000 02229cam a2200337 a 4500
003 EG-GiCUC
005 20250223031119.0
008 141211s2014 ua d f m 000 0 eng d
040 _aEG-GiCUC
_beng
_cEG-GiCUC
041 0 _aeng
049 _aDeposite
097 _aM.Sc
099 _aCai01.20.04.M.Sc.2014.Sa.S
100 0 _aSahar Mohammed Abduljalil Abdullah
245 1 0 _aSecured services In cloud computing environment /
_cSahar Mohammed Abduljalil Abdullah ; Supervised Osman Hegazy , Ehab E. Hassanein
246 1 5 _aتأمين الخدمات في بيئة الحوسبه السحابيـه
260 _aCairo :
_bSahar Mohammed Abduljalil Abdullah ,
_c2014
300 _a77 Leaves :
_bcharts ;
_c30cm
502 _aThesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information System
520 _aSecuring services is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are sequences of processes, or rules, used to encipher and decipher messages in a cryptographic system. In simple terms, they're processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor{u2019}s memory and CPU resources are very limited, which make the algorithm performance inefficient. The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services
530 _aIssued also as CD
653 4 _aCloud Computing
653 4 _aCloud computing services
653 4 _aSecuring services
700 0 _aEhab E. Hassanein ,
_eSupervisor
700 0 _aOsman Hegazy ,
_eSupervisor
856 _uhttp://172.23.153.220/th.pdf
905 _aAml
_eCataloger
905 _aNazla
_eRevisor
942 _2ddc
_cTH
999 _c48695
_d48695