Survey on DDoS attacks and defense mechanisms in cloud and fog computing

D Chaudhary, K Bhushan, BB Gupta - Cloud Security: Concepts …, 2019 - igi-global.com
This article describes how cloud computing has emerged as a strong competitor against
traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on …

Architecture of combined e-learning environment and investigation of secure access and privacy protection

RP Romansky, IS Noninska - Censorship, Surveillance, and Privacy …, 2019 - igi-global.com
The contemporary digital world based on network communications, globalization and
information sharing outlines new important targets in the area of privacy and personal data …

Designing a comprehensive framework for data and network security in cloud computing: case of Kenyan banking industry

G Ouma, M Awuor, KP Wamuyu… - African Journal of …, 2024 - ajoeijournals.org
This study sought to develop a tailored framework for secure cloud computing
implementation in the Kenyan banking industry, addressing the unique security challenges …

Security issues in distributed computing system models

GF Elkabbany, M Rasslan - Cyber security and threats: Concepts …, 2018 - igi-global.com
Distributed computing systems allow homogenous/heterogeneous computers and
workstations to act as a computing environment. In this environment, users can uniformly …

Principles of Secure Access and Privacy in Combined E-Learning Environment: Architecture, Formalization, and Modelling

RP Romansky, IS Noninska - Multidisciplinary Perspectives on …, 2018 - igi-global.com
Globalization in the contemporary information society outlines new important challenges in
privacy and personal data protection that apply to user security in cyberspace. This is also …

Implementation of security mechanism in iiot systems

M Shin, J Woo, I Wane, S Kim, HS Yu - Proceedings of the Sixth …, 2019 - Springer
Abstract The Fourth Industrial Revolution is the paradigm that realizes high-quality intelligent
real-time services by combining super intelligent computing technologies associated with …

YAFA-SOA: A GA-based optimizer for optimizing security and cost in service compositions

W Radwan, Y Hassouneh, AS Sayyad… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
This paper studies heuristic search-based optimization of service compositions. We have
investigated applying Genetic Algorithms (GA) to optimize service-oriented architectures …

A multi-layered cloud protection framework

S Khan, S Parkinson, A Crampton - Companion Proceedings of the10th …, 2017 - dl.acm.org
Cloud computing has many commercial advantages; however, companies tend to avoid
trusting cloud service providers (CSPs) with their sensitive data because of the associated …

APPLICABILITY OF CLOUD SECURITY FRAMEWORKS AND MODELS IN THE KENYAN-BANKING SECTOR: A REVIEW

G Ouma, M Awuor, KP Wamuyu… - African Journal of …, 2024 - ajoeijournals.org
The years from 2007 has seen the Banking industry in Kenya has experience growth and
transformation when it comes to technology and this is mostly attributed to the integration of …

[PDF][PDF] Discrete formalization and investigation of secure access to corporative resources

R Romansky, I Noninska - International Journal of Engineering …, 2016 - researchgate.net
This article discusses organization of an extended sub-system for information security which
is accomplished with analysis of cloud computing and data centers used by business to …