Cloud Security Using Fine-Grained Efficient Information Flow Tracking
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
Effective task scheduling in critical fog applications
Information and technology have witnessed significant improvement with the introduction of
Internet of things (IoT) applications, and most of the IoT applications are dependent on the …
Internet of things (IoT) applications, and most of the IoT applications are dependent on the …
Performance based Risk driven Trust (PRTrust): On modeling of secured service sharing in peer-to-peer federated cloud
R Kumar, R Goyal - Computer Communications, 2022 - Elsevier
Abstract Peer-to-peer (P2P) federated cloud system has emerged as a promising service
delivery model wherein multiple cloud service providers (CSPs) collaborate and share …
delivery model wherein multiple cloud service providers (CSPs) collaborate and share …
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
Due to the high adoption of cloud services, the protection of data and information is critical.
Cloud service customers (CSCs) need help to obtain the authoritative assurances required …
Cloud service customers (CSCs) need help to obtain the authoritative assurances required …
Effective Task Scheduling in Critical Fog Applications Using Critical Task Indexing Scheduler (CTIS)
To decrease time delay, energy consumption, and network utilization in the Internet of
Things (IoT) is a key research area. The rapid advancement in IoT, leading to increase in …
Things (IoT) is a key research area. The rapid advancement in IoT, leading to increase in …
[HTML][HTML] icontainer: Consecutive checkpointing with rapid resilience for immortal container-based services
Container-based cloud services that can achieve scalability at a low cost by dividing a
complex system into instances, functions, or applications are essential for the operation of …
complex system into instances, functions, or applications are essential for the operation of …
Dynamic security in cloud computing based on fuzzy cognitive maps
M Asma - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
Cloud Computing is a new paradigm that provides software and hardware resources based
on customers' needs. However, data security remains a significant concern, acting as a …
on customers' needs. However, data security remains a significant concern, acting as a …
Insufficient Due Diligence: Knowledge-Related Threats in Cloud Computing
It is well known that the human factor still plays a significant role in security incidents as
malicious actors exploit vulnerabilities in the human dimension of the attack surface to …
malicious actors exploit vulnerabilities in the human dimension of the attack surface to …
Dynamic and Integrated Security Model in Inter Cloud for Image Classification
AM Shah, I Abid - … University Journal of Engineering and Applied …, 2024 - fujeas.fui.edu.pk
Cloud computing has transformed software and database accessibility, utilizing the Internet
and server hosting. However, security risks arise, including malware attacks and website …
and server hosting. However, security risks arise, including malware attacks and website …
[IDÉZET][C] Πόσο ασφαλές είναι το Υπολογιστικό Νέφος
Δ Γιαγτζή, Π Λιαρομάτης - 2023