Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for intruders. Cloud and distributed computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many new security risks. Some Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts, but these traditional intrusion detection system are not flexible in providing guaranteed security especially in distributed computing because of the architecture of the computing. This paper presents the use of RSA (Rivest–Shamir–Adleman) cryptosystem to effectively detect and prevent intrusion in a computer system. In this cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). This ensures maximum security.
ABSTRACT
This work studied the refining of crude palm kernel oil derived from the kernels within the nut of a palm fruit. This research p...
ABSTRACT
This study was carried out on the examine the attitude of business education students tow...
ABSTRACT
The entrenchment of Right of Expression as a fundamental human right in Nigeria could be trace...
ABSTRACT
Compulsory land acquisition is one of the most challenging issues in land administration in Nigeria. Compulsory land acquisition...
ABSTRACT
This study focuses on the evaluation of nigerian ports post-concession performance using Onne...
ABSTRACT
This study was on development and acceptability of natural, synthetic and mixed leatherworks for interior decoration in Kano Sta...
ABSTRACT
The secretary plays a very important role in the running of an organization. No matter how skillful and compete...
BACKGROUND OF THE STUDY
Prior to the establishment of Federal Road Safety Commission in 1988, there was no concrete and sustained policy...
Abstract
This research work is aimed at analyzing Audience perception of female models in advertising message (a study of always ultra co...
Background of the study
Security concerns are taken very seriously all throughout the world. It is wide...