Welcome to our Site!

Security Engineering is a research group based in Peshawar, Pakistan specializing in security and service oriented architectures related areas. Our areas of focus are Remote attestation via Trusted Computing standards on ubiquitous and mobile platforms. Our research proposes behavioral paradigm for remote attestation. The purpose of this blog i...Read More

Third deliverable of EASIP project can be found at http://imsciences.edu.pk/serg/wp-content/uploads/2010/09/strength-and-weakness-of-each-mechanism.pdf The deliverable starts with an introduction to Android followed by Openmoko, both of which are open source mobile platforms. Security enforcement mechanism...

Read All
History And Evolution of MAC
August 2nd, 2010 By alishinwari

1  History of Mandatory Access Control Evolution of mandatory access control can be traced back to the early efforts Defense Science Board starting in October 1967 to enhance security that would protect classified information exposed to remote access and resource sharing. The task force presented...

Read All

Trusted Computing Group[1] is an alliance initiated to provide trusted computing by developing a chip following the specifications[2] , revised edition published in July 2007, thus providing cryptographic  keys[3]  used for security of Information.    Openmoko[4] Inc. sponsored a project for the...

Read All
Discreationary Access Control
July 29th, 2010 By alishinwari

Discretionary Access Control A general notion of discretionary security suggests that DAC [1] [2] is any security policy or a security mechanism where ordinary users are involved in defining the security policy. Discretionary access control (DAC) is defined by the Trusted Computer System Evaluation...

Read All
Mandatory Access Control
July 29th, 2010 By alishinwari

Mandatory Access Control Mandatory access control (1) aims to improve the security of computer systems by overcoming the weaknesses found in the discretionary access control systems. One of the major weaknesses of DAC is that it treats all of the processes of a user equally and does not differentiate...

Read All
Role Based Access Control
July 29th, 2010 By alishinwari

Role Based Access Control The idea of role based access control was first introduced during the 1970’s and this model is most widely implemented on computer systems where the number of users is relatively large, where it became increasingly difficult for a system administrator to define and...

Read All
Tree Walker file
July 28th, 2010 By mir.nauman

It is highly recommended to go through the following links first http://imsciences.edu.pk/serg/2010/07/antlr-introduction/ http://imsciences.edu.pk/serg/2010/07/setting-up-antlr-3-1-in-eclipse-3-5-for-windows/ http://imsciences.edu.pk/serg/2010/07/grammer-file-syntex-symentics-of-our-policy-writing-with-antlr/ In...

Read All

Introduction The mobile devices and their related technologies have been developing significantly and have changed a lot during the last decade. With the passage of time the computing capabilities of these mobile devices have been increasing rapidly, which are now comparable to the personal computers...

Read All