Статті в журналах з теми "SECURE CLOUD SYSTEMS"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "SECURE CLOUD SYSTEMS".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Baars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture." International Journal of Information Security and Privacy 6, no. 1 (January 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Повний текст джерелаGupta, Daya Sagar, and G. P. Biswas. "Secure Computation on Cloud Storage." Journal of Cases on Information Technology 17, no. 3 (July 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Повний текст джерелаBodepudi, Anusha, Manjunath Reddy, Sai Srujan Gutlapalli, and Mounika Mandapuram. "Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing." American Journal of Trade and Policy 8, no. 3 (December 31, 2021): 231–38. http://dx.doi.org/10.18034/ajtp.v8i3.651.
Повний текст джерелаAeri, Manisha. "Secure Data Sharing in Cloud Computing Systems: Techniques and Applications." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (December 15, 2020): 2087–94. http://dx.doi.org/10.17762/turcomat.v11i3.13606.
Повний текст джерелаPaudyal, Ramesh, and Subarna Shakya. "Secure Data Mobility in Cloud Computing for e-Governance Application." Journal of Engineering Technology and Planning 2, no. 1 (August 19, 2021): 1–14. http://dx.doi.org/10.3126/joetp.v2i1.39203.
Повний текст джерелаHuang, Qinlong, Yue He, Wei Yue, and Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption." Security and Communication Networks 2018 (October 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.
Повний текст джерелаSirurmath, Ms Srilakshmi U., and Dr Deepashree Devaraj. "Secure Cloud Storage Techniques: A Review." Journal of University of Shanghai for Science and Technology 23, no. 07 (August 1, 2021): 1388–95. http://dx.doi.org/10.51201/jusst/21/07243.
Повний текст джерелаRavinder, Rao, and V. Sucharita. "A secure cloud service deployment framework for DevOps." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (February 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp874-885.
Повний текст джерелаLi, Jiaxing, Jigang Wu, and Long Chen. "Block-secure: Blockchain based scheme for secure P2P cloud storage." Information Sciences 465 (October 2018): 219–31. http://dx.doi.org/10.1016/j.ins.2018.06.071.
Повний текст джерелаPape, Sebastian, Federica Paci, Jan Jürjens, and Fabio Massacci. "Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach." Information 11, no. 5 (May 11, 2020): 261. http://dx.doi.org/10.3390/info11050261.
Повний текст джерелаWu, Zhen-Yu. "A Secure and Efficient Digital-Data-Sharing System for Cloud Environments." Sensors 19, no. 12 (June 24, 2019): 2817. http://dx.doi.org/10.3390/s19122817.
Повний текст джерелаVarnovsky, N. P., V. A. Zakharov, and A. V. Shokurov. "On the existence of provably secure cloud computing systems." Moscow University Computational Mathematics and Cybernetics 40, no. 2 (April 2016): 83–88. http://dx.doi.org/10.3103/s0278641916020096.
Повний текст джерелаYadav, Dilip, and Sephali Behera. "A Survey on Secure Cloud-Based E-Health Systems." EAI Endorsed Transactions on Pervasive Health and Technology 5, no. 20 (May 5, 2020): 163308. http://dx.doi.org/10.4108/eai.13-7-2018.163308.
Повний текст джерелаSahaya Stalin Jose, G., and C. Seldev Christopher. "Secure cloud data storage approach in e-learning systems." Cluster Computing 22, S5 (February 22, 2018): 12857–62. http://dx.doi.org/10.1007/s10586-018-1785-z.
Повний текст джерелаZhang, Jiang, Zhenfeng Zhang, and Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing." IEEE Transactions on Mobile Computing 16, no. 11 (November 1, 2017): 3222–35. http://dx.doi.org/10.1109/tmc.2017.2687931.
Повний текст джерелаMallika P, Indhurekha S, and Jarlin Jeincy. "Secure and Efficient Anonymous Group Data Sharing by SBIBD Technique in Cloud Environment." international journal of engineering technology and management sciences 7, no. 1 (2023): 194–98. http://dx.doi.org/10.46647/ijetms.2023.v07i01.027.
Повний текст джерелаMugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine, and Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes." International Journal of Information Security and Privacy 11, no. 1 (January 2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.
Повний текст джерелаJänicke, Lutz. "Secure communication for Industrie 4.0." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 364–71. http://dx.doi.org/10.1515/auto-2019-0018.
Повний текст джерелаAnnane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Повний текст джерелаKim, Tai-hoon, and Sabah Mohammed. "Toward designing a secure biosurveillance cloud." Journal of Supercomputing 65, no. 1 (October 14, 2011): 61–70. http://dx.doi.org/10.1007/s11227-011-0709-y.
Повний текст джерелаAwan, Ijaz Ahmad, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar, and Allah Ditta. "Secure Framework Enhancing AES Algorithm in Cloud Computing." Security and Communication Networks 2020 (September 1, 2020): 1–16. http://dx.doi.org/10.1155/2020/8863345.
Повний текст джерелаGautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Повний текст джерелаH.A, Dinesha, and D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol." International Journal of Computer Network and Information Security 9, no. 3 (March 8, 2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.
Повний текст джерелаAzrour, Mourade, Jamal Mabrouki, and Rajasekhar Chaganti. "New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT." Security and Communication Networks 2021 (May 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5546334.
Повний текст джерелаKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Повний текст джерелаJouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments." International Journal of Cloud Applications and Computing 6, no. 3 (July 2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.
Повний текст джерелаGupta, Daya Sagar, and G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption." International Journal of Information Security and Privacy 11, no. 3 (July 2017): 54–62. http://dx.doi.org/10.4018/ijisp.2017070105.
Повний текст джерелаKUMAR SINGAMANENI, Kranthi, and Pasala SANYASI NAIDU. "Secure key management in cloud environment using quantum cryptography." Ingénierie des systèmes d'information 23, no. 5 (October 28, 2018): 213–22. http://dx.doi.org/10.3166/isi.23.5.213-222.
Повний текст джерелаPing, Yuan, Yu Zhan, Ke Lu, and Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage." Information 11, no. 9 (August 25, 2020): 409. http://dx.doi.org/10.3390/info11090409.
Повний текст джерелаSun, Shuang, Rong Du, and Shudong Chen. "A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System." Information 12, no. 2 (January 20, 2021): 47. http://dx.doi.org/10.3390/info12020047.
Повний текст джерелаLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, and Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems." Journal of Systems Architecture 120 (November 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Повний текст джерелаLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, and Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems." Journal of Systems Architecture 120 (November 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Повний текст джерелаKiskani, Mohsen Karimzadeh, and Hamid R. Sadjadpour. "Secure and Private Information Retrieval (SAPIR) in Cloud Storage Systems." IEEE Transactions on Vehicular Technology 67, no. 12 (December 2018): 12302–12. http://dx.doi.org/10.1109/tvt.2018.2876683.
Повний текст джерелаPremnath, Sriram N., and Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems." Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Повний текст джерелаShin, Youngjoo, Dongyoung Koo, Junbeom Hur, and Joobeom Yun. "Secure proof of storage with deduplication for cloud storage systems." Multimedia Tools and Applications 76, no. 19 (September 23, 2015): 19363–78. http://dx.doi.org/10.1007/s11042-015-2956-z.
Повний текст джерелаChandel, Sonali, Geng Yang, and Sumit Chakravarty. "RSA-CP-IDABE: A Secure Framework for Multi-User and Multi-Owner Cloud Environment." Information 11, no. 8 (July 29, 2020): 382. http://dx.doi.org/10.3390/info11080382.
Повний текст джерелаOsmani, Lirim, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Linden, John White, Rasib Khan, Paula Eerola, and Sasu Tarkoma. "Secure Cloud Connectivity for Scientific Applications." IEEE Transactions on Services Computing 11, no. 4 (July 1, 2018): 658–70. http://dx.doi.org/10.1109/tsc.2015.2469292.
Повний текст джерелаSahaya Stalin, Jose G., and Christopher C. Seldev. "Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes." Applied Mechanics and Materials 626 (August 2014): 26–31. http://dx.doi.org/10.4028/www.scientific.net/amm.626.26.
Повний текст джерелаBhardwaj, Akashdeep, and Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks." International Journal of Information Technology and Web Engineering 13, no. 4 (October 2018): 61–77. http://dx.doi.org/10.4018/ijitwe.2018100104.
Повний текст джерелаAgarwal, Neha, Ajay Rana, J. P. Pandey, and Amit Agarwal. "Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 44–66. http://dx.doi.org/10.4018/ijisp.2020010104.
Повний текст джерелаPassricha, Vishal, Ashish Chopra, and Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data." International Journal of Advanced Pervasive and Ubiquitous Computing 11, no. 2 (April 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Повний текст джерелаYang, Haibin, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui, and Xiaoyuan Yang. "Improved Outsourced Provable Data Possession for Secure Cloud Storage." Security and Communication Networks 2021 (July 22, 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Повний текст джерелаAldahwan, Nouf S., and Muhammed S. Ramzan. "Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA." Security and Communication Networks 2021 (September 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/8134739.
Повний текст джерелаPathak, Vinay. "A Priority Based Efficient Secure Framework for WBANs." International Journal of Information Security and Privacy 13, no. 3 (July 2019): 60–73. http://dx.doi.org/10.4018/ijisp.201907010104.
Повний текст джерелаAlshamrani, Sultan. "An efficient algorithm for monitoring virtual machines in clouds." Bulletin of Electrical Engineering and Informatics 8, no. 2 (June 1, 2019): 699–705. http://dx.doi.org/10.11591/eei.v8i2.1416.
Повний текст джерелаkaur, Sandeep, Gaganpreet kaur, and Mohammad Shabaz. "A Secure Two-Factor Authentication Framework in Cloud Computing." Security and Communication Networks 2022 (March 12, 2022): 1–9. http://dx.doi.org/10.1155/2022/7540891.
Повний текст джерелаChabbi, Samir, Rachid Boudour, and Fouzi Semchedine. "A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone." Ingénierie des systèmes d information 25, no. 2 (May 15, 2020): 139–52. http://dx.doi.org/10.18280/isi.250201.
Повний текст джерелаRana, Minahil, Khalid Mahmood, Muhammad Asad Saleem, Fadi Al-Turjman, Manjur Sayyadbadasha Kolhar, and Chadi Altrjman. "Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems." Applied Sciences 13, no. 3 (January 20, 2023): 1424. http://dx.doi.org/10.3390/app13031424.
Повний текст джерелаR. Vignesh, R. Vignesh, and J. Preethi R. Vignesh. "Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage." 網際網路技術學刊 23, no. 4 (July 2022): 811–25. http://dx.doi.org/10.53106/160792642022072304016.
Повний текст джерелаFavre, Liliana Maria. "Formal Metamodeling for Secure Model-Driven Engineering." International Journal of Systems and Software Security and Protection 12, no. 2 (July 2021): 46–67. http://dx.doi.org/10.4018/ijsssp.2021070104.
Повний текст джерела