Artículos de revistas sobre el tema "SECURE CLOUD SYSTEMS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "SECURE CLOUD SYSTEMS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Baars, Thijs y Marco Spruit. "Designing a Secure Cloud Architecture". International Journal of Information Security and Privacy 6, n.º 1 (enero de 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Texto completoGupta, Daya Sagar y G. P. Biswas. "Secure Computation on Cloud Storage". Journal of Cases on Information Technology 17, n.º 3 (julio de 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Texto completoBodepudi, Anusha, Manjunath Reddy, Sai Srujan Gutlapalli y Mounika Mandapuram. "Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing". American Journal of Trade and Policy 8, n.º 3 (31 de diciembre de 2021): 231–38. http://dx.doi.org/10.18034/ajtp.v8i3.651.
Texto completoAeri, Manisha. "Secure Data Sharing in Cloud Computing Systems: Techniques and Applications". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, n.º 3 (15 de diciembre de 2020): 2087–94. http://dx.doi.org/10.17762/turcomat.v11i3.13606.
Texto completoPaudyal, Ramesh y Subarna Shakya. "Secure Data Mobility in Cloud Computing for e-Governance Application". Journal of Engineering Technology and Planning 2, n.º 1 (19 de agosto de 2021): 1–14. http://dx.doi.org/10.3126/joetp.v2i1.39203.
Texto completoHuang, Qinlong, Yue He, Wei Yue y Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption". Security and Communication Networks 2018 (1 de octubre de 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.
Texto completoSirurmath, Ms Srilakshmi U. y Dr Deepashree Devaraj. "Secure Cloud Storage Techniques: A Review". Journal of University of Shanghai for Science and Technology 23, n.º 07 (1 de agosto de 2021): 1388–95. http://dx.doi.org/10.51201/jusst/21/07243.
Texto completoRavinder, Rao y V. Sucharita. "A secure cloud service deployment framework for DevOps". Indonesian Journal of Electrical Engineering and Computer Science 21, n.º 2 (1 de febrero de 2021): 874. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp874-885.
Texto completoLi, Jiaxing, Jigang Wu y Long Chen. "Block-secure: Blockchain based scheme for secure P2P cloud storage". Information Sciences 465 (octubre de 2018): 219–31. http://dx.doi.org/10.1016/j.ins.2018.06.071.
Texto completoPape, Sebastian, Federica Paci, Jan Jürjens y Fabio Massacci. "Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach". Information 11, n.º 5 (11 de mayo de 2020): 261. http://dx.doi.org/10.3390/info11050261.
Texto completoWu, Zhen-Yu. "A Secure and Efficient Digital-Data-Sharing System for Cloud Environments". Sensors 19, n.º 12 (24 de junio de 2019): 2817. http://dx.doi.org/10.3390/s19122817.
Texto completoVarnovsky, N. P., V. A. Zakharov y A. V. Shokurov. "On the existence of provably secure cloud computing systems". Moscow University Computational Mathematics and Cybernetics 40, n.º 2 (abril de 2016): 83–88. http://dx.doi.org/10.3103/s0278641916020096.
Texto completoYadav, Dilip y Sephali Behera. "A Survey on Secure Cloud-Based E-Health Systems". EAI Endorsed Transactions on Pervasive Health and Technology 5, n.º 20 (5 de mayo de 2020): 163308. http://dx.doi.org/10.4108/eai.13-7-2018.163308.
Texto completoSahaya Stalin Jose, G. y C. Seldev Christopher. "Secure cloud data storage approach in e-learning systems". Cluster Computing 22, S5 (22 de febrero de 2018): 12857–62. http://dx.doi.org/10.1007/s10586-018-1785-z.
Texto completoZhang, Jiang, Zhenfeng Zhang y Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing". IEEE Transactions on Mobile Computing 16, n.º 11 (1 de noviembre de 2017): 3222–35. http://dx.doi.org/10.1109/tmc.2017.2687931.
Texto completoMallika P, Indhurekha S y Jarlin Jeincy. "Secure and Efficient Anonymous Group Data Sharing by SBIBD Technique in Cloud Environment". international journal of engineering technology and management sciences 7, n.º 1 (2023): 194–98. http://dx.doi.org/10.46647/ijetms.2023.v07i01.027.
Texto completoMugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine y Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes". International Journal of Information Security and Privacy 11, n.º 1 (enero de 2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.
Texto completoJänicke, Lutz. "Secure communication for Industrie 4.0". at - Automatisierungstechnik 67, n.º 5 (27 de mayo de 2019): 364–71. http://dx.doi.org/10.1515/auto-2019-0018.
Texto completoAnnane, Boubakeur y Alti Adel. "Proxy-3S". International Journal of Information Security and Privacy 16, n.º 1 (enero de 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Texto completoKim, Tai-hoon y Sabah Mohammed. "Toward designing a secure biosurveillance cloud". Journal of Supercomputing 65, n.º 1 (14 de octubre de 2011): 61–70. http://dx.doi.org/10.1007/s11227-011-0709-y.
Texto completoAwan, Ijaz Ahmad, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar y Allah Ditta. "Secure Framework Enhancing AES Algorithm in Cloud Computing". Security and Communication Networks 2020 (1 de septiembre de 2020): 1–16. http://dx.doi.org/10.1155/2020/8863345.
Texto completoGautam, Pratiksha, Mohd Dilshad Ansari y Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing". International Journal of Information Security and Privacy 13, n.º 1 (enero de 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Texto completoH.A, Dinesha y D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol". International Journal of Computer Network and Information Security 9, n.º 3 (8 de marzo de 2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.
Texto completoAzrour, Mourade, Jamal Mabrouki y Rajasekhar Chaganti. "New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT". Security and Communication Networks 2021 (7 de mayo de 2021): 1–12. http://dx.doi.org/10.1155/2021/5546334.
Texto completoKonan, Martin y Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud". International Journal of Information Security and Privacy 12, n.º 4 (octubre de 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Texto completoJouini, Mouna y Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments". International Journal of Cloud Applications and Computing 6, n.º 3 (julio de 2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.
Texto completoGupta, Daya Sagar y G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption". International Journal of Information Security and Privacy 11, n.º 3 (julio de 2017): 54–62. http://dx.doi.org/10.4018/ijisp.2017070105.
Texto completoKUMAR SINGAMANENI, Kranthi y Pasala SANYASI NAIDU. "Secure key management in cloud environment using quantum cryptography". Ingénierie des systèmes d'information 23, n.º 5 (28 de octubre de 2018): 213–22. http://dx.doi.org/10.3166/isi.23.5.213-222.
Texto completoPing, Yuan, Yu Zhan, Ke Lu y Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage". Information 11, n.º 9 (25 de agosto de 2020): 409. http://dx.doi.org/10.3390/info11090409.
Texto completoSun, Shuang, Rong Du y Shudong Chen. "A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System". Information 12, n.º 2 (20 de enero de 2021): 47. http://dx.doi.org/10.3390/info12020047.
Texto completoLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang y Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems". Journal of Systems Architecture 120 (noviembre de 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Texto completoLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang y Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems". Journal of Systems Architecture 120 (noviembre de 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Texto completoKiskani, Mohsen Karimzadeh y Hamid R. Sadjadpour. "Secure and Private Information Retrieval (SAPIR) in Cloud Storage Systems". IEEE Transactions on Vehicular Technology 67, n.º 12 (diciembre de 2018): 12302–12. http://dx.doi.org/10.1109/tvt.2018.2876683.
Texto completoPremnath, Sriram N. y Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems". Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Texto completoShin, Youngjoo, Dongyoung Koo, Junbeom Hur y Joobeom Yun. "Secure proof of storage with deduplication for cloud storage systems". Multimedia Tools and Applications 76, n.º 19 (23 de septiembre de 2015): 19363–78. http://dx.doi.org/10.1007/s11042-015-2956-z.
Texto completoChandel, Sonali, Geng Yang y Sumit Chakravarty. "RSA-CP-IDABE: A Secure Framework for Multi-User and Multi-Owner Cloud Environment". Information 11, n.º 8 (29 de julio de 2020): 382. http://dx.doi.org/10.3390/info11080382.
Texto completoOsmani, Lirim, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Linden, John White, Rasib Khan, Paula Eerola y Sasu Tarkoma. "Secure Cloud Connectivity for Scientific Applications". IEEE Transactions on Services Computing 11, n.º 4 (1 de julio de 2018): 658–70. http://dx.doi.org/10.1109/tsc.2015.2469292.
Texto completoSahaya Stalin, Jose G. y Christopher C. Seldev. "Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes". Applied Mechanics and Materials 626 (agosto de 2014): 26–31. http://dx.doi.org/10.4028/www.scientific.net/amm.626.26.
Texto completoBhardwaj, Akashdeep y Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks". International Journal of Information Technology and Web Engineering 13, n.º 4 (octubre de 2018): 61–77. http://dx.doi.org/10.4018/ijitwe.2018100104.
Texto completoAgarwal, Neha, Ajay Rana, J. P. Pandey y Amit Agarwal. "Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE". International Journal of Information Security and Privacy 14, n.º 1 (enero de 2020): 44–66. http://dx.doi.org/10.4018/ijisp.2020010104.
Texto completoPassricha, Vishal, Ashish Chopra y Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data". International Journal of Advanced Pervasive and Ubiquitous Computing 11, n.º 2 (abril de 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Texto completoYang, Haibin, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui y Xiaoyuan Yang. "Improved Outsourced Provable Data Possession for Secure Cloud Storage". Security and Communication Networks 2021 (22 de julio de 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Texto completoAldahwan, Nouf S. y Muhammed S. Ramzan. "Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA". Security and Communication Networks 2021 (9 de septiembre de 2021): 1–8. http://dx.doi.org/10.1155/2021/8134739.
Texto completoPathak, Vinay. "A Priority Based Efficient Secure Framework for WBANs". International Journal of Information Security and Privacy 13, n.º 3 (julio de 2019): 60–73. http://dx.doi.org/10.4018/ijisp.201907010104.
Texto completoAlshamrani, Sultan. "An efficient algorithm for monitoring virtual machines in clouds". Bulletin of Electrical Engineering and Informatics 8, n.º 2 (1 de junio de 2019): 699–705. http://dx.doi.org/10.11591/eei.v8i2.1416.
Texto completokaur, Sandeep, Gaganpreet kaur y Mohammad Shabaz. "A Secure Two-Factor Authentication Framework in Cloud Computing". Security and Communication Networks 2022 (12 de marzo de 2022): 1–9. http://dx.doi.org/10.1155/2022/7540891.
Texto completoChabbi, Samir, Rachid Boudour y Fouzi Semchedine. "A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone". Ingénierie des systèmes d information 25, n.º 2 (15 de mayo de 2020): 139–52. http://dx.doi.org/10.18280/isi.250201.
Texto completoRana, Minahil, Khalid Mahmood, Muhammad Asad Saleem, Fadi Al-Turjman, Manjur Sayyadbadasha Kolhar y Chadi Altrjman. "Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems". Applied Sciences 13, n.º 3 (20 de enero de 2023): 1424. http://dx.doi.org/10.3390/app13031424.
Texto completoR. Vignesh, R. Vignesh y J. Preethi R. Vignesh. "Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage". 網際網路技術學刊 23, n.º 4 (julio de 2022): 811–25. http://dx.doi.org/10.53106/160792642022072304016.
Texto completoFavre, Liliana Maria. "Formal Metamodeling for Secure Model-Driven Engineering". International Journal of Systems and Software Security and Protection 12, n.º 2 (julio de 2021): 46–67. http://dx.doi.org/10.4018/ijsssp.2021070104.
Texto completo