Academic literature on the topic 'Security in Cloud Computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security in Cloud Computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security in Cloud Computing"
Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.
Full textJoshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Full textR, Jain. "Survey on Mobile Cloud Computing." Advances in Robotic Technology 2, no. 1 (2024): 1–7. http://dx.doi.org/10.23880/art-16000111.
Full textChen, Chih-Yung, and Jih-Fu Tu. "A Novel Cloud Computing Algorithm of Security and Privacy." Mathematical Problems in Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/871430.
Full textShyam, Gopal K., and Mir Abdul Samim Ansari. "Security Concerns in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (2018): 2296–301. http://dx.doi.org/10.31142/ijtsrd18306.
Full textD, Mahalakshmi, and Mrs T. Sathiyabama. "Security Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 881–83. http://dx.doi.org/10.31142/ijtsrd18674.
Full textDutta, Sreejit. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 04, no. 11 (2016): 4747–52. http://dx.doi.org/10.18535/ijetst/v3i11.04.
Full textCharles, P. Joseph. "Security Issues in Cloud Computing." International journal of Emerging Trends in Science and Technology 05, no. 06 (2017): 5253–56. http://dx.doi.org/10.18535/ijetst/v4i6.05.
Full textSabanayasmin, J., Dr S. Periyasamy, and Dr K. Balamurugan. "Achieving Security for Cloud Computing." Bonfring International Journal of Networking Technologies and Applications 6, no. 2 (2019): 01–04. http://dx.doi.org/10.9756/bijnta.9037.
Full textArshad, Junaid, Paul Townend, Jie Xu, and Wei Jie. "Cloud Computing Security." International Journal of Grid and High Performance Computing 4, no. 1 (2012): 52–66. http://dx.doi.org/10.4018/jghpc.2012010104.
Full textDissertations / Theses on the topic "Security in Cloud Computing"
Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Full textPanteliuk, D., and V. Romaka. "Cloud Computing Security Issues." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47275.
Full textLounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.
Full textWin, Thu Yein. "Virtualisation security in cloud computing." Thesis, Glasgow Caledonian University, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.726791.
Full textDoelitzscher, Frank. "Security audit compliance for cloud computing." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3005.
Full textBlakstad, Kåre Marius, and Mats Andreassen. "Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21041.
Full textAmbrose, William, Samuel Athley, and Niclas Dagland. "Cloud Computing : Security Risks, SLA, and Trust." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12484.
Full textBacke, Anton, and Hugo Lindén. "Cloud Computing Security: A Systematic Literature Review." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-256426.
Full textBulusu, Santosh, and Kalyan Sudia. "A Study on Cloud Computing Security Challenges." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2820.
Full textInam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.
Full textBooks on the topic "Security in Cloud Computing"
Vacca, John R., ed. Cloud Computing Security. CRC Press, 2016. http://dx.doi.org/10.1201/9781315372112.
Full textSun, Xingming, Han-Chieh Chao, Xingang You, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68505-2.
Full textSun, Xingming, Han-Chieh Chao, Xingang You, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7.
Full textSehgal, Naresh Kumar, Pramod Chandra P. Bhatt, and John M. Acken. Cloud Computing with Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-24612-9.
Full textSun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48671-0.
Full textSun, Xingming, Alex Liu, Han-Chieh Chao, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48674-1.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7.
Full textSun, Xingming, Zhaoqing Pan, and Elisa Bertino, eds. Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00015-8.
Full textBook chapters on the topic "Security in Cloud Computing"
Mishra, Preeti, Emmanuel S. Pilli, and R. C. Joshi. "Overview of Cloud Computing." In Cloud Security. Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003004486-2.
Full textCampbell, Tony. "Cloud Computing Security." In Practical Information Security Management. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_12.
Full textZhang, Yushu, Yong Xiang, and Leo Yu Zhang. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2523-6_4.
Full textSrinivasan, S. "Cloud Computing Security." In SpringerBriefs in Electrical and Computer Engineering. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-7699-3_5.
Full textBanafa, Ahmed. "Cloud Computing Security." In Quantum Computing and Other Transformative Technologies. River Publishers, 2023. http://dx.doi.org/10.1201/9781003339175-32.
Full textSamarati, Pierangela, and Sabrina De Capitani di Vimercati. "Cloud Security." In Encyclopedia of Cloud Computing. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch17.
Full textSehgal, Naresh Kumar, and Pramod Chandra P. Bhatt. "Cloud Computing and Information Security." In Cloud Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77839-6_7.
Full textMorrow, Susan. "Data Security in the Cloud." In Cloud Computing. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9780470940105.ch23.
Full textLele, Ajey. "Cloud Computing." In Disruptive Technologies for the Militaries and Security. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.
Full textMartin, John Paul, Vipin Singh, K. Chandrasekaran, and A. Kandasamy. "Explicating Fog Computing Key Research Challenges and Solutions." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-4.
Full textConference papers on the topic "Security in Cloud Computing"
Arora, Prakhar, B. Lanitha, Muneeswaran V, Soma Saha, and H. Azath. "Cloud Computing Security Architecture and Risks." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895554.
Full textBordak, Lukas. "Cloud Computing Security." In 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2019. http://dx.doi.org/10.1109/iceta48886.2019.9040043.
Full textS, Divya, and Gini R. "Enhancing Data Security in Cloud Computing using Block chain." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.
Full textJia, Minrui. "Cloud Security of Cloud Computing Application." In 2011 International Conference on Control, Automation and Systems Engineering (CASE). IEEE, 2011. http://dx.doi.org/10.1109/iccase.2011.5997643.
Full textZhang Yandong and Zhang Yongsheng. "Cloud computing and cloud security challenges." In 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012). IEEE, 2012. http://dx.doi.org/10.1109/itime.2012.6291488.
Full textTripathi, Alok, and Abhinav Mishra. "Cloud computing security considerations." In 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC). IEEE, 2011. http://dx.doi.org/10.1109/icspcc.2011.6061557.
Full textSharma, Vani Dayal, Somya Agarwai, Syeda Shira Moin, and Mohammed Abdul Qadeer. "Security in cloud computing." In 2017 7th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2017. http://dx.doi.org/10.1109/csnt.2017.8418544.
Full textBouayad, Anas, Asmae Blilat, Nour El Houda Mejhed, and Mohammed El Ghazi. "Cloud computing: Security challenges." In 2012 Colloquium in Information Science and Technology (CIST). IEEE, 2012. http://dx.doi.org/10.1109/cist.2012.6388058.
Full textHameed, Rasha Talal, Abdulatif Ali Hussain, Omar Abdulwahabe Mohamad, Khamis A. Zidan, Omar Talal Hamid, and Saba Abdulbaqi Salman. "Improved Cloud Computing Security." In 2018 1st Annual International Conference on Information and Sciences (AiCIS). IEEE, 2018. http://dx.doi.org/10.1109/aicis.2018.00041.
Full textRishitha and T. R. Reshmi. "Security in Cloud Computing." In 2018 International Conference on Recent Trends in Advance Computing (ICRTAC). IEEE, 2018. http://dx.doi.org/10.1109/icrtac.2018.8679158.
Full textReports on the topic "Security in Cloud Computing"
Cully, John, and Susie Wright. Cloud computing. Parliamentary Office of Science and Technology, 2020. http://dx.doi.org/10.58248/pn629.
Full textHamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. Security Issues for Cloud Computing. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada545053.
Full textMyers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053534.
Full textMyers, Brandon D. Virtual Machine and Cloud Computing Security. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1053535.
Full textFarrag, Khalid. Utilizing Cloud Computing Log Events for Security Automation. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1574.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textJansen, W., and T. Grance. Guidelines on security and privacy in public cloud computing. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-144.
Full textAkyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1052949.
Full textBartock, Michael, Murugiah Souppaya, Ryan Savino, et al. Hardware-Enabled Security: Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8320-draft2.
Full textPasupuleti, Murali Krishna. Next-Generation Extended Reality (XR): A Unified Framework for Integrating AR, VR, and AI-driven Immersive Technologies. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv325.
Full text