Results 21 to 30 of about 751,340 (235)

Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination

open access: yesIEEE Photonics Journal, 2020
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang   +3 more
doaj   +1 more source

DEVELOPMENT OF SMART CITIES IN TAIWAN FROM THE PERSPECTIVE OF CLOUD COMPUTING SECURITY [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2019
Cloud computing is an important part of the development of smart cities and also the focus of the information and communication technology (ICT) industry.
S. M. Wu, Y. C. Wu
doaj   +1 more source

Study of Efficient Cloud Storage Architectures for the Security Environment

open access: yesJournal of Kufa for Mathematics and Computer, 2023
Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system.
Ayad Hasan Adhab, Naseer Ali Hussien
doaj   +1 more source

Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments [PDF]

open access: yesEngineering and Technology Journal, 2021
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased.
Turkan A. Khaleel
doaj   +1 more source

On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems

open access: yesIEEE Access, 2019
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan   +4 more
doaj   +1 more source

An Overview of Fog Computing and Edge Computing Security and Privacy Issues

open access: yesSensors, 2021
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution.
Ahmed M. Alwakeel
doaj   +1 more source

The cloud's computing security [PDF]

open access: yesTehnika, 2018
The emerging technologies are getting adopted massively worldwide and they are finding their applications in both - private and public sector. One of the well-known technological advancements being used today is a cloud's computing. This sort of system is still in its development and every single day we are facing on the new improvements in that area ...
openaire   +2 more sources

Cloud Computing Issues, Challenges, and Needs: A Survey

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks.
Mohammad Aljanabi   +6 more
doaj   +1 more source

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

An Overview of the Security Concerns in Enterprise Cloud Computing [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, 2011
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
arxiv   +1 more source

Home - About - Disclaimer - Privacy