Search Results - "Cloud computing security"
-
1
Aligning cloud computing security with business strategy
Published 2014Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Cloud computing security threat with quantum key distribution defense model
Published 2015Get full text
Get full text
Conference or Workshop Item -
5
Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol
Published 2023Conference Paper -
6
-
7
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
Published 2024Subjects:Conference Paper -
8
Novel risk assessment method to identify information security threats in cloud computing environment
Published 2024Subjects: “…Cloud computing security…”
journal::journal article -
9
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
Published 2023Subjects: “…Cloud computing - Security measures…”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Traditional Security Risk Assessment Methods In Cloud Computing Environment: Usability Analysis
Published 2024Subjects: “…Security risk assessment; cloud computing; security risk assessment in cloud computing…”
Article -
12
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
13
An efficient crime group of secured data sharing scheme in cloud
Published 2018Subjects: Get full text
Get full text
Thesis -
14
-
15
Cloud computing review: Features and issues
Published 2018Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing
Published 2024Subjects: “…cloud computing security…”
Proceedings Paper -
17
-
18
A Comprehensive Review of Existing Risk Assessment Models in Cloud Computing
Published 2023Conference Paper -
19
Formulating a security layer of cloud data storage framework based on multi agent system architecture.
Published 2010Subjects: Get full text
Get full text
Get full text
Article -
20
Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism
Published 2024Article
