A review of cloud security based on cryptographic mechanisms
Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology...
Saved in:
Main Authors: | Abd, Sura Khalil, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Fazirulhisyam, Abdullah, Azizol |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/47718/1/A%20review%20of%20cloud%20security%20based%20on%20cryptographic%20mechanisms.pdf http://psasir.upm.edu.my/id/eprint/47718/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An effective approach for managing power consumption in cloud computing infrastructure
by: Khalil Abd, Sura, et al.
Published: (2017) -
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000) -
Improving energy consumption in cloud computing datacenters using a combination of energy-aware resource allocation and scheduling mechanism
by: Khalil Abd., Sura
Published: (2017) -
New Cryptographic Algorithms for Enhancing Security of Voice Data
by: Al-Hazaimeh, Obaida Mohammad Awad
Published: (2010) -
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)