Threats classification: state of the art

M Jouini, LBA Rabai - … Solutions for Computer and Cyber Security, 2016 - igi-global.com
Abstract Information systems are frequently exposed to various types of threats which can
cause different types of damages that might lead to significant financial losses. Information …

Surveying and analyzing security problems in cloud computing environments

M Jouini, LBA Rabai - 2014 Tenth International Conference on …, 2014 - ieeexplore.ieee.org
Cloud computing technology is a relatively new concept of providing dramatically scalable
and virtualized resources, software and hardware on demand to consumers. Cloud …

Cellular automata based cryptography model for reliable encryption using state transition in wireless network optimizing data security

A Banerjee, A Kundu - Wireless Personal Communications, 2021 - Springer
Authors propose a hardware based approach for reliable encryption in wireless network
using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed …

[PDF][PDF] A Survey on Security Issues and the Existing Solutions in Cloud Computing

Y Ghebghoub, S Oukid, O Boussaid - International Journal of …, 2013 - researchgate.net
Cloud Computing has been developed to deliver information technologies services on
demand to organizations such as well as individual users, this technology is still in its early …

[PDF][PDF] Network security in embedded system using TLS

V Negi, H Verma, I Singh, A Vikram, K Malik… - Int. J. Secur. its …, 2016 - researchgate.net
Security in terms of Networks have turn out to be more significant to Organizations, Military
and personal computer user's. Since various kinds of threats are for data from sending it …

[PDF][PDF] A new innovation on user's level security for storage data in cloud computing

R Sindhu, M Mushtaque - International Journal of Grid & Distributed …, 2014 - academia.edu
Abstract In Cloud Computing data security as well as load balancing of cloud server is very
important and most challenging issues. Cloud reduces cost by providing on demand access …

An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol

GR Vijay, ARM Reddy - International Journal of Computer …, 2021 - inderscienceonline.com
Cloud service providers need to have elevated level of security than local system users, as
users outsource their data to a remote system relying on its genuineness and also data has …

Framework for Distributed Network Simulation and State Propagation

C Dennett, A El Rhalibi… - 2010 Developments in E …, 2010 - ieeexplore.ieee.org
In this paper, we focus on the simulation element of a hybrid client-server and authority-
driven peer-to-peer MMOG framework currently in development, created in Java and …

A Survey on issues of Security in Cloud Computing.

S Vats - International Journal of Advanced Research in …, 2016 - search.ebscohost.com
Cloud computing is one of the most new technology in market. it is a combination of the
concept of" software-as-aservice" and" utility computing". it provide convenient and …

[PDF][PDF] Ensuring Data Security in Cloud Computing using Homomorphic Encryption

KS Siraj - 2020 - academia.edu
Cloud computing is the most interesting and new technology which offers computing as
service rather a product to its clients on demand through Internet. Since cloud computing …