Добірка наукової літератури з теми "SECURE CLOUD SYSTEMS"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SECURE CLOUD SYSTEMS".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "SECURE CLOUD SYSTEMS"
Baars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture." International Journal of Information Security and Privacy 6, no. 1 (January 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Повний текст джерелаGupta, Daya Sagar, and G. P. Biswas. "Secure Computation on Cloud Storage." Journal of Cases on Information Technology 17, no. 3 (July 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Повний текст джерелаBodepudi, Anusha, Manjunath Reddy, Sai Srujan Gutlapalli, and Mounika Mandapuram. "Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing." American Journal of Trade and Policy 8, no. 3 (December 31, 2021): 231–38. http://dx.doi.org/10.18034/ajtp.v8i3.651.
Повний текст джерелаAeri, Manisha. "Secure Data Sharing in Cloud Computing Systems: Techniques and Applications." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (December 15, 2020): 2087–94. http://dx.doi.org/10.17762/turcomat.v11i3.13606.
Повний текст джерелаPaudyal, Ramesh, and Subarna Shakya. "Secure Data Mobility in Cloud Computing for e-Governance Application." Journal of Engineering Technology and Planning 2, no. 1 (August 19, 2021): 1–14. http://dx.doi.org/10.3126/joetp.v2i1.39203.
Повний текст джерелаHuang, Qinlong, Yue He, Wei Yue, and Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption." Security and Communication Networks 2018 (October 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.
Повний текст джерелаSirurmath, Ms Srilakshmi U., and Dr Deepashree Devaraj. "Secure Cloud Storage Techniques: A Review." Journal of University of Shanghai for Science and Technology 23, no. 07 (August 1, 2021): 1388–95. http://dx.doi.org/10.51201/jusst/21/07243.
Повний текст джерелаRavinder, Rao, and V. Sucharita. "A secure cloud service deployment framework for DevOps." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (February 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp874-885.
Повний текст джерелаLi, Jiaxing, Jigang Wu, and Long Chen. "Block-secure: Blockchain based scheme for secure P2P cloud storage." Information Sciences 465 (October 2018): 219–31. http://dx.doi.org/10.1016/j.ins.2018.06.071.
Повний текст джерелаPape, Sebastian, Federica Paci, Jan Jürjens, and Fabio Massacci. "Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach." Information 11, no. 5 (May 11, 2020): 261. http://dx.doi.org/10.3390/info11050261.
Повний текст джерелаДисертації з теми "SECURE CLOUD SYSTEMS"
Lim, Jun Ming Kelvin. "Multi-level secure information sharing between smart cloud systems of systems." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41410.
Повний текст джерелаReissued 1 Jul 2014 with corrections to in-text Figure and Table citations.
There is a need to have secure information sharing in the industry and government sectors. For example, countries within the North Atlantic Treaty Organization (NATO) often have a common goal requiring them to communicate, but they lack a technological platform for fast information sharing, especially if the countries have different access rights to the information. Thus, the same information that an organization wants to share with multiple partners needs to be securely shared at multiple levels. In addition, the manner in which information is shared needs to be flexible enough to accommodate changes on demand, due to the nature of the information or relationship with the sharing organizations. This thesis proposes a configurable, cloud infrastructure that enables multiple layers of secure information sharing between multiple organizations. This thesis follows a systems engineering process to propose a preliminary architecture of such a system, including an analysis of alternatives of some of the attributes of the system. Secondly, the thesis instantiates part of the proposed architecture with a proof-of-concept physical system in a laboratory environment. The proof-of-concept chooses a specific scenario of information sharing that would allow NATO members to access shared data faster, and in a secure fashion, in order to make decisions more quickly with the authorized information.
Gai, Keke. "An Approach for Designing Secure and High Performance Cloud Systems." Thesis, Pace University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10635446.
Повний текст джерелаRecent expansions of cloud computing have been growing at a phenomenal rate. Security and privacy issues have become a considerable issue while the applications of big data are growing dramatically fast in cloud computing. However, there exists a contradiction between ensuring a high performance and achieving a high-level security and privacy protection due to the restrictions of the computing resources, based on the findings of the literature review. This study focuses on this contradiction issue and intend to develop an approach of effectuating the cloud system design for a high-level security and privacy protection while acquiring a high performance. The work consists of four research tasks that support the solution to the proposed problem. They are (i) designing a Optimal Fully Homomorphic Encryption (O-FHE) mechanism that can both avoid noise and execute efficiently; (ii) designing a privacy-preserving data encryption strategy while considering efficiency; (iii) developing an approach of the data analytics manager system for in-memory big data analytics; (iv) designing an adaptive energy-aware data allocation approach for heterogeneous memory and creating an efficient data allocation approach for cloud-based heterogeneous memory. The research implements experimental evaluations to examine the performance of the proposed approaches. The main contributions of this study address three aspects. First, this study has proposed an O-FHE method that is different from all approaches proposed by the prior researches. Second, this study addresses the contradiction between the data security and system performance and presents a privacy-preserving strategy for secure data transmissions in cloud systems. Finally, this study attempts to increase the computation efficiency by enhancing the functioning of hardware, more specifically, using heterogeneous memory and in-memory data analytics.
Tang, Yuzhe. "Secure and high-performance big-data systems in the cloud." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53995.
Повний текст джерелаWang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Повний текст джерелаHarmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.
Повний текст джерелаGoméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.
Повний текст джерелаWiss, Thomas. "Evaluation of Internet of Things Communication Protocols Adapted for Secure Transmission in Fog Computing Environments." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35298.
Повний текст джерелаKathirvel, Anitha, and Siddharth Madan. "Efficient Privacy Preserving Key Management for Public Cloud Networks." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148048.
Повний текст джерелаDe flesta program och dokument lagras i ett offentligt moln för lagring och hantering ändamål i en molnmiljö. De stora fördelarna med att lagra program och dokument i offentliga moln är lägre kostnad genom användning av delade datorresurser och ingen upfront infrastruktur costs.However, i detta fall hanteringen av data och andra tjänster är osäker. Därför är säkerhet ett stort problem i en offentlig moln som molnet och nätverket är öppna för många andra användare. För att ge trygghet, är det nödvändigt för dataägare att lagra sina data i det offentliga molnet på ett säkert sätt och att använda en lämplig åtkomstkontroll schema. Utforma en beräkning och kommunikation effektiv nyckelhantering system för att selektivt dela dokument som grundar sig på finkorniga attributbaserad åtkomstkontroll politik i en offentlig moln är en utmanande uppgift. Det finns många befintliga metoder som krypterar dokument före lagring i det offentliga molnet: Dessa metoder använder olika tangenter och en publik nyckel kryptografiskt system för att genomföra attributbaserad kryptering och / eller proxy re-kryptering. Dock har dessa metoder inte effektivt hantera användare som ansluter och lämnar systemet när identitetsattribut och politik förändras. Dessutom är dessa metoder kräver att hålla flera krypterade kopior av samma dokument, som har en hög beräkningskostnad eller ådrar sig onödiga lagringskostnader. Därför fokuserade projektet på design och utveckling av en effektiv nyckelhantering system för att möjliggöra dataägaren att lagra data i en molntjänst på ett säkert sätt. Dessutom, den föreslagna metoden gör det möjligt för molnanvändare att få tillgång till uppgifter lagras i ett cloud på ett säkert sätt. Många forskare har föreslagit viktiga förvaltningssystem för fasta och trådlösa nätverk. Alla dessa befintliga system ke, skiljer sig från de centrala förvaltningssystemen som föreslås i denna avhandling. Först föreslog nyckelhanteringssystemet i denna avhandling ökar Medverkan nivå säkerhet. För det andra, minimerar den föreslagna nyckelhanteringssystemet beräkningskomplexiteten för molnanvändare genom att utföra endast en matematisk operation för att hitta den nya gruppknapp som tidigare beräknades av dataägaren. Dessutom är denna föreslagna nyckelhanteringsschema lämpligt för ett moln nätverk. För det tredje, den föreslagna nyckeldistribution och nyckelhantering systemet utnyttjar integritets bevara metoder och därmed skydda privatlivet för användaren. Slutligen har ett parti viktig uppdatering algoritm (även kallad batch nya nycklar) föreslagits för att minska antalet Ny serieläggning av operationer som krävs för att utföra batch ledighet eller gå med i verksamheten. Nyckelhanteringssystemet som föreslås i denna avhandling är utformad för att minska beräknings-och kommunikations komplexitet i alla utom ett fåtal fall, och samtidigt öka säkerheten och integriteten av uppgifterna.
Pokherl, Bibesh. "Secure Web System in a Cloud Environment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-117352.
Повний текст джерелаAbolafya, Natan. "Secure Documents Sharing System for Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121297.
Повний текст джерелаКниги з теми "SECURE CLOUD SYSTEMS"
Traore, Issa, Isaac Woungang, Sherif Saad Ahmed, and Yasir Malik, eds. Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03712-3.
Повний текст джерелаTraore, Issa, Isaac Woungang, and Ahmed Awad, eds. Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69155-8.
Повний текст джерелаXia, Yuanqing, and Magdi S. Mahmoud. Networked Control Systems: Cloud Control and Secure Control. Elsevier Science & Technology, 2019.
Знайти повний текст джерелаXia, Yuanqing, and Magdi S. Mahmoud. Networked Control Systems: Cloud Control and Secure Control. Elsevier Science & Technology Books, 2019.
Знайти повний текст джерелаWhitmore, Jim. Cyber Secure Development Lifecycle: A Disciplined Approach to Building Secure Software, Systems, and Cloud Services. Wiley & Sons, Incorporated, John, 2018.
Знайти повний текст джерелаWhitmore, Jim. Cyber Secure Development Lifecycle: A Disciplined Approach to Building Secure Software, Systems, and Cloud Services. Wiley & Sons, Incorporated, John, 2018.
Знайти повний текст джерелаWhitmore, Jim. Cyber Secure Development Lifecycle: A Disciplined Approach to Building Secure Software, Systems, and Cloud Services. Wiley & Sons, Incorporated, John, 2018.
Знайти повний текст джерелаDiver, Richard, Gary Bushey, and Jason S. Rader. Learn Azure Sentinel: Integrate Azure Security with Artificial Intelligence to Build Secure Cloud Systems. Packt Publishing, Limited, 2020.
Знайти повний текст джерелаWoungang, Isaac, Issa Traore, Sherif Saad Ahmed, and Yasir Malik. Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments: Second International Conference, ISDDC 2018, Vancouver, BC, Canada, ... Springer, 2018.
Знайти повний текст джерелаWoungang, Isaac, Issa Traore, and Ahmed Awad. Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments: First International Conference, ISDDC 2017, Vancouver, BC, Canada, ... Springer, 2017.
Знайти повний текст джерелаЧастини книг з теми "SECURE CLOUD SYSTEMS"
Halang, Wolfgang A., Maytiyanin Komkhao, and Sunantha Sodsee. "Secure Cloud Computing." In Advances in Intelligent Systems and Computing, 305–14. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06538-0_30.
Повний текст джерелаCam, Hasan. "Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems." In Secure Cloud Computing, 325–43. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_15.
Повний текст джерелаPearson, Siani. "Accountability in Cloud Service Provision Ecosystems." In Secure IT Systems, 3–24. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3_1.
Повний текст джерелаPulls, Tobias. "Privacy-Friendly Cloud Storage for the Data Track." In Secure IT Systems, 231–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34210-3_16.
Повний текст джерелаZahoor, Ehtesham, Asim Ikram, Sabina Akhtar, and Olivier Perrin. "Authorization Policies Specification and Consistency Management within Multi-cloud Environments." In Secure IT Systems, 272–88. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6_17.
Повний текст джерелаAngulo, Julio, Erik Wästlund, and Johan Högberg. "What Would It Take for You to Tell Your Secrets to a Cloud?" In Secure IT Systems, 129–45. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11599-3_8.
Повний текст джерелаAgrawal, Divyakant, Amr El Abbadi, and Shiyuan Wang. "Secure Data Management in the Cloud." In Databases in Networked Information Systems, 1–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25731-5_1.
Повний текст джерелаThilakanathan, Danan, Shiping Chen, Surya Nepal, and Rafael A. Calvo. "Secure Data Sharing in the Cloud." In Security, Privacy and Trust in Cloud Systems, 45–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38586-5_2.
Повний текст джерелаSumitra, Binu, Pethuru Raj, and M. Misbahuddin. "Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment." In Advances in Intelligent Systems and Computing, 183–202. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2650-5_12.
Повний текст джерелаAneja, Piyush, Akhil Bhatia, and Achyut Shankar. "A Review of Secure Cloud Storage-Based on Cloud Computing." In Advances in Intelligent Systems and Computing, 923–33. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9927-9_88.
Повний текст джерелаТези доповідей конференцій з теми "SECURE CLOUD SYSTEMS"
Babenko, M., A. Tchernykh, E. Golimblevskaia, H. N. Viet, and V. Chaurasiya. "Computationally secure threshold secret sharing scheme with minimal redundancy." In The International Workshop on Information, Computation, and Control Systems for Distributed Environments. Crossref, 2020. http://dx.doi.org/10.47350/iccs-de.2020.02.
Повний текст джерелаOppermann, Alexander, Marko Esche, Florian Thiel, and Jean-Pierre Seifert. "Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology." In 2018 Federated Conference on Computer Science and Information Systems. IEEE, 2018. http://dx.doi.org/10.15439/2018f226.
Повний текст джерелаTroubitsyna, Elena, and Irum Rauf. "Generating Cloud Monitors from Models to Secure Clouds." In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2018. http://dx.doi.org/10.1109/dsn.2018.00060.
Повний текст джерелаShei, Shaun, Luis Marquez Alcaniz, Haralambos Mouratidis, Aidan Delaney, David G. Rosado, and Eduardo Fernandez-Medina. "Modelling secure cloud systems based on system requirements." In 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). IEEE, 2015. http://dx.doi.org/10.1109/espre.2015.7330163.
Повний текст джерелаSankareeswari, G., S. Selvi, and R. Vidhyalakshmi. "Enabling secure outsourced cloud data." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033904.
Повний текст джерелаKhalil, Issa, Ismail Hababeh, and Abdallah Khreishah. "Secure inter cloud data migration." In 2016 7th International Conference on Information and Communication Systems (ICICS). IEEE, 2016. http://dx.doi.org/10.1109/iacs.2016.7476087.
Повний текст джерелаEldefrawy, Karim, Sky Faber, and Tyler Kaczmarek. "Proactively Secure Cloud-Enabled Storage." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.293.
Повний текст джерелаZwattendorfer, Bernd, and Arne Tauber. "Secure cloud authentication using eIDs." In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2012. http://dx.doi.org/10.1109/ccis.2012.6664435.
Повний текст джерелаJoshi, Maithilee, Karuna Joshi, and Tim Finin. "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems." In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE, 2018. http://dx.doi.org/10.1109/cloud.2018.00139.
Повний текст джерелаPathak, Abhishek, Kaarthik Sivakumar, Jin Sheng, Anlu Yan, and Mazhar Haque. "Effective Static Analysis Enforcement in Complex Cloud Native Dockerized Systems." In 2019 IEEE Secure Development (SecDev). IEEE, 2019. http://dx.doi.org/10.1109/secdev.2019.00024.
Повний текст джерела