Results 291 to 300 of about 2,486,163 (328)
Some of the next articles are maybe not open access.
Quantitative Reasoning about Cloud Security Using Service Level Agreements
IEEE Transactions on Cloud Computing, 2017While the economic and technological advantages of cloud computing are apparent, its overall uptake has been limited, in part, due to the lack of security assurance and transparency on the Cloud Service Provider (CSP).
Jesus Luna+3 more
semanticscholar +1 more source
Cloud Security Threats and Solutions: A Survey
Wireless personal communications, 2022Umer Ahmed Butt+5 more
semanticscholar +1 more source
Internet of Cloud: Security and Privacy issues
arXiv.org, 2017The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main
A. Cook+6 more
semanticscholar +1 more source
A Survey on Secure Cloud: Security and Privacy in Cloud Computing
, 2016Cloud computing is an emerging technology that is still unclear to many security problems. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer ...
Shyam Kumar, Amit Vajpayee
semanticscholar +1 more source
A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing
Archives of Computational Methods in Engineering, 2022Mehrdad Jangjou, M. Sohrabi
semanticscholar +1 more source
A survey on security challenges in cloud computing: issues, threats, and solutions
Journal of Supercomputing, 2020Hamed Tabrizchi+1 more
semanticscholar +1 more source
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Computer Science Review, 2019Rakesh Kumar, Rinkaj Goyal
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly