Secured services In cloud computing environment / (Record no. 48695)

MARC details
000 -LEADER
fixed length control field 02229cam a2200337 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-GiCUC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250223031119.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141211s2014 ua d f m 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GiCUC
Language of cataloging eng
Transcribing agency EG-GiCUC
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Deposite
097 ## - Thesis Degree
Thesis Level M.Sc
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC)
Classification number Cai01.20.04.M.Sc.2014.Sa.S
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Sahar Mohammed Abduljalil Abdullah
245 10 - TITLE STATEMENT
Title Secured services In cloud computing environment /
Statement of responsibility, etc. Sahar Mohammed Abduljalil Abdullah ; Supervised Osman Hegazy , Ehab E. Hassanein
246 15 - VARYING FORM OF TITLE
Title proper/short title تأمين الخدمات في بيئة الحوسبه السحابيـه
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cairo :
Name of publisher, distributor, etc. Sahar Mohammed Abduljalil Abdullah ,
Date of publication, distribution, etc. 2014
300 ## - PHYSICAL DESCRIPTION
Extent 77 Leaves :
Other physical details charts ;
Dimensions 30cm
502 ## - DISSERTATION NOTE
Dissertation note Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information System
520 ## - SUMMARY, ETC.
Summary, etc. Securing services is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are sequences of processes, or rules, used to encipher and decipher messages in a cryptographic system. In simple terms, they're processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor{u2019}s memory and CPU resources are very limited, which make the algorithm performance inefficient. The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Issued also as CD
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Cloud Computing
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Cloud computing services
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Securing services
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Ehab E. Hassanein ,
Relator term
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Osman Hegazy ,
Relator term
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://172.23.153.220/th.pdf">http://172.23.153.220/th.pdf</a>
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Aml
Reviser Cataloger
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Nazla
Reviser Revisor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
Holdings
Source of classification or shelving scheme Not for loan Home library Current library Date acquired Full call number Barcode Date last seen Koha item type Copy number
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة قاعة الرسائل الجامعية - الدور الاول 11.02.2024 Cai01.20.04.M.Sc.2014.Sa.S 01010110064189000 22.09.2023 Thesis  
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة مخـــزن الرســائل الجـــامعية - البدروم 11.02.2024 Cai01.20.04.M.Sc.2014.Sa.S 01020110064189000 22.09.2023 CD - Rom 64189.CD
Cairo University Libraries Portal Implemented & Customized by: Eng. M. Mohamady Contacts: new-lib@cl.cu.edu.eg | cnul@cl.cu.edu.eg
CUCL logo CNUL logo
© All rights reserved — Cairo University Libraries
CUCL logo
Implemented & Customized by: Eng. M. Mohamady Contact: new-lib@cl.cu.edu.eg © All rights reserved — New Central Library
CNUL logo
Implemented & Customized by: Eng. M. Mohamady Contact: cnul@cl.cu.edu.eg © All rights reserved — Cairo National University Library