Статті в журналах з теми "Cloud data protection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cloud data protection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Повний текст джерелаAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Повний текст джерелаG, Indira, Sujitha S, and S. Ganapathy Subramanian. "Data Integrity Protection in Cloud." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 211–18. http://dx.doi.org/10.5121/ijci.2021.100223.
Повний текст джерелаHenze, Martin, René Hummen, Roman Matzutt, Daniel Catrein, and Klaus Wehrle. "Maintaining User Control While Storing and Processing Sensor Data in the Cloud." International Journal of Grid and High Performance Computing 5, no. 4 (October 2013): 97–112. http://dx.doi.org/10.4018/ijghpc.2013100107.
Повний текст джерелаSong, Dawn, Elaine Shi, Ian Fischer, and Umesh Shankar. "Cloud Data Protection for the Masses." Computer 45, no. 1 (January 2012): 39–45. http://dx.doi.org/10.1109/mc.2012.1.
Повний текст джерелаSingh, Niharika, and Ashutosh Kumar Singh. "Data Privacy Protection Mechanisms in Cloud." Data Science and Engineering 3, no. 1 (November 25, 2017): 24–39. http://dx.doi.org/10.1007/s41019-017-0046-0.
Повний текст джерелаDai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.
Повний текст джерелаWei, PengCheng, Dahu Wang, Yu Zhao, Sumarga Kumar Sah Tyagi, and Neeraj Kumar. "Blockchain data-based cloud data integrity protection mechanism." Future Generation Computer Systems 102 (January 2020): 902–11. http://dx.doi.org/10.1016/j.future.2019.09.028.
Повний текст джерелаBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (October 15, 2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Повний текст джерелаM. Dillibabu, M. Dillibabu, S. Kumari S. Kumari, T. Saranya T. Saranya, and R. Preethi R. Preethi. "Assured Protection & Veracity for Cloud Data Using Merkle Hash Tree Algorithm." Indian Journal of Applied Research 3, no. 3 (October 1, 2011): 124–26. http://dx.doi.org/10.15373/2249555x/mar2013/39.
Повний текст джерелаSonar, Abhishek, Prajwal Dubey, and Vineet Iyer. "Protection of User Data in Cloud Computing." International Journal of Computer Applications 175, no. 11 (August 17, 2020): 5–10. http://dx.doi.org/10.5120/ijca2020920584.
Повний текст джерелаUgbari, Augustine Obulor, and Betty Osamegbe Ahubele. "Data Protection for Users in Cloud Computing." International Journal of Computer Applications 184, no. 38 (December 24, 2022): 1–5. http://dx.doi.org/10.5120/ijca2022922215.
Повний текст джерелаHon, W. Kuan, Julia Hörnle, and Christopher Millard. "Data protection jurisdiction and cloud computing – when are cloud users and providers subject to EU data protection law? The cloud of unknowing." International Review of Law, Computers & Technology 26, no. 2-3 (November 2012): 129–64. http://dx.doi.org/10.1080/13600869.2012.698843.
Повний текст джерелаLaptev, V. A., and N. I. Solovyanenko. "«JUDICIAL CLOUD»: LEGAL ISSUES OF DATA STRUCTURING AND PROTECTION." Actual Problems of Russian Law, no. 6 (July 18, 2019): 195–204. http://dx.doi.org/10.17803/1994-1471.2019.103.6.195-204.
Повний текст джерелаKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Повний текст джерелаSingh, Gurpreet, and Susmita Mishra. "CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 14, 2015): 5887–94. http://dx.doi.org/10.24297/ijct.v14i7.1893.
Повний текст джерелаTomíšek, Jan. "Office 365 v. Google Apps: A data protection perspective." Masaryk University Journal of Law and Technology 9, no. 1 (June 30, 2015): 85–109. http://dx.doi.org/10.5817/mujlt2015-1-6.
Повний текст джерелаSauber, Amr M., Passent M. El-Kafrawy, Amr F. Shawish, Mohamed A. Amin, and Ismail M. Hagag. "A New Secure Model for Data Protection over Cloud Computing." Computational Intelligence and Neuroscience 2021 (November 24, 2021): 1–11. http://dx.doi.org/10.1155/2021/8113253.
Повний текст джерелаTang, Xiao Yong, Jin Wei Li, and Gui Ping Liao. "A Trust-Aware Access Control Policy for Cloud Data Protection." Applied Mechanics and Materials 411-414 (September 2013): 40–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.40.
Повний текст джерелаYau, Stephen S., Ho G. An, and Arun Balaji Buduru. "An Approach to Data Confidentiality Protection in Cloud Environments." International Journal of Web Services Research 9, no. 3 (July 2012): 67–83. http://dx.doi.org/10.4018/jwsr.2012070104.
Повний текст джерелаQin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.
Повний текст джерелаSun, Lei, Ji Ling Tang, and Qin Sheng Du. "Data Collection and Processing of Cloud Security Botnet Protection System." Applied Mechanics and Materials 727-728 (January 2015): 923–25. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.923.
Повний текст джерелаShen, Jian, Jun Shen, Chin-Feng Lai, Qi Liu, and Tianqi Zhou. "Cloud Based Data Protection in Anonymously Controlled SDN." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9845426.
Повний текст джерелаHelmbrecht, Udo. "Data protection and legal compliance in cloud computing." Datenschutz und Datensicherheit - DuD 34, no. 8 (August 2010): 554–56. http://dx.doi.org/10.1007/s11623-010-0189-x.
Повний текст джерелаJoseph, Allen Oommen, Jaspher W. Kathrine, and Rohit Vijayan. "Cloud Security Mechanisms for Data Protection: A Survey." International Journal of Multimedia and Ubiquitous Engineering 9, no. 9 (September 30, 2014): 81–90. http://dx.doi.org/10.14257/ijmue.2014.9.9.09.
Повний текст джерелаJakimoski, Kire. "Security Techniques for Data Protection in Cloud Computing." International Journal of Grid and Distributed Computing 9, no. 1 (January 31, 2016): 49–56. http://dx.doi.org/10.14257/ijgdc.2016.9.1.05.
Повний текст джерелаSvantesson, Dan Jerker B. "Data protection in cloud computing – The Swedish perspective." Computer Law & Security Review 28, no. 4 (August 2012): 476–80. http://dx.doi.org/10.1016/j.clsr.2012.05.005.
Повний текст джерелаFal’, O. M., and V. F. Kozak. "Personal Data Protection Problems Associated with Cloud Computing." Cybernetics and Systems Analysis 50, no. 5 (September 2014): 768–73. http://dx.doi.org/10.1007/s10559-014-9667-8.
Повний текст джерелаKoteswari, Dr S., and Dr Kopparthi Suresh. "Analysis of Data Security and Privacy Protection in Cloud Computing Services." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1928–32. http://dx.doi.org/10.22214/ijraset.2022.41028.
Повний текст джерелаHe, Fan. "Applied-Information System in Accounting Data Security via Cloud Computing Systems." Advanced Materials Research 1022 (August 2014): 253–56. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.253.
Повний текст джерелаXu, Tongtong, and Lei Shi. "Research on Big data Security privacy Protection based on cloud Computing." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042077. http://dx.doi.org/10.1088/1742-6596/2083/4/042077.
Повний текст джерелаFarooque, Md, Kailash Patidar, Rishi Kushwah, and Gaurav Saxena. "An efficient data security mechanism with data sharing and authentication." ACCENTS Transactions on Information Security 5, no. 19 (July 30, 2020): 26–31. http://dx.doi.org/10.19101/tis.2020.517008.
Повний текст джерелаFarooque, Md, Kailash Patidar, Rishi Kushwah, and Gaurav Saxena. "An efficient data security mechanism with data sharing and authentication." ACCENTS Transactions on Information Security 5, no. 19 (July 30, 2020): 26–31. http://dx.doi.org/10.19101/tis.2020.517008.
Повний текст джерелаOgiela, Lidia, Marek R. Ogiela, and Hoon Ko. "Intelligent Data Management and Security in Cloud Computing." Sensors 20, no. 12 (June 18, 2020): 3458. http://dx.doi.org/10.3390/s20123458.
Повний текст джерелаZhang, Jian Hua, Nan Zhang, and Chun Chang Fu. "Privacy Protection in Cloud Storage." Applied Mechanics and Materials 55-57 (May 2011): 504–7. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.504.
Повний текст джерелаLiu, Jing, Changbo Yuan, Yingxu Lai, and Hua Qin. "Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage." Security and Communication Networks 2020 (April 2, 2020): 1–16. http://dx.doi.org/10.1155/2020/2017930.
Повний текст джерелаEt. al., Dr M. Buvana,. "Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 459–64. http://dx.doi.org/10.17762/turcomat.v12i1s.1905.
Повний текст джерелаWang, Yan, Ying Liu, and Chao Ling Li. "Sensitive Cloud Data Deduplication with Data Dynamics." Applied Mechanics and Materials 556-562 (May 2014): 6236–40. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6236.
Повний текст джерелаP, Dayaker, Chandrasekhara Reddy T, Honey Diana P, and A. Mallikarjun Reddy. "Recent Trends in Security and Privacy of Sensitive Data in Cloud Computing." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 241. http://dx.doi.org/10.14419/ijet.v7i4.6.20484.
Повний текст джерелаHuang, Liang, and Hyung-Hyo Lee. "A Medical Data Privacy Protection Scheme Based on Blockchain and Cloud Computing." Wireless Communications and Mobile Computing 2020 (September 26, 2020): 1–11. http://dx.doi.org/10.1155/2020/8859961.
Повний текст джерелаKavuri, Satheesh K. S. V. A., Gangadhara Rao Kancherla, and Basaveswararao Bobba. "An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 950. http://dx.doi.org/10.11591/ijece.v7i2.pp950-960.
Повний текст джерелаRavindranadh, K., Mallarapu Sai Kiran, B. Durga Sai Pavan Kumar, and D. Priyanka. "Data migration in cloud computing using honey encryption." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 230. http://dx.doi.org/10.14419/ijet.v7i2.8.10415.
Повний текст джерелаEt. al., Prerna Agarwal. "A Safe and Resilient Cryptographic System for Dynamic Cloud Groups with Secure Data Sharing and Efficient User Revocation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 5164–75. http://dx.doi.org/10.17762/turcomat.v12i3.2144.
Повний текст джерелаWoon Choong, Chen, and Leelavathi Rajamanickam. "Mobile Cloud Computing - Protection Issues." Journal of Engineering & Technological Advances 1, no. 1 (2016): 83–88. http://dx.doi.org/10.35934/segi.v1i1.83.
Повний текст джерелаBabitha, M. N., and M. Siddappa. "An approach for data integrity authentication and protection in fog computing." Multiagent and Grid Systems 18, no. 2 (August 30, 2022): 87–105. http://dx.doi.org/10.3233/mgs-220210.
Повний текст джерелаSun, Xinwei, and Zhang Wei. "The Dynamic Data Privacy Protection Strategy Based on the CAP Theory." International Journal of Interdisciplinary Telecommunications and Networking 7, no. 1 (January 2015): 44–56. http://dx.doi.org/10.4018/ijitn.2015010104.
Повний текст джерелаSaeed, Muhammad Yousaf, and M. N. A. Khan. "Data Protection Techniques for Building Trust in Cloud Computing." International Journal of Modern Education and Computer Science 7, no. 8 (August 8, 2015): 38–47. http://dx.doi.org/10.5815/ijmecs.2015.08.05.
Повний текст джерелаRai, Dr P. K., R. K. Bunkar, and Vivekananda Mishra. "Data Security and Privacy Protection Issues in Cloud Computing." IOSR Journal of Computer Engineering 16, no. 1 (2014): 39–44. http://dx.doi.org/10.9790/0661-16193944.
Повний текст джерелаVashishtha, Megha. "DATA-CENTRIC PROTECTION IN INTER CLOUD ENVIRONMENT: A SURVEY." International Journal of Advanced Research in Computer Science 9, no. 1 (February 20, 2018): 64–70. http://dx.doi.org/10.26483/ijarcs.v9i1.5223.
Повний текст джерелаMahmood, Ghassan Sabeeh, Dong Jun Huang, and Baidaa Abdulrahman Jaleel. "Data Security Protection in Cloud Using Encryption and Authentication." Journal of Computational and Theoretical Nanoscience 14, no. 4 (April 1, 2017): 1801–4. http://dx.doi.org/10.1166/jctn.2017.6508.
Повний текст джерела