Results 21 to 30 of about 502,338 (367)
A Review of Machine Learning Algorithms for Cloud Computing Security
Cloud computing (CC) is on-demand accessibility of network resources, especially data storage and processing power, without special and direct management by the users.
Umer Ahmed Butt+8 more
semanticscholar +1 more source
Security in Cloud Computing [PDF]
Cloud computing refers to high scalable computing applications, storages and platforms as a service to companies, individuals and governments. Therefore, SMB (Small and Medium Business) organizations are adapting cloud computing services gradually to save cost and to increase efficiency in their business environment.
openaire +3 more sources
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj +1 more source
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha+16 more
core +3 more sources
Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination
In this paper, we investigate the physical layer security for an asymmetric dual-hop radio frequency-free space optical (RF-FSO) communication system, in which a source transmits information to a multi-aperture destination (D) through a best relay under ...
Jiliang Zhang+3 more
doaj +1 more source
DEVELOPMENT OF SMART CITIES IN TAIWAN FROM THE PERSPECTIVE OF CLOUD COMPUTING SECURITY [PDF]
Cloud computing is an important part of the development of smart cities and also the focus of the information and communication technology (ICT) industry.
S. M. Wu, Y. C. Wu
doaj +1 more source
On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan+4 more
doaj +1 more source
Study of Efficient Cloud Storage Architectures for the Security Environment
Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system.
Ayad Hasan Adhab, Naseer Ali Hussien
doaj +1 more source
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments [PDF]
The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased.
Turkan A. Khaleel
doaj +1 more source
The cloud's computing security [PDF]
The emerging technologies are getting adopted massively worldwide and they are finding their applications in both - private and public sector. One of the well-known technological advancements being used today is a cloud's computing. This sort of system is still in its development and every single day we are facing on the new improvements in that area ...
openaire +2 more sources