Threats classification: state of the art
Abstract Information systems are frequently exposed to various types of threats which can
cause different types of damages that might lead to significant financial losses. Information …
cause different types of damages that might lead to significant financial losses. Information …
Surveying and analyzing security problems in cloud computing environments
Cloud computing technology is a relatively new concept of providing dramatically scalable
and virtualized resources, software and hardware on demand to consumers. Cloud …
and virtualized resources, software and hardware on demand to consumers. Cloud …
Cellular automata based cryptography model for reliable encryption using state transition in wireless network optimizing data security
Authors propose a hardware based approach for reliable encryption in wireless network
using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed …
using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed …
[PDF][PDF] A Survey on Security Issues and the Existing Solutions in Cloud Computing
Y Ghebghoub, S Oukid, O Boussaid - International Journal of …, 2013 - researchgate.net
Cloud Computing has been developed to deliver information technologies services on
demand to organizations such as well as individual users, this technology is still in its early …
demand to organizations such as well as individual users, this technology is still in its early …
[PDF][PDF] Network security in embedded system using TLS
Security in terms of Networks have turn out to be more significant to Organizations, Military
and personal computer user's. Since various kinds of threats are for data from sending it …
and personal computer user's. Since various kinds of threats are for data from sending it …
[PDF][PDF] A new innovation on user's level security for storage data in cloud computing
R Sindhu, M Mushtaque - International Journal of Grid & Distributed …, 2014 - academia.edu
Abstract In Cloud Computing data security as well as load balancing of cloud server is very
important and most challenging issues. Cloud reduces cost by providing on demand access …
important and most challenging issues. Cloud reduces cost by providing on demand access …
An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol
Cloud service providers need to have elevated level of security than local system users, as
users outsource their data to a remote system relying on its genuineness and also data has …
users outsource their data to a remote system relying on its genuineness and also data has …
Framework for Distributed Network Simulation and State Propagation
C Dennett, A El Rhalibi… - 2010 Developments in E …, 2010 - ieeexplore.ieee.org
In this paper, we focus on the simulation element of a hybrid client-server and authority-
driven peer-to-peer MMOG framework currently in development, created in Java and …
driven peer-to-peer MMOG framework currently in development, created in Java and …
A Survey on issues of Security in Cloud Computing.
S Vats - International Journal of Advanced Research in …, 2016 - search.ebscohost.com
Cloud computing is one of the most new technology in market. it is a combination of the
concept of" software-as-aservice" and" utility computing". it provide convenient and …
concept of" software-as-aservice" and" utility computing". it provide convenient and …
[PDF][PDF] Ensuring Data Security in Cloud Computing using Homomorphic Encryption
KS Siraj - 2020 - academia.edu
Cloud computing is the most interesting and new technology which offers computing as
service rather a product to its clients on demand through Internet. Since cloud computing …
service rather a product to its clients on demand through Internet. Since cloud computing …