Security in Cloud Computing: An Analysis of Key Drivers and Constraints
In the emerging computing paradigm known as cloud computing, there are significant issues that need to be addressed in order for cloud computing to be adopted as universally as the Internet. Among these issues, the societal and technological issues ...
Alternate Approaches to Business Impact Analysis
Business impact analysis BIA is an important process that probes into business processes to determine and list critical processes that are vital to keep the business going. It is necessary to understand business environments, gather data and information,...
An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications
This paper presents an efficient chaotic-based block encryption cipher CBBEC, which is a symmetric encryption algorithm designed with the potential of increasing security and improving performance. It is a hybrid mixture from chaos theory and ...
Watermarking in Medical Imaging for Security and Authentication
Medical image watermarking has been widely recognized as a relevant technique for enhancing data security, image fidelity, authenticity and content verification in the current e-health environment where medical images are stored, retrieved and ...
Automated Integrated Examination System: A Security Concern
Revolution in information and communication technology ICT has made a remarkable impact on the society. Countries across the world are using ICT to facilitate information dissemination and communication in all areas of education, training, and ...
Apple's Leopard Versus Microsoft's Windows XP: Experimental Evaluation of Apple's Leopard Operating System with Windows XP-SP2 under Distributed Denial of Service Security Attacks
Apple's iMac computers are promoted by Apple Inc. to be secure, safe, virus free, and fast computers. In this experimental paper, we evaluate the security offered by the iMac with its usual Leopard Operating System, against different Distributed Denial ...