Academic literature on the topic 'Cloud Computing ; Cloud Security ; Cloud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud Computing ; Cloud Security ; Cloud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud Computing ; Cloud Security ; Cloud"
Mouli, K. Chandra, and U. Seshadri. "Singleto Multi Clouds for Security in Cloud Computing by using Secret Key Sharing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (2013): 1539–45. http://dx.doi.org/10.24297/ijct.v10i4.3254.
Full textWu, Ji Yi, Qian Li Shen, Jian Lin Zhang, and Qi Xie. "Cloud Computing: Cloud Security to Trusted Cloud." Advanced Materials Research 186 (January 2011): 596–600. http://dx.doi.org/10.4028/www.scientific.net/amr.186.596.
Full textMathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.
Full textChen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.
Full textHamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.
Full textAl-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.
Full textBeckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textShyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.
Full textD, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.
Full textDissertations / Theses on the topic "Cloud Computing ; Cloud Security ; Cloud"
Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Full textLounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.
Full textDoelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.
Full textWin, Thu Yein. "Virtualisation security in cloud computing." Thesis, Glasgow Caledonian University, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726791.
Full textBlakstad, Kåre Marius, and Mats Andreassen. "Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21041.
Full textCornejo-Ramirez, Mario. "Security for the cloud." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Full textLi, Min. "Privacy Protection on Cloud Computing." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.
Full textBrahim, Kamel. "Cloud Computing:Accountability." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3164/.
Full textAmbrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.
Full textInam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.
Full textBooks on the topic "Cloud Computing ; Cloud Security ; Cloud"
Vacca, John R., ed. Cloud Computing Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372112.
Full textSun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0.
Full textSun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00021-9.
Full textHuang, Zhiqiu, Xingming Sun, Junzhou Luo, and Jian Wang, eds. Cloud Computing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7.
Full textBook chapters on the topic "Cloud Computing ; Cloud Security ; Cloud"
Sehgal, Naresh Kumar, and Pramod Chandra P. Bhatt. "Cloud Computing and Information Security." In Cloud Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77839-6_7.
Full textSamarati, Pierangela, and Sabrina De Capitani di Vimercati. "Cloud Security." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch17.
Full textMorrow, Susan. "Data Security in the Cloud." In Cloud Computing. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9780470940105.ch23.
Full textLele, Ajey. "Cloud Computing." In Disruptive Technologies for the Militaries and Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.
Full textMartin, John Paul, Vipin Singh, K. Chandrasekaran, and A. Kandasamy. "Explicating Fog Computing Key Research Challenges and Solutions." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-4.
Full textSchiefer, Gunther, Andreas Oberweis, Murat Citak, and Andreas Schoknecht. "Security-by-Design in der Cloud-Anwendungsentwicklung." In Cloud Computing. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20967-4_12.
Full textZhang, Yushu, Yong Xiang, and Leo Yu Zhang. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2523-6_4.
Full textSrinivasan, S. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-7699-3_5.
Full textCampbell, Tony. "Cloud Computing Security." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_12.
Full textMassonet, Philippe, Syed Naqvi, Francesco Tusa, Massimo Villari, and Joseph Latanicki. "Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures." In Cloud Computing. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12636-9_5.
Full textConference papers on the topic "Cloud Computing ; Cloud Security ; Cloud"
Zhang Yandong and Zhang Yongsheng. "Cloud computing and cloud security challenges." In 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012). IEEE, 2012. http://dx.doi.org/10.1109/itime.2012.6291488.
Full textJia, Minrui. "Cloud Security of Cloud Computing Application." In 2011 International Conference on Control, Automation and Systems Engineering (CASE). IEEE, 2011. http://dx.doi.org/10.1109/iccase.2011.5997643.
Full textJensen, Meiko, Jorg Schwenk, Jens-Matthias Bohli, Nils Gruschka, and Luigi Lo Iacono. "Security Prospects through Cloud Computing by Adopting Multiple Clouds." In 2011 IEEE 4th International Conference on Cloud Computing (CLOUD). IEEE, 2011. http://dx.doi.org/10.1109/cloud.2011.85.
Full textBordak, Lukas. "Cloud Computing Security." In 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2019. http://dx.doi.org/10.1109/iceta48886.2019.9040043.
Full textAlZain, Mohammed A., Eric Pardede, Ben Soh, and James A. Thom. "Cloud Computing Security: From Single to Multi-clouds." In 2012 45th Hawaii International Conference on System Sciences (HICSS). IEEE, 2012. http://dx.doi.org/10.1109/hicss.2012.153.
Full textZhang, Shaohe, Cuenyun Jiang, and Ruxin Wang. "Cloud computing and cloud security in China." In ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II: Proceedings of the 2nd International Conference on Advances in Materials, Machinery, Electronics (AMME 2018). Author(s), 2018. http://dx.doi.org/10.1063/1.5033711.
Full text"Cloud computing." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249245.
Full textAlmorsy, Mohemed, John Grundy, and Amani S. Ibrahim. "Collaboration-Based Cloud Computing Security Management Framework." In 2011 IEEE 4th International Conference on Cloud Computing (CLOUD). IEEE, 2011. http://dx.doi.org/10.1109/cloud.2011.9.
Full textFrancia, Guillermo, Chia-Tien D. Lo, Kai Qian, Ming Yang, and Xiaolin Hu. "Learning Cloud Computing and Cloud Security By Simulation." In Power and Energy. ACTAPRESS, 2013. http://dx.doi.org/10.2316/p.2013.808-019.
Full textSui, Xin, and Yi Sui. "A Survey of Cloud Computing and Cloud Security." In Proceedings of the 2018 8th International Conference on Management, Education and Information (MEICI 2018). Atlantis Press, 2018. http://dx.doi.org/10.2991/meici-18.2018.55.
Full textReports on the topic "Cloud Computing ; Cloud Security ; Cloud"
Hamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada545053.
Full textMyers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053534.
Full textMyers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053535.
Full textJansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.
Full textAkyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1052949.
Full textTakai, Teresa M. Cloud Computing Strategy. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada563989.
Full textSeybold, Patricia. Cloud Computing in 2015. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/ta12-13-13cc.
Full textKim, Anya, and Ira S. Moskowitz. Incentivized Cloud Computing: A Principal Agent Solution to the Cloud Computing Dilemma. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada530441.
Full textHochstein, Lorin. High Performance Computing (HPC) Innovation Service Portal Pilots Cloud Computing (HPC-ISP Pilot Cloud Computing). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada549202.
Full textAmoroso, Edward. Cloud Security for Everyone. River Publishers, 2017. http://dx.doi.org/10.13052/popcas017.
Full text