September 26, 2025

SamTech 365 – Samir Daoudi Technical Blog

PowerPlatform, Power Apps, Power Automate, PVA, SharePoint, C#, .Net, SQL, Azure News, Tips ….etc

The proliferation of systems and their use by different entities and organisations raised a lot of questions about the security...

Authentication code In a military system, authentication should be secure unconditionally. Note that we studied digital signatures and message authentication...

The Clark-Wilson Model Author : Yongge Wang Confidentiality, integrity, and availability are three essential properties for both military and commercial...

We depend more and more on Internet technology. Everyday we interact and perform some tasks related to our life over...

Security has always been a major concern far before the appearance of computers, it had different applications and implementation but...

Attackers might have different reasons to think and try targeting systems. Depending on the technologies and protocols, attackers can use...

We have noticed in the last tens or twenty years a wide use and spread of computer based systems, everywhere,...

Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis The user interface is the final representation of our...

Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis Introduction Due to the complexity of some software-solutions and...

Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis The computing and software development can be considered young...

Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis The software development as a field has seen a...

Author : DAOUDI Samir | Context : MSc Software Engineering - Object Oriented Analysis Software solutions are developed to fill in business process,...