Journal articles on the topic 'Multi-Tenant Cloud Environments'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Multi-Tenant Cloud Environments.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ratnangi, Nirek. "Improving Data Privacy and Compliance in ERP Systems using Linux VMs in Multi-Tenant Cloud Environments." European Journal of Advances in Engineering and Technology 9, no. 7 (2022): 87–89. https://doi.org/10.5281/zenodo.13919438.
Full textSyed, Ashraf. "Performance Analysis of Oracle APEX Applications in Multi-Tenant Cloud Environments." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem03278.
Full textSaurabh Ashwinikumar Dave, Nanda Kishore Gannamneni, Bipin Gajbhiye, Raghav Agarwal, Shalu Jain, and Pandi Kirupa Gopalakrishna. "Designing Resilient Multi-Tenant Architectures in Cloud Environments." International Journal for Research Publication and Seminar 11, no. 4 (2020): 356–73. http://dx.doi.org/10.36676/jrps.v11.i4.1586.
Full textAnila, Gogineni. "Isolation Techniques for Preventing Cascading Failures in Multi-Tenant Multi-Cluster Environments." International Journal of Leading Research Publication 5, no. 4 (2024): 1–11. https://doi.org/10.5281/zenodo.14769609.
Full textDjamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8500.
Full textDjamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.
Full textReagan Panguraj, Antony Ronald. "Systematic Approach to Security Testing in Multi-Tenant Cloud Systems." International Journal of Multidisciplinary Research and Growth Evaluation. 6, no. 1 (2025): 2139–42. https://doi.org/10.54660/.ijmrge.2025.6.1.2139-2142.
Full textPasupuleti, Murali Krishna. "Secure Multi-Tenant Cloud Storage with Homomorphic Encryption." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 362–71. https://doi.org/10.62311/nesx/rphcrcscrcec5.
Full textMalikireddy, Sai Kiran Reddy. "Securing Multi-Tenant Cloud Environments with Graph-Based Models." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem16789.
Full textCharan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.
Full textRavikanth Reddy Gudipati. "Implementing a multi-tenant FIDO relying party server: Architecture, security, and scalability considerations." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 765–73. https://doi.org/10.30574/wjaets.2025.15.1.0304.
Full textRamanan Hariharan. "Zero Trust Security in Multi-Tenant Cloud Environments." Journal of Information Systems Engineering and Management 10, no. 45s (2025): 623–44. https://doi.org/10.52783/jisem.v10i45s.8899.
Full textRimal, Bhaskar Prasad, and Martin Maier. "Workflow Scheduling in Multi-Tenant Cloud Computing Environments." IEEE Transactions on Parallel and Distributed Systems 28, no. 1 (2017): 290–304. http://dx.doi.org/10.1109/tpds.2016.2556668.
Full textPasham, Sai Dikshit. "Graph-Based Models for Multi-Tenant Security in Cloud Computing." International Journal of Scientific Research and Management (IJSRM) 9, no. 08 (2021): 611–33. https://doi.org/10.18535/ijsrm/v9i08.ec02.
Full textYogeswara, Reddy Avuthu. "Policy-Driven Security in Multi-Tenant Cloud DevOps Platforms." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 1 (2020): 1–13. https://doi.org/10.5281/zenodo.14059441.
Full textSree Lakshmi Done and Dr. Siva Rama Krishna T. "A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 78–84. https://doi.org/10.46647/ijetms.2025.v09si01.012.
Full textSwati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.
Full textGannavarapu, Pramod. "Best Practices in Implementing Azure Entra Conditional Access for Multi-Tenant Environments." International journal of networks and security 05, no. 01 (2025): 118–46. https://doi.org/10.55640/ijns-05-01-08.
Full textKiran, Kumar Voruganti. "Federated Machine Learning for Collaborative DevOps in Multi-Tenant Cloud Environments." Journal of Scientific and Engineering Research 7, no. 10 (2020): 230–38. https://doi.org/10.5281/zenodo.12666973.
Full textRitesh Kumar, Ritesh Kumar. "Multi-Tenant SaaS Architectures: Design Principles and Security Considerations." Journal of Software Engineering and Simulation 6, no. 5 (2020): 28–41. https://doi.org/10.35629/3795-06052841.
Full textLokeshnath Kummara, Keerthi Reddy K, Ganesh D, Keerthana V, and Manideep Sai Y. "Secure Data Retrieval in Multi-Tenant Cloud Environment." international journal of engineering technology and management sciences 9, no. 2 (2025): 368–76. https://doi.org/10.46647/ijetms.2025.v09i02.045.
Full textProvelengios, George, Daniel Holcomb, and Russell Tessier. "Mitigating Voltage Attacks in Multi-Tenant FPGAs." ACM Transactions on Reconfigurable Technology and Systems 14, no. 2 (2021): 1–24. http://dx.doi.org/10.1145/3451236.
Full textSharma, Anshul. "Secure Efficiency: Navigating Performance Challenges in Multi-Tenant Cloud Security Implementations." International Journal for Research in Applied Science and Engineering Technology 12, no. 9 (2024): 1307–18. http://dx.doi.org/10.22214/ijraset.2024.64311.
Full textAnuj Harishkumar Chaudhari. "Multi-tenancy: Deep dive on how cloud platforms serve many users at once." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 394–403. https://doi.org/10.30574/wjarr.2025.26.2.1608.
Full textRishi Kumar Sharma. "Multi-Tenant Architectures in Modern Cloud Computing: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 307–17. https://doi.org/10.32628/cseit25111236.
Full textHashim, Wahidah, and Noor Al-Huda K. Hussein. "Securing Cloud Computing Environments: An Analysis of Multi-Tenancy Vulnerabilities and Countermeasures." SHIFRA 2024 (February 5, 2024): 9–17. http://dx.doi.org/10.70470/shifra/2024/002.
Full textResearcher. "INNOVATIVE MULTI-TENANT ARCHITECTURES FOR WEB SERVICES WITH EMPHASIS ON PRIVACY PRESERVATION AND DATA ISOLATION." International Journal of Web Services (IJWS) 1, no. 1 (2025): 1–7. https://doi.org/10.5281/zenodo.14716959.
Full textWu, Jing, Feng Zhi Zhao, and Yu Dan Dong. "Study on Cloud Data Destruction Mechanism and its Application." Applied Mechanics and Materials 477-478 (December 2013): 1487–90. http://dx.doi.org/10.4028/www.scientific.net/amm.477-478.1487.
Full textChen, Hai Yan. "Design and Implement of a Computer Forensics Model for Cloud Environments." Applied Mechanics and Materials 599-601 (August 2014): 1848–51. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1848.
Full textKwon, Seokmin, and Hyokyung Bahn. "Enhanced Scheduling of AI Applications in Multi-Tenant Cloud Using Genetic Optimizations." Applied Sciences 14, no. 11 (2024): 4697. http://dx.doi.org/10.3390/app14114697.
Full textRitesh Kumar, Ritesh Kumar. "Cloud Cybersecurity: Navigating Evolving Threats and Architecting Resilient Defenses." Journal of Software Engineering and Simulation 8, no. 8 (2022): 21–29. https://doi.org/10.35629/3795-08082129.
Full textResearcher. "OPTIMIZING MULTI-TENANT SD-WAN DEPLOYMENTS: AN INTEGRATED APPROACH TO SECURITY, PERFORMANCE, AND REGULATORY COMPLIANCE." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 1467–81. https://doi.org/10.5281/zenodo.14506771.
Full textSreenu, Maddipudi. "The Future of Data Separation in Cloud: Ensuring Compliance and Security in Critical Sectors." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 2 (2022): 1–6. https://doi.org/10.5281/zenodo.14540961.
Full textSerdіuk, Nataliіa, and Maksym Volgust. "EFFICIENT MANAGEMENT OF BIG DATA IN SMART MANUFACTURING THROUGH MULTI-TENANT CLOUD SYSTEMS." Problems of Modeling and Design Automatization 1, no. 21 (2025): 39–44. https://doi.org/10.31474/2074-7888-2025-1-21-39-44.
Full textAl-Jody, Taha, Hamza Aagela, and Violeta Holmes. "Inspiring the Next Generation of HPC Engineers with Reconfigurable, Multi-Tenant Resources for Teaching and Research." Sustainability 13, no. 21 (2021): 11782. http://dx.doi.org/10.3390/su132111782.
Full textMiguel Alvarez. "Autonomous CPU Resource Allocation in Cloud Environments Using Reinforcement Learning." Frontiers in Artificial Intelligence Research 2, no. 2 (2025): 167–74. https://doi.org/10.71465/fair279.
Full textNagaraj Parvatha. "Securing multi-tenant cloud platforms during global crises: A zero trust approach." International Journal of Science and Research Archive 1, no. 1 (2020): 123–32. https://doi.org/10.30574/ijsra.2020.1.1.0017.
Full textBernardi, Mario Luca, Marta Cimitile, and Francesco Mercaldo. "Cross-Organisational Process Mining in Cloud Environments." Journal of Information & Knowledge Management 17, no. 02 (2018): 1850014. http://dx.doi.org/10.1142/s0219649218500144.
Full textSrinivas Kolluri. "Unified Identity Management in the Cloud: SAP IAS Integration with SAP BTP." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 662–70. https://doi.org/10.32996/jcsts.2025.7.5.73.
Full textAbhishek Das, Sivaprasad Nadukuru, Saurabh Ashwini kumar Dave, Om Goel, Prof.(Dr.) Arpit Jain, and Dr. Lalit Kumar. "N Optimizing Multi-Tenant DAG Execution Systems for High-Throughput Inference." Darpan International Research Analysis 12, no. 3 (2024): 1007–36. http://dx.doi.org/10.36676/dira.v12.i3.139.
Full textRahul Singh Thakur. "Multi-Tenant Log Search: Designing for Cost-Effectiveness and Performance at Scale." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 854–61. https://doi.org/10.32996/jcsts.2025.7.4.99.
Full textEt.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.
Full textKiran, Kumar Voruganti. "AI-Enhanced Continuous Feedback Loops for Optimizing DevOps Pipelines in Cloud Environments." Journal of Scientific and Engineering Research 11, no. 5 (2024): 249–57. https://doi.org/10.5281/zenodo.12666943.
Full textChidera Ogeawuchi, Jeffrey, Abel Chukwuemeke Uzoka, Abraham Ayodeji Abayomi, Oluwademilade Aderemi Agboola, Toluwase Peter Gbenle, and Samuel Owoade. "Advancements in Scalable Data Modeling and Reporting for SaaS Applications and Cloud Business Intelligence." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2155–62. https://doi.org/10.62225/2583049x.2024.4.6.4267.
Full textNaman Kumar Verma. "Security Analysis in Cloud." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 359–72. https://doi.org/10.52783/jisem.v10i43s.8378.
Full textBouacha, Manal, and Hanae Sbai. "Business-IT Alignment in Cloud environment Proposed Framework." ITM Web of Conferences 52 (2023): 02006. http://dx.doi.org/10.1051/itmconf/20235202006.
Full textAlmanasir, Rasha, Deyaa Al-solomon, Saif Indrawes, Mohammed Amin Almaiah, Umar Islam, and Marwan Alshar'e. "Classification of threats and countermeasures of cloud computing." Journal of Cyber Security and Risk Auditing 2025, no. 2 (2025): 27–42. https://doi.org/10.63180/jcsra.thestap.2025.2.3.
Full textKarthikeyan S and Thenmozhi N. "Fortifying the Cloud: Navigating Data Security Challenges and Pioneering Future-Ready Solutions." International Research Journal on Advanced Science Hub 6, no. 10 (2024): 277–301. http://dx.doi.org/10.47392/irjash.2024.039.
Full textAmaan Javed. "Driving innovation through experimentation: Empowering human-AI collaboration in multi-tenant customer care platforms." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1259–70. https://doi.org/10.30574/wjaets.2025.15.3.1033.
Full textShiksha, Rout. "Auditing Change Management in Cloud Computing Environments: New Challenges and Solutions." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–9. https://doi.org/10.5281/zenodo.14065115.
Full text