Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review of data governance and cloud data governance
Data management solutions on their own are becoming very expensive and not able to cope
with the reality of everlasting data complexity. Businesses have grown more sophisticated in …
with the reality of everlasting data complexity. Businesses have grown more sophisticated in …
Cyber risk assessment in cloud provider environments: Current models and future needs
Traditional frameworks for risk assessment do not work well for cloud computing. While
recent work has often focussed on the risks faced by firms adopting or selecting cloud …
recent work has often focussed on the risks faced by firms adopting or selecting cloud …
Security and privacy of sensitive data in cloud computing: a survey of recent developments
Cloud computing is revolutionizing many ecosystems by providing organizations with
computing resources featuring easy deployment, connectivity, configuration, automation and …
computing resources featuring easy deployment, connectivity, configuration, automation and …
A-PPL: an accountability policy language
Cloud Computing raises various security and privacy challenges due to the customers'
inherent lack of control over their outsourced data. One approach to encourage customers to …
inherent lack of control over their outsourced data. One approach to encourage customers to …
Efficient data transfer protocols for big data
Data set sizes are growing exponentially, so it is important to use data movement protocols
that are the most efficient available. Most data movement tools today rely on TCP over …
that are the most efficient available. Most data movement tools today rely on TCP over …
Immune system for the internet of things using edge technologies
The Internet of Things (IoT) and edge computing are starting to go hand in hand. By
providing cloud services close to end-users, edge paradigms enhance the functionality of …
providing cloud services close to end-users, edge paradigms enhance the functionality of …
Modelling trust and risk for cloud services
A joint trust and risk model is introduced for federated cloud services. The model is based on
cloud service providers' performance history. It addresses provider and consumer concerns …
cloud service providers' performance history. It addresses provider and consumer concerns …
Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption
H Cheng, C Rong, M Qian, W Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Considering the openness and cross-domains of cloud computing, the traditional privacy-
preserving technology cannot be applied in cloud computing efficiently. In this paper …
preserving technology cannot be applied in cloud computing efficiently. In this paper …
Enhancing accountability in the cloud
This article focuses on the role of accountability within information management, particularly
in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must …
in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must …
How can cloud users be supported in deciding on, tracking and controlling how their data are used?
Transparency is a basic privacy principle and factor of social trust. However, the processing
of personal data along a cloud chain is often rather intransparent to the data subjects …
of personal data along a cloud chain is often rather intransparent to the data subjects …