Management of Identity and Access in the Cloud
Management of Identity and Access in the Cloud

Kashif Kifayat; Sameeh Abdulghafour Jassim; Sufyan T. Faraj

Volume 6, Issue 2 , August 2012, , Page 22-33

https://doi.org/10.37652/juaps.2012.63234

Abstract
  Cloud computing is new technology that provides cheaper, easier, and more powerful processes to customers over internet. The cloud service provider (CSP) provides virtualized resources ...  Read More ...
TORDES-THE NEW SYMMETRIC KEY ALGORITHM
TORDES-THE NEW SYMMETRIC KEY ALGORITHM

Pawitar Dulari; Ajay Bhushan

Volume 6, Issue 2 , August 2012, , Page 70-74

https://doi.org/10.37652/juaps.2012.63241

Abstract
  The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies ...  Read More ...
New Construction of a Chaotic Generator on the Lorenz Attractor
New Construction of a Chaotic Generator on the Lorenz Attractor

Abdallah M; Mohamed Sadek Ali-Pacha; Naima Hadj-Said; Adda Ali-Pacha

Volume 6, Issue 2 , August 2012, , Page 79-84

https://doi.org/10.37652/juaps.2012.63243

Abstract
  it be known that the chaotic phenomena can be obtained from relatively simple systems that are governed by a small number of variables. The system will then be deterministic, although ...  Read More ...