Multilevel Security Model for Cloud Third-Party Authentication
暂无分享,去创建一个
[1] D. Theng,et al. VM Management for Cross-Cloud Computing Environment , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[2] Deepti P. Theng,et al. Analysing Security and Privacy Management for Cloud Computing Environment , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[3] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[4] Ravi Kant Sahu,et al. Cloud Data Security while using Third Party Auditor , 2013 .
[5] Sawan V. Baghel,et al. A survey for secure communication of cloud third party authenticator , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[6] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[8] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.