One of the most critical issue to the wide adoption of cloud-based services is the concern about the client data confidentiality and computation integrity. Research work [Wang et al., 2015][Vasudevan et al., 2016] in the past on cloud platforms security has predominantly focused either on protecting these platforms from malicious cloud clients or on protecting cloud clients from each others unwanted activities. The problem of protecting clients from the possible malicious acts of insiders such as cloud providers is not adequately addressed. In this dissertation, we present a practical approach to protect client data confidentiality and computation integrity from cloud insiders, such as cloud administrator, in an infrastructure-as-a-service (IaaS) based cloud environment. Our approach makes use of remote attestation[Coker et al., 2011], and a late launch based technique, called Flicker[McCune et al., 2008], to verify the integrity of the cloud platform. This technique secures the virtual machine (VM) launch operation and further allows the launched VM to perform operations on sensitive data in full isolation. We have demonstrated through a real-world scenario of how the origin integrity and authenticity of health-care multimedia content processed on the cloud providers platform can be verified using digital watermarking in a secure and isolated execution environment without revealing the watermark details to the cloud administrator. We have also demonstrated using formal verification tool ProVerif that cryptographic operations and protocol communication cannot be compromised using a realistic attacker model. Performance analysis of our implementation demonstrates that it adds negligible overhead. In this dissertation, we have also presented a framework to rank cloud platform nodes according to the security guarantees they provide. Platform ranking helps to meet the needs of organizations with different security requirements. The framework introduces averification is indirectly perform Trusted Party (TP) for the verification of security properties of a cloud platform to the clients. The given framework is also thin client friendly as platform attestation and verification is indirectly performed through TP without the direct involvement of clients. Performance analysis shows that the cost of our presented approach is lower in order of magnitude when compared with traditional trusted computing based solutions.
سنتحدث في ھذا الباب عن عصر نازک الملائكة وعصر بروین شاکر وکیف کانت أحوال الأدب في عصرھما، وسنتحدث في الفصل الاْول عن الأدب المقارن بشكل مختصر وما الفرق بين الموازنة والمقارنة، وعن بدایۃ الشعر الحر وماھي حقیقتہُ، عن ثم شعراء عصر النھضۃ الحديثة والتعرف علیھم وماھي مکانۃ نازک الملائکۃ بین شاعرات عصرھا۔ أما في الفصل الثاني فسنتحدث عن الشعر الحديث في شبہ القارۃ الھندیۃ والتعرف علی بعض شعراء وشاعرات هذا العصر وما ھي حقیقۃ الأدب النسائي وما ھي مکانۃ بروین شاکر بین شاعرات عصرھا۔
Muhammad ibn ‘Umr Al-Wqid is considered to be one of the most famous early Muslim historians. Despite being disputed among the circle of Muhaddithn, he was popular among the early Muslim historians. He got recognition and fame as a historian in the 2nd half of 2nd century of Hijrah. In fact, he was an outstanding historian who introduced new trends in writing and composition of historic narratives. The early Muslim historians cited and quoted Al-Wqid freely where they needed him without any kind of reluctance. It is well to know that western orientalists pay special attention to AlWqid and his book "Al-Maghz ". Perhaps it is not due to their biasness or impartiality, but for the excellent work of Al-Wqid. In this regard, they think that Al-Wqid is more accurate and clear in giving details and judgments about historical events than any other early Muslim historian. Al-Wqid 's dating of historical events is more acute and correct. He owns what he produces and narrates. Moreover, he seems to be sensitive and aware of consequences of what he writes in his book " Al-Maghz ", that is why we see him sometime indulging in some issues extra-ordinarily and proving and disproving what he thinks right or wrong by logical (internal and external) criticism. Al-Wqid explores historical events and tries to know about root causes of their happening and finally analyzes their consequences. These are some special qualities of Al-Wqid 's work in the eyes of western orientalists. In this article, I have tried to highlight these aspects of Al-Wqid 's work from the oriental literature.
Present day education systems offer a variety of education options that parents can choose for their children's basic education. On one hand, there is attractive but expensive private education system, on the other hand, there is economical public education system, though less attractive in terms of societal perceptions. This dual system creates a decision dilemma for the parents. The students of these schools also have options of sitting for a private examination (0-Level and AKU-EB) or public exams (SSC). In view of the phenomenon, this study focuses on finding out the preferences of the parents for choosing 0-Level, SSC or AKU-EB examination streams while studying in in various private schools of Karachi. This study follows Qualitative Research Methodology. The essence of the study was based upon the voice of the parents, students and the institution heads. They have been interviewed to gain first-hand knowledge about the research question. The participants encompassed all the three systems i.e. 0-Level, SSC or AKU-EB in Karachi. Largely, parents had been found interested in an examination system which could ensure their children a better and prosperous professional life. Hence, Cambridge International Examination's 0-Level is found out to be top parental preference, however, affordability and financial challenges pose serious challenges for parental choice.