Results 291 to 300 of about 2,486,163 (328)
Some of the next articles are maybe not open access.

Quantitative Reasoning about Cloud Security Using Service Level Agreements

IEEE Transactions on Cloud Computing, 2017
While the economic and technological advantages of cloud computing are apparent, its overall uptake has been limited, in part, due to the lack of security assurance and transparency on the Cloud Service Provider (CSP).
Jesus Luna   +3 more
semanticscholar   +1 more source

Cloud Security Threats and Solutions: A Survey

Wireless personal communications, 2022
Umer Ahmed Butt   +5 more
semanticscholar   +1 more source

Internet of Cloud: Security and Privacy issues

arXiv.org, 2017
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main
A. Cook   +6 more
semanticscholar   +1 more source

A Survey on Secure Cloud: Security and Privacy in Cloud Computing

, 2016
Cloud computing is an emerging technology that is still unclear to many security problems. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer ...
Shyam Kumar, Amit Vajpayee
semanticscholar   +1 more source

A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing

Archives of Computational Methods in Engineering, 2022
Mehrdad Jangjou, M. Sohrabi
semanticscholar   +1 more source

Cloud Security

, 2021
Preeti Mishra   +2 more
semanticscholar   +1 more source

A survey on security challenges in cloud computing: issues, threats, and solutions

Journal of Supercomputing, 2020
Hamed Tabrizchi   +1 more
semanticscholar   +1 more source

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

Home - About - Disclaimer - Privacy