Cryptographic Solution for Security Problem in Cloud Computing Storage During Global Pandemics
暂无分享,去创建一个
[1] Sudip Mittal,et al. AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce , 2020, ArXiv.
[2] Brij B. Gupta,et al. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2019, J. Ambient Intell. Humaniz. Comput..
[3] Ritika,et al. Monitoring Based Security Approach for Cloud Computing , 2019, Ingénierie des Systèmes d Inf..
[4] Diao Zhe,et al. Study on Data Security Policy Based on Cloud Storage , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).
[5] Pradeep Singh Rawat,et al. Learning-Based Task Scheduling Using Big Bang Big Crunch for Cloud Computing Environment , 1969 .
[6] S. Rajeswari,et al. Survey of data and storage security in cloud computing , 2017, 2017 IEEE International Conference on Circuits and Systems (ICCS).
[7] Jose María Álvarez Rodríguez,et al. Semantic-based QoS management in cloud systems: Current status and future challenges , 2014, Future Gener. Comput. Syst..
[8] Sushmita Ruj,et al. Security Services Using Crowdsourcing , 2014, ANT/SEIT.
[9] Ravi Tomar,et al. An Architectural View Towards Autonomic Cloud Computing , 2018 .
[10] E Munivel,et al. New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing , 2019, Secur. Commun. Networks.
[11] Sudip Mittal,et al. Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case , 2020, ArXiv.
[12] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[13] Zhuolin Yang,et al. Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.
[14] Yusuf Haider,et al. Confidentiality Issues in Cloud Computing and countermeasures: A Survey , 2016 .
[15] Olasupo Ajayi,et al. An Overview of Data Storage in Cloud Computing , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).
[16] Vidhyacharan Bhaskar,et al. Identity and access management in cloud environment: Mechanisms and challenges , 2018 .
[17] Rongzhi Wang. Research on Data Security Technology Based on Cloud Storage , 2017 .