Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …
supports demanded services. The architecture of cloud computing consists of different kinds …
Privacy protection and data security in cloud computing: a survey, challenges, and solutions
PJ Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Privacy and security are the most important issues to the popularity of cloud computing
service. In recent years, there are many research schemes of cloud computing privacy …
service. In recent years, there are many research schemes of cloud computing privacy …
Attribute-based access control for ICN naming scheme
Information Centric Networking (ICN) is a new network architecture that aims to overcome
the weakness of existing IPbased networking architecture. Instead of establishing a …
the weakness of existing IPbased networking architecture. Instead of establishing a …
TAFC: Time and attribute factors combined access control for time-sensitive data in public cloud
The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one
hand, it frees data owners from the technical management, and is easier for data owners to …
hand, it frees data owners from the technical management, and is easier for data owners to …
[PDF][PDF] Methodologies, requirements, and challenges of cybersecurity frameworks: A review
AD Khaleefah, HM Al-Mashhadi - Iraqi Journal of Science, 2024 - iasj.net
As a result of the emergence of new business paradigms and the development of the digital
economy, the interaction between operations, services, things, and software across …
economy, the interaction between operations, services, things, and software across …
Attribute-based approaches for secure data sharing in industrial contexts
The sharing of data is becoming increasingly important for the process and manufacturing
industries that are using data-driven models and advanced analysis to assess production …
industries that are using data-driven models and advanced analysis to assess production …
A comprehensive survey on Software as a Service (SaaS) transformation for the automotive systems
Over the last few decades, automotive embedded Information and Communication
Technology (ICT) systems have been used to enhance vehicle performance and enrich …
Technology (ICT) systems have been used to enhance vehicle performance and enrich …
Multimedia recommendation and transmission system based on cloud platform
This paper presents a movie recommendation system according to scores that the users
provide. In view of the movie evaluation system, the impacts of access control and …
provide. In view of the movie evaluation system, the impacts of access control and …
Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage
Under the assumption of honest-but-curious cloud service provider, various cryptographic
techniques have been used to address the issues of data access control and confidentiality …
techniques have been used to address the issues of data access control and confidentiality …