Academic literature on the topic 'Cloud security models'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud security models.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud security models"
Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.
Full textYashasvi, Sharma, and Sharma Yashraj. "SECURITY ISSUES AND ENVIRONMENTS IN CLOUD COMPUTING." International Journal of Research - Granthaalayah 7, no. 7 (2019): 398–404. https://doi.org/10.5281/zenodo.3365361.
Full textDhruvitkumar V Talati. "Enhancing Multi-Cloud Security with Quantum-Resilient AI for Anomaly Detection." World Journal of Advanced Research and Reviews 13, no. 3 (2022): 629–38. https://doi.org/10.30574/wjarr.2022.13.3.0250.
Full textTabbassum, Ayisha, and Shaik Abdul Kareem. "Implementing Zero Trust Security Models in Cloud Infrastructures." International Journal of Science and Research (IJSR) 10, no. 11 (2021): 1582–86. http://dx.doi.org/10.21275/sr211110212612.
Full textRajashekar, Reddy Yasani, and Venkatesh Ratnam Karthik. "Automating Cloud Security and Compliance at Scale Strategies and Best Practices." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 77–82. https://doi.org/10.5281/zenodo.13912688.
Full textEl-Kafrawy, Passent M., Azza A. Abdo, and Amr F. Shawish. "Security Issues Over Some Cloud Models." Procedia Computer Science 65 (2015): 853–58. http://dx.doi.org/10.1016/j.procs.2015.09.041.
Full textKapil, Singh, Verma Sanjay, Sharib Md, Soni Nitasha, and Kumar Krishan. "Security Threats to Cloud Services." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 40–43. https://doi.org/10.35940/ijeat.E9214.069520.
Full textCarlin, Sean, and Kevin Curran. "Cloud Computing Security." International Journal of Ambient Computing and Intelligence 3, no. 1 (2011): 14–19. http://dx.doi.org/10.4018/jaci.2011010102.
Full textSunday Adeola Oladosu, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Adeoye Idowu Afolabi, Adebimpe Bolatito Ige, and Olukunle Oladipupo Amoo. "Advancing cloud networking security models: Conceptualizing a unified framework for hybrid cloud and on-premise integrations." Magna Scientia Advanced Research and Reviews 3, no. 1 (2021): 079–90. https://doi.org/10.30574/msarr.2021.3.1.0076.
Full textNeerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.
Full textDissertations / Theses on the topic "Cloud security models"
Akinbi, Olushola Alexander. "An adaptive security framework for evaluating and assessing security implementations in PaaS cloud models." Thesis, Edge Hill University, 2015. http://repository.edgehill.ac.uk/7762/.
Full textKrotsiani, M. "Model driven certification of Cloud service security based on continuous monitoring." Thesis, City University London, 2016. http://openaccess.city.ac.uk/15044/.
Full textHarmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.
Full textAlassafi, Madini Obad. "A security model for cloud computing adoption in Saudi Arabian government organisations." Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/418978/.
Full textAlkhwaldi, Albeeer F. A. H. "Jordanian Citizen-Centric Cloud Services Acceptance Model in an e-Government Context: Security Antecedents for Using Cloud Services." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18241.
Full textAl-Amri, Shadha M. S. "IaaS-cloud security enhancement : an intelligent attribute-based access control model and implementation." Thesis, Loughborough University, 2017. https://dspace.lboro.ac.uk/2134/27547.
Full textGAUDENZI, FILIPPO. "A FRAMEWORK FOR CLOUD ASSURANCE AND TRANSPARENCY BASED ON CONTINUOUS EVIDENCE COLLECTION." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/615644.
Full textMATOS, Pablo Luís Castro de. "UM FRAMEWORK DE SEGURANÇA BASEADO EM ENGENHARIA DIRIGIDA POR MODELOS PARA PLATAFORMAS DE COMPUTAÇÃO EM NUVEM: Uma Abordagem para Modelos SaaS." Universidade Federal do Maranhão, 2015. http://tedebc.ufma.br:8080/jspui/handle/tede/1862.
Full textTaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.
Full textJiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.
Full textBooks on the topic "Cloud security models"
United States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Following toxic clouds: Science and assumptions in plume modeling : hearing before the Subcommittee on National Security, Emerging Threats and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, June 2, 2003. U.S. G.P.O., 2004.
Find full textQiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.
Find full textQiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.
Find full textQiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.
Find full textQiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.
Find full textJamsa, Kris. Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More. Jones & Bartlett Learning, LLC, 2012.
Find full textGOYAL, Anmol. Cloud Computing : a Step-By-step Approach While Learning Cloud Computing Concepts: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More. Independently Published, 2017.
Find full textSmelyansky, R. L., ред. «Modern Network Technologies — 2024» (MoNeTeС): The Fifth International Science and Technology Conference: Proceedings. Moscow University Press, 2024. https://doi.org/10.55959/msu012160-5-2024.
Full textUS GOVERNMENT. Following Toxic Clouds: Science and Assumptions in Plume Modeling: Hearing Before the Subcommittee on National Security, Emerging Threats and. Government Printing Office, 2004.
Find full textHilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textBook chapters on the topic "Cloud security models"
Li, Zhao, Jun Wu, Shuangmei Peng, et al. "MFI-5 Based Similarity Measurement of Business Process Models." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_59.
Full textPatni, Sakshi, Deepika Saxena, and Ashutosh Kumar Singh. "Data Security and Leakage Detection Models." In Resource Management in Cloud Computing. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83053-2_8.
Full textLiu, Maolin, Chengyue Yu, Hefei Ling, and Jie Lei. "Hierarchical Joint CNN-Based Models for Fine-Grained Cars Recognition." In Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1_30.
Full textRohini, Temkar. "Comparative Approach to Cloud Security Models." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18440-6_21.
Full textBian, Rongzhen, Mingfu Xue, and Jian Wang. "A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_55.
Full textWang, Xiaoliang, Wujie Hu, and Gonglin Yuan. "A Modified Wei-Yao-Liu Conjugate Gradient Algorithm for Two Type Minimization Optimization Models." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_13.
Full textHerre, Thorsten. "Designing Cloud Security and Operations Models in the Changed Geopolitical Environment." In Security in the Private Cloud. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372211-15.
Full textBendicho, Carlos. "Cyber Security in Cloud: Risk Assessment Models." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80119-9_28.
Full textVenkatesh, K., R. Velvizhi, K. Selva Banu Priya, and N. Sivaranjani. "Deep Dive on Popular Security Models and Strategies of Cloud Computing." In Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-8.
Full textSingh, Umesh Kumar, and Abhishek Sharma. "Cloud Computing Security Framework Based on Shared Responsibility Models." In Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0. CRC Press, 2021. http://dx.doi.org/10.1201/9781003146711-3.
Full textConference papers on the topic "Cloud security models"
Nassan, Wafaa Al, and Talal Bonny. "AI-Based Voice Security: Chaos-Based Encryption with ANN Models." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00035.
Full textGundale, Manjusha, and Anju Mishra. "Expression of Concern for: Security Models of cloud computing using Machine Learning & Network Security Application." In 2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES). IEEE, 2023. http://dx.doi.org/10.1109/cises58720.2023.10703696.
Full textJing, Wangyuan, Chi Zhang, Bingbing Zhang, and Lingbo Wei. "CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00283.
Full textMogal, Amit Karbhari, V. Anitha, Preeti Nitin Bhatt, Kriti Srivasatava, S. Rukmani Devi, and Anvesh Perada. "Optimizing Cloud Security with CNN and XGBoost Models for Intrusion Detection Systems." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968768.
Full textPoddar, Sanjay, Swagata Aswani, Ram Chandra Sachan, Venkata Nedunoori, and Udit Patel. "Enhancing Cloud Network Security With Hybrid Cnn-Lstm Models for Intrusion Detection." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983857.
Full textInoshita, Keito, and Xiaokang Zhou. "Sentiment Bias and Security Analysis in Training Datasets of Large Language Models." In 2024 IEEE International Conference on Big Data and Cloud Computing (BDCloud). IEEE, 2024. https://doi.org/10.1109/bdcloud63169.2024.00008.
Full textLi, Peiqi, Jianguo Chen, Yuting Fan, BoDong Wang, Weijian You, and Changlin Yang. "Enhancing Privacy and Security in Federated Learning Through Blockchain-based Decentralized Trust Models." In 2025 International Conference on Sensor-Cloud and Edge Computing System (SCECS). IEEE, 2025. https://doi.org/10.1109/scecs65243.2025.11065885.
Full textKarmarkar, Hrishikesh, Vaibhavi Joshi, and R. Venkatesh. "Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679435.
Full textHaritha, Koya, Sai Srinivas Vellela, Roja D, Lakshma Reddy Vuyyuru, Nallapu Malathi, and Lavanya Dalavai. "Distributed Blockchain-SDN Models for Robust Data Security in Cloud-Integrated IoT Networks." In 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS). IEEE, 2024. https://doi.org/10.1109/icacrs62842.2024.10841584.
Full textAkiri, Charan Kumar, Kathiresan Jayabalan, Joel Lopes, Shaik Abdul Kareem, and Ayisha Tabbassum. "Generative AI for Real-Time Cloud Security: Advanced Anomaly Detection Using GPT Models." In 2025 IEEE Conference on Computer Applications (ICCA). IEEE, 2025. https://doi.org/10.1109/icca65395.2025.11011269.
Full textReports on the topic "Cloud security models"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.
Full textKhan, Samir. Redefining Space Commerce: The Move Toward Servitization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024002.
Full textStrutynska, Oksana V., Grygoriy M. Torbin, Mariia A. Umryk, and Roman M. Vernydub. Digitalization of the educational process for the training of the pre-service teachers. [б. в.], 2021. http://dx.doi.org/10.31812/123456789/4437.
Full text