Results 21 to 30 of about 487,200 (366)
Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang+3 more
doaj +1 more source
Study of Efficient Cloud Storage Architectures for the Security Environment
Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system.
Ayad Hasan Adhab, Naseer Ali Hussien
doaj +1 more source
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments [PDF]
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased.
Turkan A. Khaleel
doaj +1 more source
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar +1 more source
An Overview of Fog Computing and Edge Computing Security and Privacy Issues
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution.
Ahmed M. Alwakeel
doaj +1 more source
The cloud's computing security [PDF]
The emerging technologies are getting adopted massively worldwide and they are finding their applications in both - private and public sector. One of the well-known technological advancements being used today is a cloud's computing. This sort of system is still in its development and every single day we are facing on the new improvements in that area ...
openaire +2 more sources
Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study
: The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing.
Sajid Habib Gill+7 more
semanticscholar +1 more source
On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan+4 more
doaj +1 more source
Security of Zero Trust Networks in Cloud Computing: A Comparative Review
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management.
Sirshak Sarkar+4 more
semanticscholar +1 more source
Cloud Computing Issues, Challenges, and Needs: A Survey
Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks.
Mohammad Aljanabi+6 more
doaj +1 more source