Results 11 to 20 of about 241,235 (288)

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

An Overview of Fog Computing and Edge Computing Security and Privacy Issues

open access: yesSensors, 2021
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution.
Ahmed M. Alwakeel
doaj   +1 more source

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]

open access: yes, 2013
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho   +3 more
core   +1 more source

Cloud Computing Issues, Challenges, and Needs: A Survey

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks.
Mohammad Aljanabi   +6 more
doaj   +1 more source

Traditional security risk assessment methods in cloud computing environment: usability analysis [PDF]

open access: yes, 2014
The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used ...
Ahmed, Azuan   +4 more
core   +2 more sources

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Recommendations and best practices for cloud enterprise security [PDF]

open access: yes, 2014
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Chang, V, Ramachandran, M
core   +1 more source

Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

open access: yesIEEE Access
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt   +4 more
doaj   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy