solve the problem of unrest and anxiety of modern man, leaning on Plato's views, shows that Including ways to gain the Psychological security is man’s persist on virtues that moderation is headed. Plato after drawing of human dignity in being as rational’s being and based in network of Ideas kinship, analysis understanding’s folk of moderation and rethinking it. According to him, the public perception of the concept of moderation in the sense of self- control, in addition to inherent contradiction of its own and function only personal,lead to camouflage the real reason, because moderation is the result of the systematic and harmonious soul of the rule of the reason over force condemned achieved and thereby directed a person to stability in soul and immunity and resistance against all kinds of emotional and provides in this way comfort her.So according to Plato, inner peace is based on internal issue and always manifestation on order of soul. Accordingly, it can be said, the most important factor of unrest contemporary human is epistemological crisis of himself and his inner power. Therefore, to solve the crisis, should be reminds him divine nature of the soul and the ruling order of it, which is, formulated in the philosophy of Plato the virtue of moderation Manuscript profile
      • Open Access Article

        4 - Membership in social network son the level of identification and social security adolescents
        Abbas Ali  Shahidi
        Social networks are consequence of Internet and ICT applications. The study aimed to investigate the effect of membership in a social network virtual on the level of Identification and sense of security adolescents. The research was descriptive and causal- comparative. More
        Social networks are consequence of Internet and ICT applications. The study aimed to investigate the effect of membership in a social network virtual on the level of Identification and sense of security adolescents. The research was descriptive and causal- comparative. The population was consist of all boys and girls in the city of Arak that selected 200 people with using purposive sampling. To collect data was used Question naira sordid gentrification (ISI)and social security questionnaire .The data were analyzed with T- test and analysis of variance and using SPSS software. Result showed that between levels of identification and social security in the member sandman- members adolescents،there was no significant difference. Based on the findings of this study seem that membership in social networks alone do not explain the levels ofidenti ficationor social security Ado lessens and other factors such as family, school environment and educational environment and other condition straining and develop end processing the adolescents can influence the form at ion fid entity and sense of security of them. Manuscript profile
      • Open Access Article

        5 - The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance
        S. R. Chogan M. Fathy M. Ramezani
        Voice communications through internet uses VOIP which includes several protocols while its secrecy is very important issue. SIP is the most important signaling protocol whose attack detection may help system immunization. This paper is dedicated to the issue of SIP regi More
        Voice communications through internet uses VOIP which includes several protocols while its secrecy is very important issue. SIP is the most important signaling protocol whose attack detection may help system immunization. This paper is dedicated to the issue of SIP registration flood attacks. Attackers can send registration signals which have several dangers for registration server. In this paper, SIP register flood attacks is investigated by details and the effects of attack over registration server is illustrated. Finally, the effects of attack, regarding the ratios compared with a regular situation of the network, are evaluated in experiments done in a real network. Moreover, instead of Hellinger distance, Kullback–Leibler distance is used for register flood attacks detection and corresponding ROC curves show this approach has better performance. Manuscript profile
      • Open Access Article

        6 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloadi More
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloading will be This virtual machine will not be able to distinguish the normal mobile user from attackers, thus violating the privacy and security of the transmitted data, so after determining the unloading strategy, the China block can be used in information security. And the information of each server is encapsulated and unloaded in the form of a block. In this research, a proposed solution is presented, which is the combination of China blockchain and cloud computing to increase security and efficiency. The proposed solution is implemented and evaluated in order to evaluate its efficiency increase compared to other existing solutions. Manuscript profile
      • Open Access Article

        7 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
        Hossein  Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh
        Securityism is one of the unjust constructions that is imposed on the body of criminal policy and it means a deviant process in the formation of a response process to the criminal phenomenon. The security orientation of criminal policy can be a criterion to distinguish More
        Securityism is one of the unjust constructions that is imposed on the body of criminal policy and it means a deviant process in the formation of a response process to the criminal phenomenon. The security orientation of criminal policy can be a criterion to distinguish an efficient and desirable criminal policy from an ineffective and undesirable criminal policy; As a result, the criminal policy of every society should provide a suitable justification for criminalizing and illegalizing the actions of people that were considered permissible before. This article is written in a descriptive-analytical way. In this article, an attempt has been made to answer this question: What are the most important coordinates of security-oriented criminalization in Iran's criminal law? Give an appropriate answer. It seems that the most important coordinates of security-oriented criminalization in Iran's criminal law include criminalization of criminal thoughts, criminalization of preliminary acts, legislative obfuscation and new criminalizations. The purpose of this article is to explain the manifestations of the tendency to aggressive criminalization in Iranian criminal law. Manuscript profile