XV
Introduction
e rapid evolution of technology in the computer world has made
securing access to confidential data a very important issue in terms of
research. is technology is likely to evolve in various architectures.
Each architecture has its own functionality and its advantages and dis-
advantages. On the one hand, the transition from a centralized to a
decentralized system distributed locally or remotely has facilitated the
tasks in various sectors (e.g., educational, social, government, commer-
cial, etc.). On the other hand, the integration of the Internet has encour-
aged communication at an international level and allowed operations to
be conducted remotely (e.g., e-commerce, e-banking, etc.). In addition
to the Internet, there is the ...