Results 261 to 270 of about 46,558 (308)
Novel load balancing mechanism for cloud networks using dilated and attention-based federated learning with Coati Optimization. [PDF]
Kathole AB+7 more
europepmc +1 more source
Blockchain driven medical image encryption employing chaotic tent map in cloud computing. [PDF]
Shahid U+5 more
europepmc +1 more source
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things. [PDF]
Asaithambi S+5 more
europepmc +1 more source
Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks. [PDF]
Almuseelem W.
europepmc +1 more source
Security and Compliance in Clouds [PDF]
The use of cloud computing services is an attractive opportunity for companies to improve IT Services and to achieve almost unlimited scalability of the IT infrastructure, and all of this at a significantly reduced cost than this is possible with internal resources. However, the use of a cloud service requires a company to trust the vendor to deal with
Jan Jürjens, Kristian Beckers
openaire +1 more source
Cloud Computing Security [PDF]
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2013
A computer cloud is a target-rich environment for malicious individuals and criminal organizations. A cloud faces several types of security threat: traditional ones, threats related to system availability, and threats related to third-party data control.
Thomas W. Shinder+2 more
openaire +4 more sources
A computer cloud is a target-rich environment for malicious individuals and criminal organizations. A cloud faces several types of security threat: traditional ones, threats related to system availability, and threats related to third-party data control.
Thomas W. Shinder+2 more
openaire +4 more sources