Trusted Cloud Computing
Trusted Cloud Computing

Kashif Kifayat; Waleed K. Awad; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, , Page 6-13

https://doi.org/10.37652/juaps.2012.63157

Abstract
  Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for ...  Read More ...
Management of Identity and Access in the Cloud
Management of Identity and Access in the Cloud

Kashif Kifayat; Sameeh Abdulghafour Jassim; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, , Page 22-33

https://doi.org/10.37652/juaps.2012.63234

Abstract
  Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ...  Read More ...
Key Management Scheme for Mobile Wireless Sensor Networks
Key Management Scheme for Mobile Wireless Sensor Networks

Sufyan T. Faraj; Foad Salem Mubarek

Volume 6, Issue 2 , August 2012, , Page 58-64

https://doi.org/10.37652/juaps.2012.63239

Abstract
  Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and ...  Read More ...
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC

MOHAMMED T. IBRAHEM; SUFYAN T. FARAJ

Volume 1, Issue 3 , December 2007, , Page 122-135

https://doi.org/10.37652/juaps.2007.15559

Abstract
  Although e-mail security solutions have been introduced for more than two decades, most of the e-mail messages are sent nowadays without being secured by any of these techniques. This ...  Read More ...