GRC strategies in modern cloud infrastructures: a review of compliance challenges
This research paper delves into the intricate landscape of Governance, Risk, and
Compliance (GRC) in modern cloud infrastructures. As organisations increasingly migrate …
Compliance (GRC) in modern cloud infrastructures. As organisations increasingly migrate …
Privacy preservation in e-healthcare environments: State of the art and future directions
e-Healthcare promises to be the next big wave in healthcare. It offers all the advantages and
benefits imaginable by both the patient and the user. However, current e-Healthcare …
benefits imaginable by both the patient and the user. However, current e-Healthcare …
Identity and access management system: a web-based approach for an enterprise
KH Mohammed, A Hassan, D Yusuf Mohammed - 2018 - oer.udusok.edu.ng
Managing digital identities and access control for enterprise users and applications remains
one of the greatest challenges facing computing today. An attempt to address this issue led …
one of the greatest challenges facing computing today. An attempt to address this issue led …
A survey on touch dynamics authentication in mobile devices
There have been research activities in the area of keystroke dynamics biometrics on
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …
Challenges of connecting edge and cloud computing: A security and forensic perspective
A key benefit of connecting edge and cloud computing is the capability to achieve high-
throughput under high concurrent accesses, mobility support, real-time processing …
throughput under high concurrent accesses, mobility support, real-time processing …
[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …
active security techniques instead of traditional ones to secure the cloud environment based …
Security and privacy in big data life cycle: a survey and open challenges
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …
resources, and various data analysis technologies such as standardized data mining and …
A task scheduling algorithm considering game theory designed for energy management in cloud computing
With the increasing popularity of cloud computing products, task scheduling problem has
become a hot research topic in this field. The task scheduling problem of cloud computing …
become a hot research topic in this field. The task scheduling problem of cloud computing …
Blockchain access control ecosystem for big data security
In recent years, the advancement in modern technologies has not only resulted in an
explosion of huge data sets being captured and recorded in different fields, but also given …
explosion of huge data sets being captured and recorded in different fields, but also given …
A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll …
M Chiregi, NJ Navimipour - Computers in Human Behavior, 2016 - Elsevier
Trust in the cloud environment is not written into an agreement and is something earned. In
any trust evaluation mechanism, opinion leaders are the entities influencing the behaviors or …
any trust evaluation mechanism, opinion leaders are the entities influencing the behaviors or …