[1]
|
Data Privacy and Security Model in Cloud Environments
2023 3rd International Conference on Computing and Information Technology (ICCIT),
2023
DOI:10.1109/ICCIT58132.2023.10273911
|
|
|
[2]
|
Handbook of Research on Cyber Approaches to Public Administration and Social Policy
Advances in Electronic Government, Digital Divide, and Regional Development,
2022
DOI:10.4018/978-1-6684-3380-5.ch002
|
|
|
[3]
|
Nanoelectronics, Circuits and Communication Systems
Lecture Notes in Electrical Engineering,
2021
DOI:10.1007/978-981-15-7486-3_4
|
|
|
[4]
|
Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3100287
|
|
|
[5]
|
A review paper on hypervisor and virtual machine security
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/1950/1/012027
|
|
|
[6]
|
Linear and Nonlinear Programming
International Series in Operations Research & Management Science,
2019
DOI:10.1007/978-3-030-11935-5_6
|
|
|
[7]
|
A Privacy Preserved Scheme for Data Verification and Integrity Protocol
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3356833
|
|
|
[8]
|
Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
Evolutionary Intelligence,
2019
DOI:10.1007/s12065-019-00337-z
|
|
|
[9]
|
Retrieving Real Time Data Through IOT Devices and Storing Securely on Cloud Using Li-Fi
2018 3rd International Conference for Convergence in Technology (I2CT),
2018
DOI:10.1109/I2CT.2018.8529393
|
|
|
[10]
|
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Security and Communication Networks,
2018
DOI:10.1155/2018/1681908
|
|
|
[11]
|
Security and management framework for an organization operating in cloud environment
Annals of Telecommunications,
2017
DOI:10.1007/s12243-017-0567-6
|
|
|
[12]
|
Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption
Procedia Computer Science,
2016
DOI:10.1016/j.procs.2016.06.007
|
|
|
[13]
|
Secure data sharing through additive similarity based ElGamal like encryption
2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB),
2016
DOI:10.1109/AEEICB.2016.7538370
|
|
|
[14]
|
Does Cloud Storage Lend Itself to Cyberbullying?
IEEE Cloud Computing,
2015
DOI:10.1109/MCC.2015.102
|
|
|