Journal articles on the topic 'Web Applications; Storage; Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web Applications; Storage; Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lyba, M. V., and L. Uhryn. "MODERN TOOLS FOR SECURITY TESTING FROM OWASP." Bulletin of Lviv State University of Life Safety 22 (December 28, 2020): 18–22. http://dx.doi.org/10.32447/20784643.22.2020.03.
Full textXie, Guo Bo, and Bing Ying Yao. "The Fingerprint Identification Technology is Applied to the Application Research of Web Cloud Storage Safety Certification." Applied Mechanics and Materials 536-537 (April 2014): 161–67. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.161.
Full textHuang, Lin Na. "Research and Application of Web Database Security Technology." Applied Mechanics and Materials 380-384 (August 2013): 2306–11. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2306.
Full textTofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (June 1, 2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.
Full textSrinivasu, N., O. Sree Priyanka, M. Prudhvi, and G. Meghana. "Multilevel classification of security threats in cloud computing." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 253. http://dx.doi.org/10.14419/ijet.v7i1.5.9157.
Full textPatel, Iishi, Sambhav Jain, J. K. Vishwajeet, Vibhuti Aggarwal, and Pragati Mehra. "Securing Electronic Healthcare Records in Web Applications." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 236–42. http://dx.doi.org/10.35940/ijeat.e2781.0610521.
Full textVivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.
Full textShinde, Rucha, Shruti Patil, Ketan Kotecha, and Kirti Ruikar. "Blockchain for Securing AI Applications and Open Innovations." Journal of Open Innovation: Technology, Market, and Complexity 7, no. 3 (August 14, 2021): 189. http://dx.doi.org/10.3390/joitmc7030189.
Full textKellezi, Deina, Christian Boegelund, and Weizhi Meng. "Securing Open Banking with Model-View-Controller Architecture and OWASP." Wireless Communications and Mobile Computing 2021 (September 21, 2021): 1–13. http://dx.doi.org/10.1155/2021/8028073.
Full textAhirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (June 30, 2021): 30–35. http://dx.doi.org/10.51767/jc1204.
Full textArunarani, Ar, and D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases." International Journal of Intelligent Information Technologies 14, no. 1 (January 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.
Full textChivukula, Sreerama Prabhu, Rajasekhar Krovvidi, and Aneesh Sreevallabh Chivukula. "Eucalyptus Cloud to Remotely Provision e-Governance Applications." Journal of Computer Networks and Communications 2011 (2011): 1–15. http://dx.doi.org/10.1155/2011/268987.
Full textOkoro, R., and S. A. Idowu. "On the Cloud Web services: A Review." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 2 (July 15, 2013): 1020–27. http://dx.doi.org/10.24297/ijct.v9i2.4166.
Full textMochammad Rizky Royani and Arief Wibowo. "Web Service Implementation in Logistics Company uses JSON Web Token and RC4 Cryptography Algorithm." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 3 (June 20, 2020): 591–600. http://dx.doi.org/10.29207/resti.v4i3.1952.
Full textGopinath, R., and B. G. Geetha. "An E-learning System Based on Secure Data Storage Services in Cloud Computing." International Journal of Information Technology and Web Engineering 8, no. 2 (April 2013): 1–17. http://dx.doi.org/10.4018/jitwe.2013040101.
Full textTHURAISINGHAM, BHAVANI. "WEB INFORMATION MANAGEMENT AND ITS APPLICATION TO ELECTRONIC COMMERCE." International Journal on Artificial Intelligence Tools 08, no. 02 (June 1999): 107–17. http://dx.doi.org/10.1142/s0218213099000087.
Full textRavalia, Varun, and Neha Sehrawat. "Vivid analysis of Cloud Computing along with its security issues and challenges." Journal of University of Shanghai for Science and Technology 23, no. 07 (July 8, 2021): 458–63. http://dx.doi.org/10.51201/jusst/21/07113.
Full textKoutelakis, George V., George K. Anastassopoulos, and Dimitrios K. Lymberopoulos. "Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture." International Journal of Telemedicine and Applications 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/271758.
Full textChidambaram, Nithya, Pethuru Raj, K. Thenmozhi, and Rengarajan Amirtharajan. "Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique." International Journal of Digital Multimedia Broadcasting 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/8789397.
Full textBallestrero, Sergio, Franco Brasolin, Arturo Sanchez Pineda, Diana Alessandra Scannicchio, and Matthew Shaun Twomey. "Designing a New Infrastructure for ATLAS Online Web Services." EPJ Web of Conferences 245 (2020): 07030. http://dx.doi.org/10.1051/epjconf/202024507030.
Full textEl-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (January 29, 2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.
Full textMohammed, Ali Abdulwahhab, and Dheyaa Jasim Kadhim. "Analysis of threats and security issues evaluation in mobile P2P networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6435. http://dx.doi.org/10.11591/ijece.v10i6.pp6435-6445.
Full textChihana, Sipiwe, and Jackson Phiri. "Application of IoT in Zambia’s FRA Grain Traceability Process." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 87. http://dx.doi.org/10.3991/ijes.v6i4.9332.
Full textQiu, Lirong, and Jie Li. "Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security." Complexity 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/6254842.
Full textSaravanan, A., S. SathyaBama, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "A new framework to alleviate DDoS vulnerabilities in cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4163. http://dx.doi.org/10.11591/ijece.v9i5.pp4163-4175.
Full textZaineldeen, Samar, and Abdelrahim Ate. "Improved cloud data transfer security using hybrid encryption algorithm." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (October 1, 2020): 521. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp521-527.
Full textAkter, Sworna, Md Alamgir Hossain, and Md Mojibur Rahman Redoy Akanda. "A Noble Security Analysis of Various Distributed Systems." International Journal of Engineering, Science and Information Technology 1, no. 2 (April 3, 2021): 62–71. http://dx.doi.org/10.52088/ijesty.v1i2.101.
Full textXu, Rongxu, Wenquan Jin, and Dohyeun Kim. "Microservice Security Agent Based On API Gateway in Edge Computing." Sensors 19, no. 22 (November 10, 2019): 4905. http://dx.doi.org/10.3390/s19224905.
Full textFardinpour, Mojgan, Alireza Sadeghi Milani, and Monire Norouzi. "Towards techniques, challenges and efforts of software as a service layer based on business applications in cloud environments." Kybernetes 49, no. 12 (January 4, 2020): 2993–3018. http://dx.doi.org/10.1108/k-07-2019-0520.
Full textJalili, Vahid, Enis Afgan, James Taylor, and Jeremy Goecks. "Cloud bursting galaxy: federated identity and access management." Bioinformatics 36, no. 1 (June 14, 2019): 1–9. http://dx.doi.org/10.1093/bioinformatics/btz472.
Full textAbdalrahman, Alameen. "A Cloud Database based on AES 256 GCM Encryption Through Devolving Web application of Accounting Information System." International Journal of Recent Technology and Engineering 9, no. 5 (January 30, 2021): 216–21. http://dx.doi.org/10.35940/ijrte.e5269.019521.
Full textHelebrant, Jan, and Petr Kuča. "SUPPORT TO CITIZEN RADIATION MONITORING OF RADIOACTIVITY IN THE CZECH REPUBLIC—PROJECT RAMESIS." Radiation Protection Dosimetry 186, no. 2-3 (December 2019): 291–95. http://dx.doi.org/10.1093/rpd/ncz220.
Full textWang, Shao Qing, Dong Yue Yu, Jin Yong Cheng, Peng Cheng Wang, and Wei Yu Zhang. "Using J2EE for Medical Image Transmission in a PACS System." Applied Mechanics and Materials 336-338 (July 2013): 2335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2335.
Full textSchmitt, D., J. Kass, M. García-Barbero, P. Kantchev, and C. Bescos. "Interoperability and HealthGRID." Methods of Information in Medicine 44, no. 02 (2005): 190–92. http://dx.doi.org/10.1055/s-0038-1633944.
Full textBijolin Edwin, E., and M. Roshni Thanka. "Data Replication Strategies with Load Balancing and Data Migration in Cloud Data Center." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2024–29. http://dx.doi.org/10.1166/jctn.2020.8843.
Full textWang, X. Z., H. M. Zhang, J. H. Zhao, Q. H. Lin, Y. C. Zhou, and J. H. Li. "AN INTERACTIVE WEB-BASED ANALYSIS FRAMEWORK FOR REMOTE SENSING CLOUD COMPUTING." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences II-4/W2 (July 10, 2015): 43–50. http://dx.doi.org/10.5194/isprsannals-ii-4-w2-43-2015.
Full textAndria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (April 18, 2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.
Full textKhoa, Tran Anh, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, and Dang Ngoc Minh Duc. "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–18. http://dx.doi.org/10.1155/2020/8896637.
Full textFaisol, Ahmad, and Imam Izzat Muttaqin. "IMPLEMENTASI SENSOR MONITORING PADA JARINGAN WI-FI (HOTSPOT) BERBASIS SNORT." Jurnal Teknologi Informasi dan Terapan 5, no. 2 (April 3, 2019): 141–46. http://dx.doi.org/10.25047/jtit.v5i2.92.
Full textMavodza, Judith. "The impact of cloud computing on the future of academic library practices and services." New Library World 114, no. 3/4 (March 22, 2013): 132–41. http://dx.doi.org/10.1108/03074801311304041.
Full textMohalik, Ramakanta. "Digital Literacy and Its Use by Teacher Trainess at Secondary Level in Odisha." Randwick International of Education and Linguistics Science Journal 1, no. 2 (September 30, 2020): 242–50. http://dx.doi.org/10.47175/rielsj.v1i2.90.
Full textYu, Rongrui, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, and Na Chen. "Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment." Complexity 2021 (May 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/5613599.
Full textGalvin, Hannah K., and Paul R. DeMuro. "Developments in Privacy and Data Ownership in Mobile Health Technologies, 2016-2019." Yearbook of Medical Informatics 29, no. 01 (August 2020): 032–43. http://dx.doi.org/10.1055/s-0040-1701987.
Full textS. Vaithyasubramanian, S. Vaithyasubramanian, and R. Sundararajan. "State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing." International Journal of Pervasive Computing and Communications 17, no. 1 (January 8, 2021): 121–34. http://dx.doi.org/10.1108/ijpcc-05-2020-0035.
Full textPadmanaban, Sujitha, and Muppidathi Priya. "FX Job Recruitment." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 239–49. http://dx.doi.org/10.5121/ijci.2021.100227.
Full textMunawar, Hafiz Suliman, Siddra Qayyum, Fahim Ullah, and Samad Sepasgozar. "Big Data and Its Applications in Smart Real Estate and the Disaster Management Life Cycle: A Systematic Analysis." Big Data and Cognitive Computing 4, no. 2 (March 26, 2020): 4. http://dx.doi.org/10.3390/bdcc4020004.
Full textGu, Dongxiao, Xuejie Yang, Shuyuan Deng, Changyong Liang, Xiaoyu Wang, Jiao Wu, and Jingjing Guo. "Tracking Knowledge Evolution in Cloud Health Care Research: Knowledge Map and Common Word Analysis." Journal of Medical Internet Research 22, no. 2 (February 25, 2020): e15142. http://dx.doi.org/10.2196/15142.
Full textWu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.
Full textObermayer, Benedikt, Manuel Holtgrewe, Mikko Nieminen, Clemens Messerschmidt, and Dieter Beule. "SCelVis: exploratory single cell data analysis on the desktop and in the cloud." PeerJ 8 (February 19, 2020): e8607. http://dx.doi.org/10.7717/peerj.8607.
Full textAlrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (July 2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.
Full text