[1]
|
Cloud Computing Applications in Social Work and Education
|
|
Handbook of Research on Cyber Approaches to …,
2022 |
|
|
[2]
|
A cloud business intelligence security evaluation framework for small and medium enterprises
|
|
2021 |
|
|
[3]
|
Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic …
|
|
IEEE …,
2021 |
|
|
[4]
|
A review paper on hypervisor and virtual machine security
|
|
Journal of Physics: Conference …,
2021 |
|
|
[5]
|
Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy‐TOPSIS analysis approach
|
|
Journal of Software …,
2021 |
|
|
[6]
|
Cloud Computing: Security Issues and Challenges
|
|
2021 |
|
|
[7]
|
Skills and Competences for Utilization of Web Storage Technology (WST) Platform for Academic Activities by Faculty Members in Faculty of Education, Ahmadu Bello …
|
|
2020 |
|
|
[8]
|
A Prototype for Data Integrity in Cloud Environment
|
|
2020 |
|
|
[9]
|
SECURITY FLAWS AND RISKS IN CLOUD COMPUTING SERVICE: A QUALITATIVE CASE STUDY
|
|
2019 |
|
|
[10]
|
Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
|
|
2019 |
|
|
[11]
|
A brief review: security issues in cloud computing and their solutions
|
|
2019 |
|
|
[12]
|
A Privacy Preserved Scheme for Data Verification and Integrity Protocol
|
|
2019 |
|
|
[13]
|
A brief review: security issues in cloud computing and their solutions.
|
|
2019 |
|
|
[14]
|
Data Access and security in Cloud integrated IoT
|
|
2019 |
|
|
[15]
|
Analysis of Several Data Security Issues in Cloud Computing with Cryptographic Algorithms
|
|
International Journal of Scientific Research in Computer Science Applications and Management Studies,
2019 |
|
|
[16]
|
SIGURIA DHE PRIVATËSIA NË SEKTORIN BANKAR QË PËRDORIN SHËRBIME TË BAZUARA NË CLOUD: SFIDAT DHE KONTROLLET
|
|
2019 |
|
|
[17]
|
Efficient Online Data Storage Over Cloud Using Enhanced Homomorphic Encryption With Redundancy Handling
|
|
Think India Journal,
2019 |
|
|
[18]
|
A Survey of Techniques Used For Dynamic Replication and Migration of Data In Cloud
|
|
Think India Journal,
2019 |
|
|
[19]
|
An Optimized Algorithm: Maxchild on Workflow Scheduling
|
|
International Journal of Applied Engineering Research [IJAER],
2018 |
|
|
[20]
|
Retrieving Real Time Data Through IOT Devices and Storing Securely on Cloud Using Li-Fi
|
|
2018 |
|
|
[21]
|
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
|
|
2018 |
|
|
[22]
|
Comprehensive Analysis of Security Mechanisms Within Cloud Computing
|
|
International Journal of Computer Science Trends and Technology (IJCST),
2018 |
|
|
[23]
|
Requirement Engineering for Security Issues in Cloud Computing
|
|
2018 |
|
|
[24]
|
THE MANAGEMENT OF IT SOLUTIONS SECURITY OFFERED IN PUBLIC CLOUD COMPUTING
|
|
2018 |
|
|
[25]
|
Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems
|
|
2018 |
|
|
[26]
|
Accepting the Cloud: A Quantitative Predictive Analysis of Cloud Trust and Acceptance Among IT Security Professionals
|
|
2018 |
|
|
[27]
|
AN INSIGHT INTO SERVICE MODEL SPECIFIC SECURITY IN CLOUDCOMPUTING
|
|
Global Journal of Engineering Science and Research Management,
2018 |
|
|
[28]
|
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
|
|
Security and Communication Networks,
2018 |
|
|
[29]
|
SMART CARD BASED AUTOMATED TOLL PLAZA SYSTEM
|
|
International Research Journal of Engineering and Technology,
2018 |
|
|
[30]
|
Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review
|
|
Certificate Programs in Computer Networks, Security, and Cloud Computing in the USA-A Review,
2017 |
|
|
[31]
|
Security and management framework for an organization operating in cloud environment
|
|
Annals of Telecommunications,
2017 |
|
|
[32]
|
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
|
|
2017 |
|
|
[33]
|
TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY
|
|
2017 |
|
|
[34]
|
An Analytical Account of Cryptography in Cloud Computing and Potential Security Risks
|
|
2017 |
|
|
[35]
|
Security and Privacy in Cloud Computing
|
|
2017 |
|
|
[36]
|
Review of Various Encryption and Compression Mechanisms Used within Deduplication in Cloud Computing
|
|
International Journal of Science and Research,
2017 |
|
|
[37]
|
Fog computing: Common security issues and proposed countermeasures
|
|
2016 |
|
|
[38]
|
Security Issues in Service Models of Cloud Computing
|
|
2016 |
|
|
[39]
|
Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
|
|
Procedia Computer Science,
2016 |
|
|
[40]
|
Secure data sharing through additive similarity based ElGamal like encryption
|
|
2016 |
|
|
[41]
|
Secured Cloud Computing Using User Classification and Bilinear Diffie-Hellman Schema
|
|
2016 |
|
|
[42]
|
Causal Understanding of Limited Adoption of Cloud Computing by Customers
|
|
International Journal of Computer Applications,
2015 |
|
|
[43]
|
ANALYSIS OF CLOUD SECURITY ISSUES AND CHALLENGES IN MEDIUM SCALE ENTERPRISES IN PAKISTAN
|
|
2015 |
|
|
[44]
|
Security challenges in cloud
|
|
2015 |
|
|
[45]
|
A Framework for Homomorphic, Private Information Retrieval Protocols in the Cloud
|
|
2015 |
|
|
[46]
|
Does Cloud Storage Lend Itself to Cyberbullying?
|
|
Cloud Computing, IEEE,
2015 |
|
|
[47]
|
Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage
|
|
2015 |
|
|
[48]
|
DYBACON: An Auditor for Secure Kinetic Cloud Storage
|
|
2015 |
|
|
[49]
|
A Technique to Enhance the Privacy Issues in Cloud Computing
|
|
2015 |
|
|
[50]
|
Multi-Level Data Integrity Service
|
|
International Journal of Computer Applications,
2014 |
|
|
[51]
|
An Overview of Cloud Computing Delivery Models: Security Issues and Challenges
|
|
TS Aluko, AO Ayannusi, OJ Olusanya
|
|
|
[52]
|
Data Breaches in Cloud Computing and its Privacy and Security Aspects
|
|
|
|
|