Sameera Abdulrahman Almulla

Learn More
Enterprises are seeking toward the cloud horizon to expand their premises facilities. It provides several services in the market, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). This paper will discuss challenges regarding three information security concerns: confidentiality, integrity and(More)
Cloud computing and digital forensics are emerging fields of technology. Unlike traditional digital forensics where the target environment can be almost completely isolated, acquired and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators.(More)
Cloud computing and digital forensics are both developing topics and researching these topics requires an understanding of the main aspects of both cloud computing and digital forensics. In cloud computing it is necessary not only to understand its characteristics and the different services and deployment models but also to survey the underpinning elements(More)
Researchers in the field of cloud forensics need to move away from insisting on acquiring all data as has historically been the case in computer forensics- and yet still be able to prove the accuracy, sufficiency and soundness of partially acquired data. Virtualization is considered to be one of the main pillars in providing cloud services. In some cases,(More)
Asthma is a chronic lung disease, occurring in about 10% of children and 8% of adults [1]. It inflames and tightens the airways, and causes wheezing, coughing, breathlessness, and chest tightness. Without proper management, asthma can result in frequent emergency department (ED) visits, hospitalizations, and premature deaths. In 2010, almost 1.8 million(More)
The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services. Currently there is no framework existing from the logical(More)
  • 1