Search or add a thesis

Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

مفتی امین الحسینی

مفتی امین الحسینی
افسوس ہے کہ گزشتہ مئی میں مجاہد جلیل مفتی امین الحسینی نے انتقال کیا، ان کی پوری زندگی جہاد مسلسل کی ایک داستان ہے، اسرائیل کے قیام کے بعد سے برابر اس کے خلاف جدوجہد میں لگے رہے، فلسطین کا مسئلہ اگرچہ ابتداء سے مسلمانوں کا مذہبی مسئلہ تھا اور انھوں نے اسی وقت سے اس کے خلاف احتجاج شروع کردیا تھا، لیکن جب تک اسرائیل نے پروبال نہ نکالے تھے اس کے عواقب و نتائج پر ان کی پوری نظر نہ تھی، مفتی صاحب کی دوربین نگاہ نے اس کو محسوس کرلیا تھا اور انھوں نے پوری دنیائے اسلام کا سفر کرکے مسلمانوں کو اس کے خطرات سے آگاہ اور اس کے مقابلے پر آمادہ کیا، اس سلسلہ میں وہ ہندوستان بھی آئے تھے، اس لئے اس مسئلہ میں جان ان ہی نے ڈالی تھی اور اس راہ میں قید و بند جلاوطنی ہر قسم کی مصیبتیں جھیلیں اور اسی جہاد پر ان کا خاتمہ ہوا۔ ایسی عظیم شخصیتیں مدتوں میں پیدا ہوتی ہیں اس لئے ان کی موت تنہا عربوں کا نہیں بلکہ پوری دنیائے اسلام کا حادثہ ہے، اﷲ تعالیٰ اس مجاہد جلیل کے مدارج بلند فرمائے۔
(شاہ معین الدین ندوی، اگست ۱۹۷۴ء)

کارڈز میں بیعِ صرف کی شرعی وفقہی حیثیت اور اس کی عملی تطبیق

Digital Cards in banking and non banking sector have been widely used and legally accepted in the world today.  They are not only safe and secure for business transactions but also easy to use. This new phenomena has raised many questions for Muslim jurists and Islamic legal scholars as whether or not their transactions are sharīʿah compliant. This paper attempts to study this new phenomenon and analyze the juristic literature in order to explain the Islamic legal status of the utilization of these cards.

Joint Key Authentication Model for Situation Variant in E-Health Systems

Health of patient is important in every aspect of life. Technology has played a vital role in providing the solutions for health. Many of E-Health software have been designed to provide benefit in the field of E-Health technology. E-Health is considered to be the critical and confidential domain because the record might be misused. E-Health technologies can be considered as the effective, reasonable and result oriented framework. The designed E-Health software are mostly focusing on the areas like record keeping, diagnostic, treatment, and medication. The mentioned areas are important too but the security and privacy of the patient record is the core significant aspect. Authentication schemes are specifically designed to give user access privileges and secure patient`s confidential medical records. Many authentication schemes have been used with embedded E-Health software to give access to trained operators for the purpose of providing better cure against diseases. A large number of single and multi-factor authentication schemes are functioning but multi-factor authentication schemes are more secure than the single factor, which are unfortunately rare in use. The main objective is to propose an appropriate solution for the scheme in E-Health systems, for its formal use. The beauty of this scheme is the combination of most frequently used factors like Identity, password, smart card, mobile device and biometric characteristics of the user. The user has all these security and privacy measures along with strongly integrated factors which are contributing for the better availability and usage of the given scheme. It also takes care against different attacks like online or offline password guessing attack, stolen verifier attack, man-in-the-middle attack. Proposed scheme tested and verified by one of the trust worthy software engineering tools and techniques called formal methods and high level protocol specification language using AVISPA tool. Results guarantee the security, reliability, efficacy and effectiveness of proposed authentication scheme. For this purpose, system accessibility, user privileges would be flexible, feasible and controllable according to the prospective of application users. End users of E-Health systems could be patients, doctors, para-medical staff and administration. Due to its variety of login credentials on the basis of criticality of different users, organizations include government, semi-government and private healthcare centres develop their information security and accessibility policies according to context of socio-economic benefit. Joint authentication model for situation variant is the best choice for E-Health software.
Author