There is a need to investigate Information technology (IT) Companies in Saudi Arabia for Risk Management for two reasons. Firstly, it is obvious from the literature that one reason for failure of…
Oblivious Random-Access Memory (ORAM) is becoming a fundamental component for modern outsourced storages as a cryptographic primitive to prevent information leakage from a user access pattern. The…
In this paper, we propose an advanced implementation of Path ORAM to hide the access pattern to outsourced data into the cloud. This implementation takes advantage of eventual data locality and…
This course provides an introduction to the fundamental principles of information technology and its pillars. It introduces students to the discipline of IT and its applications in industry.…
This course defines information security. Topics include security services and its mechanisms, such as confidentiality, integrity, availability and non-repudiation, security policies,…
The course covers: Characteristics of the database approach. Database concepts and architecture; Data models, schemas and instances; Program data independence, Database languages and interfaces.…