Results 321 to 330 of about 502,338 (367)
Some of the next articles are maybe not open access.
A note on cloud computing security
International Journal of Ad Hoc and Ubiquitous Computing, 2020Cloud computing has become an emerging technology which has huge impact. Existing security algorithms cannot meet the needs of cloud computing users as security issues have become increasingly prominent, becoming an important factor restricting the development of cloud computing.
GargDeepak, SidhuJagpreet, RaniShalli
openaire +3 more sources
Cloud computing: Security model comprising governance, risk management and compliance
2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), 2014Cloud security is a broad topic and any combination of policies, technologies, and controls to protect data, infrastructure and services from possible attacks.
Fawaz S. Al-Anzi, S. Yadav, J. Soni
semanticscholar +1 more source
2014
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations
Shinde, Asharani +3 more
openaire +1 more source
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations
Shinde, Asharani +3 more
openaire +1 more source
Cloud Computing Security: A Survey of Service-based Models
Computers & security, 2021Fatemeh Khoda Parast +5 more
semanticscholar +1 more source
Security Issues for Cloud Computing
International Journal of Information Security and Privacy, 2010In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud.
Bhavani Thuraisingham +3 more
openaire +2 more sources
2012
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of ...
Alpana M. Desai, Kenrick Mock
openaire +1 more source
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of ...
Alpana M. Desai, Kenrick Mock
openaire +1 more source
Security issues in cloud computing
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements.
openaire +2 more sources
2015
This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure ...
Flavio Lombardi, Roberto Di Pietro
openaire +2 more sources
This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure ...
Flavio Lombardi, Roberto Di Pietro
openaire +2 more sources
2014
Security aspects of cloud computing draw much attention. Many cloud customers feel that their lack of control over hardware and software makes their information vulnerable for compromise on the cloud. The security issues surrounding the cloud vary among the different types of cloud services such as SaaS, PaaS and IaaS. Among the cloud deployment models
openaire +2 more sources
Security aspects of cloud computing draw much attention. Many cloud customers feel that their lack of control over hardware and software makes their information vulnerable for compromise on the cloud. The security issues surrounding the cloud vary among the different types of cloud services such as SaaS, PaaS and IaaS. Among the cloud deployment models
openaire +2 more sources
Cloud Security Research in Cloud Computing
Applied Mechanics and Materials, 2012This paper first introduces the definition of cloud security, then analyzes security research status, finally puts forward to three-layer security solutions in Cloud Computing.
Jun Ting Wang, You Chan Zhu, Peng Liu
openaire +2 more sources

