The International Arab Journal of Information Technology (IAJIT)

Lightweight Anti-Censorship Online Network for

Division of Electronic and Information Engineering, Chonbuk National University, Republic of Korea
#

Hierarchical Based Group Key Transfer for Secure

1Department of Information Science and Technology, A nna University, India
#

Designing a Fuzzy-Logic Based Trust and Reputation Model for Secure Resource

Department of Electronics and Communication Enginee ring, Bannari Amman  
#

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

integrity  for  flexible  and  traditional  remote  syste ms.  SIMS  is  not  only  targeted  for  Linux,  but  it  can   also  be  used  for  different 

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

Proficient Decision Making on Virtual Machine Creation in IaaS Cloud Environment

Abstract: Cloud computing is a most fascinated technology that is being utilized by IT companies to reduce their

A Network Performance Aware QoS Based Workflow Scheduling for Grid Services

Abstract: Grids enable sharing, selection and aggregation of geographically distributed resources among various

Bilateral Multi-Issue Negotiation Model for a Kind

1College of Computer Science and Electronic Engineering, Hunan University, China 2The Second Hospital, University of South China, China 3Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

integrity  for  flexible  and  traditional  remote  syste ms.  SIMS  is  not  only  targeted  for  Linux,  but  it  can   also  be  used  for  different 

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

A Trusted Virtual Network Construction Method Based on Data Sources Dependence

Xiaorong Cheng1 and Tianqi LI2 1Department Computer Science, North China Electric Power University, China 2C-Epri Electric Power Engineering CO, LTD, China

Using the Improved PROMETHEE for Selection of Trustworthy Cloud Database Servers

Jagpreet Sidhu1,2 and Sarbjeet Singh1 1University Institute of Engineering and Technology, Panjab University, India 2Department of Computer Science and Engineering and Information Technology, Jaypee University of

Flexible Fair and Collusion Resistant Pseudonym Providing System

Belal Amro1, Albert Levi2, and Yucel Saygin2 1College of IT, Hebron University, Palestine 2Faculty of Engineering and Natural Sciences, Sabanci University, Turkey