Volume 17 (2023)
Volume 16 (2022)
Volume 15 (2021)
Volume 14 (2020)
Volume 13 (2019)
Volume 12 (2018)
Volume 11 (2017)
Volume 10 (2016)
Volume 9 (2015)
Volume 8 (2014)
Volume 7 (2013)
Volume 6 (2012)
Volume 5 (2011)
Volume 4 (2010)
Volume 3 (2009)
Volume 2 (2008)
Volume 1 (2007)
Keywords = Security
Number of Articles: 4
Trusted Cloud Computing
Volume 6, Issue 2 , August 2012, , Page 6-13
Abstract
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for ... Read More ...Management of Identity and Access in the Cloud
Volume 6, Issue 2 , August 2012, , Page 22-33
Abstract
Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ... Read More ...Key Management Scheme for Mobile Wireless Sensor Networks
Volume 6, Issue 2 , August 2012, , Page 58-64
Abstract
Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and ... Read More ...SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC
Volume 1, Issue 3 , December 2007, , Page 122-135