Academic literature on the topic 'Cloud security models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud security models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud security models"

1

Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.

Full text
Abstract:
Kubernetes enables organizations to manage applications globally, from multi-cloud to hybrid clouds. This paper presents challenges and solutions for workload orchestration, scaling, and security in such infrastructures. Running workloads across different cloud providers enables one to escape vendor lock-in and improve service availability. However, it leads to more complexity in terms of management and security. This paper will analyze the tendency of Kubernetes to orchestrate across multiple clouds in which it operates in a Multi-Cloud environment. It covers important solutions for scaling &
APA, Harvard, Vancouver, ISO, and other styles
2

Yashasvi, Sharma, and Sharma Yashraj. "SECURITY ISSUES AND ENVIRONMENTS IN CLOUD COMPUTING." International Journal of Research - Granthaalayah 7, no. 7 (2019): 398–404. https://doi.org/10.5281/zenodo.3365361.

Full text
Abstract:
This paper will explore the service models and background and also presents the existing research issues implicating in cloud computing such as security, privacy, reliability, and so on. Cloud Computing, Architecture and Characteristics of Cloud Computing and also different Services and Deployment models provided in Cloud Computing. This paper provides a better understanding of the cloud computing and identifies important research issues in this rapidly growing area of computer science.
APA, Harvard, Vancouver, ISO, and other styles
3

Dhruvitkumar V Talati. "Enhancing Multi-Cloud Security with Quantum-Resilient AI for Anomaly Detection." World Journal of Advanced Research and Reviews 13, no. 3 (2022): 629–38. https://doi.org/10.30574/wjarr.2022.13.3.0250.

Full text
Abstract:
With more and more companies moving to cloud platforms, adequate cloud security is the topmost priority for organizations today. Conventional security tools never identify sophisticated cyber-attacks, and thus AI-based real-time anomaly detection is the need of the hour. This research investigates the application of cutting-edge machine learning, deep learning, and security analytics in identifying and handling security anomalies from cloud logs. Our methodology utilizes hybrid AI models, federated learning, and graph neural networks to provide more accurate detection without breaching data pr
APA, Harvard, Vancouver, ISO, and other styles
4

Tabbassum, Ayisha, and Shaik Abdul Kareem. "Implementing Zero Trust Security Models in Cloud Infrastructures." International Journal of Science and Research (IJSR) 10, no. 11 (2021): 1582–86. http://dx.doi.org/10.21275/sr211110212612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rajashekar, Reddy Yasani, and Venkatesh Ratnam Karthik. "Automating Cloud Security and Compliance at Scale Strategies and Best Practices." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 77–82. https://doi.org/10.5281/zenodo.13912688.

Full text
Abstract:
Many rules, guidelines, and software controls have been developed by various agencies and standards bodies throughout the world to address data protection concerns, and they are all meant to be applied to data stored in the Cloud. Compliance obligations have so increased for service providers who store private information about their end users. It takes a lot of human work to follow these rules because they aren't in a machine-processable format. Providers often have to put in extra work to meet all of the regulations because numerous laws have similar requirements but don't mention each other
APA, Harvard, Vancouver, ISO, and other styles
6

El-Kafrawy, Passent M., Azza A. Abdo, and Amr F. Shawish. "Security Issues Over Some Cloud Models." Procedia Computer Science 65 (2015): 853–58. http://dx.doi.org/10.1016/j.procs.2015.09.041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kapil, Singh, Verma Sanjay, Sharib Md, Soni Nitasha, and Kumar Krishan. "Security Threats to Cloud Services." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 40–43. https://doi.org/10.35940/ijeat.E9214.069520.

Full text
Abstract:
This research paper looks into the world of how-to of cloud services and the ways through which it is threatened by various elements that regularly disrupt the functioning of these services. We will see how different models are being implemented across different fields. These various models are adopted by different users and organizations according to their needs. As there is almost no service with its specific problems, we delve into the discussion about various threats that loom over this expanded service step by step. These problems may be related to networking or authentication problems or
APA, Harvard, Vancouver, ISO, and other styles
8

Carlin, Sean, and Kevin Curran. "Cloud Computing Security." International Journal of Ambient Computing and Intelligence 3, no. 1 (2011): 14–19. http://dx.doi.org/10.4018/jaci.2011010102.

Full text
Abstract:
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently present within the cloud computing industry.
APA, Harvard, Vancouver, ISO, and other styles
9

Sunday Adeola Oladosu, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Adeoye Idowu Afolabi, Adebimpe Bolatito Ige, and Olukunle Oladipupo Amoo. "Advancing cloud networking security models: Conceptualizing a unified framework for hybrid cloud and on-premise integrations." Magna Scientia Advanced Research and Reviews 3, no. 1 (2021): 079–90. https://doi.org/10.30574/msarr.2021.3.1.0076.

Full text
Abstract:
As organizations increasingly adopt hybrid cloud environments, the complexity of managing and securing these infrastructures has grown. Hybrid cloud and on-premise integrations present unique challenges in terms of data security, access control, and compliance, requiring a more advanced and unified approach to cloud networking security. This review conceptualizes a unified security framework aimed at addressing the specific security needs of hybrid cloud and on-premise integrations. The framework is designed to balance the flexibility and scalability of cloud environments with the robustness o
APA, Harvard, Vancouver, ISO, and other styles
10

Neerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.

Full text
Abstract:
Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud security models"

1

Akinbi, Olushola Alexander. "An adaptive security framework for evaluating and assessing security implementations in PaaS cloud models." Thesis, Edge Hill University, 2015. http://repository.edgehill.ac.uk/7762/.

Full text
Abstract:
The security risks of cloud computing and ambiguity of security mechanisms implemented on an ondemand cloud service such as Platform-as-a-Service (PaaS), continues to raise concerns by cloud consumers. These concerns continue to hinder the adoption of the potentials offered by provisioning of computer resources of this scale. It also indicates a lot needs to be done to improve security controls implemented on cloud computing services as a whole. There is the need to understand and evaluate security mechanisms and controls implemented to preserve the confidentiality, integrity and availability
APA, Harvard, Vancouver, ISO, and other styles
2

Krotsiani, M. "Model driven certification of Cloud service security based on continuous monitoring." Thesis, City University London, 2016. http://openaccess.city.ac.uk/15044/.

Full text
Abstract:
Cloud Computing technology offers an advanced approach for the provision of infrastructure, platform and software services without the need of extensive cost of owning, operating or maintaining the computational infrastructures required. However, despite being cost effective, this technology has raised concerns regarding the security, privacy and compliance of data or services offered through cloud systems. This is mainly due to the lack of transparency of services to the consumers, or due to the fact that service providers are unwilling to take full responsibility for the security of services
APA, Harvard, Vancouver, ISO, and other styles
3

Harmon, Eric. "Strategies Used by Cloud Security Managers to Implement Secure Access Methods." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4728.

Full text
Abstract:
Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods
APA, Harvard, Vancouver, ISO, and other styles
4

Alassafi, Madini Obad. "A security model for cloud computing adoption in Saudi Arabian government organisations." Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/418978/.

Full text
Abstract:
Cloud computing plays an essential role in public organisations and private sector companies, while also reducing the cost of using information technology services. Not only is cloud computing available for users to access anytime and anywhere, but also makes it possible for them to pay for only what they use. In Middle Eastern developing countries, such as Saudi Arabia, cloud computing is still not extensively adopted compared with countries in the West. In order to encourage the adoption of cloud services, this research addresses the essential to investigate the security factors which are as
APA, Harvard, Vancouver, ISO, and other styles
5

Alkhwaldi, Albeeer F. A. H. "Jordanian Citizen-Centric Cloud Services Acceptance Model in an e-Government Context: Security Antecedents for Using Cloud Services." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Amri, Shadha M. S. "IaaS-cloud security enhancement : an intelligent attribute-based access control model and implementation." Thesis, Loughborough University, 2017. https://dspace.lboro.ac.uk/2134/27547.

Full text
Abstract:
The cloud computing paradigm introduces an efficient utilisation of huge computing resources by multiple users with minimal expense and deployment effort compared to traditional computing facilities. Although cloud computing has incredible benefits, some governments and enterprises remain hesitant to transfer their computing technology to the cloud as a consequence of the associated security challenges. Security is, therefore, a significant factor in cloud computing adoption. Cloud services consist of three layers: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure
APA, Harvard, Vancouver, ISO, and other styles
7

GAUDENZI, FILIPPO. "A FRAMEWORK FOR CLOUD ASSURANCE AND TRANSPARENCY BASED ON CONTINUOUS EVIDENCE COLLECTION." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/615644.

Full text
Abstract:
The cloud computing paradigm is changing the design, development, deployment, and provisioning of services and corresponding IT infrastructures. Nowadays, users and companies incrementally rely on on-demand cloud resources to access and deliver services, while IT infrastructures are continuously evolving to address cloud needs and support cloud service delivery. This scenario points to a multi-tenant environment where services are built with strong security and scalability requirements, and cost, performance, security and privacy are key factors enabling cloud adoption. New business opportun
APA, Harvard, Vancouver, ISO, and other styles
8

MATOS, Pablo Luís Castro de. "UM FRAMEWORK DE SEGURANÇA BASEADO EM ENGENHARIA DIRIGIDA POR MODELOS PARA PLATAFORMAS DE COMPUTAÇÃO EM NUVEM: Uma Abordagem para Modelos SaaS." Universidade Federal do Maranhão, 2015. http://tedebc.ufma.br:8080/jspui/handle/tede/1862.

Full text
Abstract:
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-24T11:52:22Z No. of bitstreams: 1 Pablo.pdf: 5598718 bytes, checksum: cce40776950abfd027f223d50cfca06c (MD5)<br>Made available in DSpace on 2017-08-24T11:52:22Z (GMT). No. of bitstreams: 1 Pablo.pdf: 5598718 bytes, checksum: cce40776950abfd027f223d50cfca06c (MD5) Previous issue date: 2015-08-31<br>CAPES,CNPQ,FAPEMA<br>The development and use of software based on cloud computing have been highlighted more and more nowadays. Software as a Service (SaaS) has been considered as a trend for small, medium and large companies, subtly acqui
APA, Harvard, Vancouver, ISO, and other styles
9

TaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.

Full text
Abstract:
Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source c
APA, Harvard, Vancouver, ISO, and other styles
10

Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.

Full text
Abstract:
Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud service users (CSUs) and cloud service providers (CSPs) are arising therefrom. User behavior trust (UB
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cloud security models"

1

United States. Congress. House. Committee on Government Reform. Subcommittee on National Security, Emerging Threats, and International Relations. Following toxic clouds: Science and assumptions in plume modeling : hearing before the Subcommittee on National Security, Emerging Threats and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, June 2, 2003. U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qiu, Meikang, and Keke Gai. Mobile Cloud Computing: Models, Implementation, and Security. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jamsa, Kris. Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More. Jones & Bartlett Learning, LLC, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

GOYAL, Anmol. Cloud Computing : a Step-By-step Approach While Learning Cloud Computing Concepts: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smelyansky, R. L., ред. «Modern Network Technologies — 2024» (MoNeTeС): The Fifth International Science and Technology Conference: Proceedings. Moscow University Press, 2024. https://doi.org/10.55959/msu012160-5-2024.

Full text
Abstract:
The Fifth International Science and Technology Conference «Modern Network Technologies (MoNeTec-2024)» was devoted to the number of hot topics of contemporary network technologies and their applications: AI application for resource management and control, 5G/6G networks for wireless communication, information security in SDN/ Cloud, QoS control in data communication, problems of heterogeneous traffic modelling and analysis. This volume of Proceedings contains papers presented on the «Heterogeneous Traffic Modelling and Analysis» session and on the Poster session.
APA, Harvard, Vancouver, ISO, and other styles
9

US GOVERNMENT. Following Toxic Clouds: Science and Assumptions in Plume Modeling: Hearing Before the Subcommittee on National Security, Emerging Threats and. Government Printing Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretic
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cloud security models"

1

Li, Zhao, Jun Wu, Shuangmei Peng, et al. "MFI-5 Based Similarity Measurement of Business Process Models." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patni, Sakshi, Deepika Saxena, and Ashutosh Kumar Singh. "Data Security and Leakage Detection Models." In Resource Management in Cloud Computing. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83053-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Maolin, Chengyue Yu, Hefei Ling, and Jie Lei. "Hierarchical Joint CNN-Based Models for Fine-Grained Cars Recognition." In Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rohini, Temkar. "Comparative Approach to Cloud Security Models." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18440-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bian, Rongzhen, Mingfu Xue, and Jian Wang. "A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Xiaoliang, Wujie Hu, and Gonglin Yuan. "A Modified Wei-Yao-Liu Conjugate Gradient Algorithm for Two Type Minimization Optimization Models." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Herre, Thorsten. "Designing Cloud Security and Operations Models in the Changed Geopolitical Environment." In Security in the Private Cloud. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372211-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bendicho, Carlos. "Cyber Security in Cloud: Risk Assessment Models." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80119-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Venkatesh, K., R. Velvizhi, K. Selva Banu Priya, and N. Sivaranjani. "Deep Dive on Popular Security Models and Strategies of Cloud Computing." In Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Umesh Kumar, and Abhishek Sharma. "Cloud Computing Security Framework Based on Shared Responsibility Models." In Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0. CRC Press, 2021. http://dx.doi.org/10.1201/9781003146711-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud security models"

1

Nassan, Wafaa Al, and Talal Bonny. "AI-Based Voice Security: Chaos-Based Encryption with ANN Models." In 2024 IEEE/ACM 17th International Conference on Utility and Cloud Computing (UCC). IEEE, 2024. https://doi.org/10.1109/ucc63386.2024.00035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gundale, Manjusha, and Anju Mishra. "Expression of Concern for: Security Models of cloud computing using Machine Learning & Network Security Application." In 2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES). IEEE, 2023. http://dx.doi.org/10.1109/cises58720.2023.10703696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jing, Wangyuan, Chi Zhang, Bingbing Zhang, and Lingbo Wei. "CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mogal, Amit Karbhari, V. Anitha, Preeti Nitin Bhatt, Kriti Srivasatava, S. Rukmani Devi, and Anvesh Perada. "Optimizing Cloud Security with CNN and XGBoost Models for Intrusion Detection Systems." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Poddar, Sanjay, Swagata Aswani, Ram Chandra Sachan, Venkata Nedunoori, and Udit Patel. "Enhancing Cloud Network Security With Hybrid Cnn-Lstm Models for Intrusion Detection." In 2024 IEEE 11th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2024. https://doi.org/10.1109/upcon62832.2024.10983857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Inoshita, Keito, and Xiaokang Zhou. "Sentiment Bias and Security Analysis in Training Datasets of Large Language Models." In 2024 IEEE International Conference on Big Data and Cloud Computing (BDCloud). IEEE, 2024. https://doi.org/10.1109/bdcloud63169.2024.00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Peiqi, Jianguo Chen, Yuting Fan, BoDong Wang, Weijian You, and Changlin Yang. "Enhancing Privacy and Security in Federated Learning Through Blockchain-based Decentralized Trust Models." In 2025 International Conference on Sensor-Cloud and Edge Computing System (SCECS). IEEE, 2025. https://doi.org/10.1109/scecs65243.2025.11065885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karmarkar, Hrishikesh, Vaibhavi Joshi, and R. Venkatesh. "Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Haritha, Koya, Sai Srinivas Vellela, Roja D, Lakshma Reddy Vuyyuru, Nallapu Malathi, and Lavanya Dalavai. "Distributed Blockchain-SDN Models for Robust Data Security in Cloud-Integrated IoT Networks." In 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS). IEEE, 2024. https://doi.org/10.1109/icacrs62842.2024.10841584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Akiri, Charan Kumar, Kathiresan Jayabalan, Joel Lopes, Shaik Abdul Kareem, and Ayisha Tabbassum. "Generative AI for Real-Time Cloud Security: Advanced Anomaly Detection Using GPT Models." In 2025 IEEE Conference on Computer Applications (ICCA). IEEE, 2025. https://doi.org/10.1109/icca65395.2025.11011269.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud security models"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
2

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditio
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Samir. Redefining Space Commerce: The Move Toward Servitization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024002.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;“New Space" is reshaping the economic landscape of the space industry and has far-reaching implications for technological innovation, business models, and market dynamics. This change, aligned with the digitalization in the world economy, has given rise to innovations in the downstream space segment. This “servitization” of the space industry, essentially, has led to the transition from selling products like satellites or spacecraft, to selling the services these products provide. This also connects to applications of va
APA, Harvard, Vancouver, ISO, and other styles
4

Strutynska, Oksana V., Grygoriy M. Torbin, Mariia A. Umryk, and Roman M. Vernydub. Digitalization of the educational process for the training of the pre-service teachers. [б. в.], 2021. http://dx.doi.org/10.31812/123456789/4437.

Full text
Abstract:
According to the Development Concept of the Digital Economy and Society in Ukraine, the priority of this area is to develop a substantial national policy on digitalization of education, as this is the key part of the education reform in Ukraine. For this reason, universities should firstly take into account the particularities of teaching the current generation of students and the needs of the digital society as a whole. This paper considers the process of transition from informatization to digitalization in society, implementation of digital support for the educational process in the universi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!