GRC strategies in modern cloud infrastructures: a review of compliance challenges

AJ Apeh, AO Hassan, OO Oyewole… - Computer Science & IT …, 2023 - fepbl.com
This research paper delves into the intricate landscape of Governance, Risk, and
Compliance (GRC) in modern cloud infrastructures. As organisations increasingly migrate …

Privacy preservation in e-healthcare environments: State of the art and future directions

MA Sahi, H Abbas, K Saleem, X Yang, A Derhab… - Ieee …, 2017 - ieeexplore.ieee.org
e-Healthcare promises to be the next big wave in healthcare. It offers all the advantages and
benefits imaginable by both the patient and the user. However, current e-Healthcare …

Identity and access management system: a web-based approach for an enterprise

KH Mohammed, A Hassan, D Yusuf Mohammed - 2018 - oer.udusok.edu.ng
Managing digital identities and access control for enterprise users and applications remains
one of the greatest challenges facing computing today. An attempt to address this issue led …

A survey on touch dynamics authentication in mobile devices

PS Teh, N Zhang, ABJ Teoh, K Chen - Computers & Security, 2016 - Elsevier
There have been research activities in the area of keystroke dynamics biometrics on
physical keyboards (desktop computers or conventional mobile phones) undertaken in the …

Challenges of connecting edge and cloud computing: A security and forensic perspective

C Esposito, A Castiglione, F Pop… - IEEE Cloud …, 2017 - ieeexplore.ieee.org
A key benefit of connecting edge and cloud computing is the capability to achieve high-
throughput under high concurrent accesses, mobility support, real-time processing …

[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

Security and privacy in big data life cycle: a survey and open challenges

J Koo, G Kang, YG Kim - Sustainability, 2020 - mdpi.com
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …

A task scheduling algorithm considering game theory designed for energy management in cloud computing

J Yang, B Jiang, Z Lv, KKR Choo - Future Generation computer systems, 2020 - Elsevier
With the increasing popularity of cloud computing products, task scheduling problem has
become a hot research topic in this field. The task scheduling problem of cloud computing …

Blockchain access control ecosystem for big data security

UU Uchibeke, KA Schneider… - … on Internet of Things …, 2018 - ieeexplore.ieee.org
In recent years, the advancement in modern technologies has not only resulted in an
explosion of huge data sets being captured and recorded in different fields, but also given …

A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll …

M Chiregi, NJ Navimipour - Computers in Human Behavior, 2016 - Elsevier
Trust in the cloud environment is not written into an agreement and is something earned. In
any trust evaluation mechanism, opinion leaders are the entities influencing the behaviors or …