Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Cloud security issues and challenges: A survey
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …
amount of virtual storage. The main features of cloud computing is that the user does not …
Security in cloud computing: Opportunities and challenges
The cloud computing exhibits, remarkable potential to provide cost effective, easy to
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
manage, elastic, and powerful resources on the fly, over the Internet. The cloud computing …
5G networks: Types of isolation and their parameters in RAN and CN slices
In this paper, we present a systematic overview of existing isolation techniques in nodes and
networks, especially in the Radio Access Network and the Core Network (RAN and CN) to …
networks, especially in the Radio Access Network and the Core Network (RAN and CN) to …
Rust-Shyper: A reliable embedded hypervisor supporting VM migration and hypervisor live-update
C Mo, L Wang, S Li, K Hu, B Jiang - Journal of Systems Architecture, 2023 - Elsevier
Traditional embedded hypervisors usually focus on resource utilization and performance
while neglecting the reliability requirements. On the one hand, the reliability issues result …
while neglecting the reliability requirements. On the one hand, the reliability issues result …
Mycloud: supporting user-configured privacy protection in cloud computing
Privacy concern is still one of the major issues that prevent users from moving to public
clouds. The root cause of the privacy problem is that the cloud provider has more privileges …
clouds. The root cause of the privacy problem is that the cloud provider has more privileges …
An exhaustive survey on security concerns and solutions at different components of virtualization
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …
additional vulnerabilities that can be exploited to affect the availability, integrity, and …
An access control model for preventing virtual machine hop** attack
Y Dong, Z Lei - Future Internet, 2019 - mdpi.com
As a new type of service computing model, cloud computing provides various services
through the Internet. Virtual machine (VM) hop** is a security issue often encountered in …
through the Internet. Virtual machine (VM) hop** is a security issue often encountered in …
Cloudoscopy: Services discovery and topology map**
We define and study cloudoscopy, ie, exposing sensitive information about the location of
(victim) cloud services and/or about the internal organisation of the cloud network, in spite of …
(victim) cloud services and/or about the internal organisation of the cloud network, in spite of …
Locally-centralized certificate validation and its application in desktop virtualization systems
To validate a certificate, a user needs to install the certificate of the root certification authority
(CA) and download the certificate revocation information (CRI). Although operating systems …
(CA) and download the certificate revocation information (CRI). Although operating systems …