Articoli di riviste sul tema "SECURE CLOUD SYSTEMS"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "SECURE CLOUD SYSTEMS".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Baars, Thijs, e Marco Spruit. "Designing a Secure Cloud Architecture". International Journal of Information Security and Privacy 6, n. 1 (gennaio 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Testo completoGupta, Daya Sagar, e G. P. Biswas. "Secure Computation on Cloud Storage". Journal of Cases on Information Technology 17, n. 3 (luglio 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.
Testo completoBodepudi, Anusha, Manjunath Reddy, Sai Srujan Gutlapalli e Mounika Mandapuram. "Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing". American Journal of Trade and Policy 8, n. 3 (31 dicembre 2021): 231–38. http://dx.doi.org/10.18034/ajtp.v8i3.651.
Testo completoAeri, Manisha. "Secure Data Sharing in Cloud Computing Systems: Techniques and Applications". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, n. 3 (15 dicembre 2020): 2087–94. http://dx.doi.org/10.17762/turcomat.v11i3.13606.
Testo completoPaudyal, Ramesh, e Subarna Shakya. "Secure Data Mobility in Cloud Computing for e-Governance Application". Journal of Engineering Technology and Planning 2, n. 1 (19 agosto 2021): 1–14. http://dx.doi.org/10.3126/joetp.v2i1.39203.
Testo completoHuang, Qinlong, Yue He, Wei Yue e Yixian Yang. "Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption". Security and Communication Networks 2018 (1 ottobre 2018): 1–12. http://dx.doi.org/10.1155/2018/8932325.
Testo completoSirurmath, Ms Srilakshmi U., e Dr Deepashree Devaraj. "Secure Cloud Storage Techniques: A Review". Journal of University of Shanghai for Science and Technology 23, n. 07 (1 agosto 2021): 1388–95. http://dx.doi.org/10.51201/jusst/21/07243.
Testo completoRavinder, Rao, e V. Sucharita. "A secure cloud service deployment framework for DevOps". Indonesian Journal of Electrical Engineering and Computer Science 21, n. 2 (1 febbraio 2021): 874. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp874-885.
Testo completoLi, Jiaxing, Jigang Wu e Long Chen. "Block-secure: Blockchain based scheme for secure P2P cloud storage". Information Sciences 465 (ottobre 2018): 219–31. http://dx.doi.org/10.1016/j.ins.2018.06.071.
Testo completoPape, Sebastian, Federica Paci, Jan Jürjens e Fabio Massacci. "Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach". Information 11, n. 5 (11 maggio 2020): 261. http://dx.doi.org/10.3390/info11050261.
Testo completoWu, Zhen-Yu. "A Secure and Efficient Digital-Data-Sharing System for Cloud Environments". Sensors 19, n. 12 (24 giugno 2019): 2817. http://dx.doi.org/10.3390/s19122817.
Testo completoVarnovsky, N. P., V. A. Zakharov e A. V. Shokurov. "On the existence of provably secure cloud computing systems". Moscow University Computational Mathematics and Cybernetics 40, n. 2 (aprile 2016): 83–88. http://dx.doi.org/10.3103/s0278641916020096.
Testo completoYadav, Dilip, e Sephali Behera. "A Survey on Secure Cloud-Based E-Health Systems". EAI Endorsed Transactions on Pervasive Health and Technology 5, n. 20 (5 maggio 2020): 163308. http://dx.doi.org/10.4108/eai.13-7-2018.163308.
Testo completoSahaya Stalin Jose, G., e C. Seldev Christopher. "Secure cloud data storage approach in e-learning systems". Cluster Computing 22, S5 (22 febbraio 2018): 12857–62. http://dx.doi.org/10.1007/s10586-018-1785-z.
Testo completoZhang, Jiang, Zhenfeng Zhang e Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing". IEEE Transactions on Mobile Computing 16, n. 11 (1 novembre 2017): 3222–35. http://dx.doi.org/10.1109/tmc.2017.2687931.
Testo completoMallika P, Indhurekha S e Jarlin Jeincy. "Secure and Efficient Anonymous Group Data Sharing by SBIBD Technique in Cloud Environment". international journal of engineering technology and management sciences 7, n. 1 (2023): 194–98. http://dx.doi.org/10.46647/ijetms.2023.v07i01.027.
Testo completoMugisha, Emmy, Gongxuan Zhang, Maouadj Zine El Abidine e Mutangana Eugene. "A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes". International Journal of Information Security and Privacy 11, n. 1 (gennaio 2017): 52–64. http://dx.doi.org/10.4018/ijisp.2017010104.
Testo completoJänicke, Lutz. "Secure communication for Industrie 4.0". at - Automatisierungstechnik 67, n. 5 (27 maggio 2019): 364–71. http://dx.doi.org/10.1515/auto-2019-0018.
Testo completoAnnane, Boubakeur, e Alti Adel. "Proxy-3S". International Journal of Information Security and Privacy 16, n. 1 (gennaio 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Testo completoKim, Tai-hoon, e Sabah Mohammed. "Toward designing a secure biosurveillance cloud". Journal of Supercomputing 65, n. 1 (14 ottobre 2011): 61–70. http://dx.doi.org/10.1007/s11227-011-0709-y.
Testo completoAwan, Ijaz Ahmad, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar e Allah Ditta. "Secure Framework Enhancing AES Algorithm in Cloud Computing". Security and Communication Networks 2020 (1 settembre 2020): 1–16. http://dx.doi.org/10.1155/2020/8863345.
Testo completoGautam, Pratiksha, Mohd Dilshad Ansari e Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing". International Journal of Information Security and Privacy 13, n. 1 (gennaio 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Testo completoH.A, Dinesha, e D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol". International Journal of Computer Network and Information Security 9, n. 3 (8 marzo 2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.
Testo completoAzrour, Mourade, Jamal Mabrouki e Rajasekhar Chaganti. "New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT". Security and Communication Networks 2021 (7 maggio 2021): 1–12. http://dx.doi.org/10.1155/2021/5546334.
Testo completoKonan, Martin, e Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud". International Journal of Information Security and Privacy 12, n. 4 (ottobre 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Testo completoJouini, Mouna, e Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments". International Journal of Cloud Applications and Computing 6, n. 3 (luglio 2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.
Testo completoGupta, Daya Sagar, e G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption". International Journal of Information Security and Privacy 11, n. 3 (luglio 2017): 54–62. http://dx.doi.org/10.4018/ijisp.2017070105.
Testo completoKUMAR SINGAMANENI, Kranthi, e Pasala SANYASI NAIDU. "Secure key management in cloud environment using quantum cryptography". Ingénierie des systèmes d'information 23, n. 5 (28 ottobre 2018): 213–22. http://dx.doi.org/10.3166/isi.23.5.213-222.
Testo completoPing, Yuan, Yu Zhan, Ke Lu e Baocang Wang. "Public Data Integrity Verification Scheme for Secure Cloud Storage". Information 11, n. 9 (25 agosto 2020): 409. http://dx.doi.org/10.3390/info11090409.
Testo completoSun, Shuang, Rong Du e Shudong Chen. "A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System". Information 12, n. 2 (20 gennaio 2021): 47. http://dx.doi.org/10.3390/info12020047.
Testo completoLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang e Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems". Journal of Systems Architecture 120 (novembre 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Testo completoLiu, Qin, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang e Shaobo Zhang. "SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems". Journal of Systems Architecture 120 (novembre 2021): 102300. http://dx.doi.org/10.1016/j.sysarc.2021.102300.
Testo completoKiskani, Mohsen Karimzadeh, e Hamid R. Sadjadpour. "Secure and Private Information Retrieval (SAPIR) in Cloud Storage Systems". IEEE Transactions on Vehicular Technology 67, n. 12 (dicembre 2018): 12302–12. http://dx.doi.org/10.1109/tvt.2018.2876683.
Testo completoPremnath, Sriram N., e Zygmunt J. Haas. "A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems". Procedia Computer Science 34 (2014): 474–83. http://dx.doi.org/10.1016/j.procs.2014.07.033.
Testo completoShin, Youngjoo, Dongyoung Koo, Junbeom Hur e Joobeom Yun. "Secure proof of storage with deduplication for cloud storage systems". Multimedia Tools and Applications 76, n. 19 (23 settembre 2015): 19363–78. http://dx.doi.org/10.1007/s11042-015-2956-z.
Testo completoChandel, Sonali, Geng Yang e Sumit Chakravarty. "RSA-CP-IDABE: A Secure Framework for Multi-User and Multi-Owner Cloud Environment". Information 11, n. 8 (29 luglio 2020): 382. http://dx.doi.org/10.3390/info11080382.
Testo completoOsmani, Lirim, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Linden, John White, Rasib Khan, Paula Eerola e Sasu Tarkoma. "Secure Cloud Connectivity for Scientific Applications". IEEE Transactions on Services Computing 11, n. 4 (1 luglio 2018): 658–70. http://dx.doi.org/10.1109/tsc.2015.2469292.
Testo completoSahaya Stalin, Jose G., e Christopher C. Seldev. "Minimize the Replication for Secure Cloud Data Storage Systems Using Error Correction Codes". Applied Mechanics and Materials 626 (agosto 2014): 26–31. http://dx.doi.org/10.4028/www.scientific.net/amm.626.26.
Testo completoBhardwaj, Akashdeep, e Sam Goundar. "Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks". International Journal of Information Technology and Web Engineering 13, n. 4 (ottobre 2018): 61–77. http://dx.doi.org/10.4018/ijitwe.2018100104.
Testo completoAgarwal, Neha, Ajay Rana, J. P. Pandey e Amit Agarwal. "Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE". International Journal of Information Security and Privacy 14, n. 1 (gennaio 2020): 44–66. http://dx.doi.org/10.4018/ijisp.2020010104.
Testo completoPassricha, Vishal, Ashish Chopra e Shubhanshi Singhal. "Secure Deduplication Scheme for Cloud Encrypted Data". International Journal of Advanced Pervasive and Ubiquitous Computing 11, n. 2 (aprile 2019): 27–40. http://dx.doi.org/10.4018/ijapuc.2019040103.
Testo completoYang, Haibin, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui e Xiaoyuan Yang. "Improved Outsourced Provable Data Possession for Secure Cloud Storage". Security and Communication Networks 2021 (22 luglio 2021): 1–12. http://dx.doi.org/10.1155/2021/1805615.
Testo completoAldahwan, Nouf S., e Muhammed S. Ramzan. "Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA". Security and Communication Networks 2021 (9 settembre 2021): 1–8. http://dx.doi.org/10.1155/2021/8134739.
Testo completoPathak, Vinay. "A Priority Based Efficient Secure Framework for WBANs". International Journal of Information Security and Privacy 13, n. 3 (luglio 2019): 60–73. http://dx.doi.org/10.4018/ijisp.201907010104.
Testo completoAlshamrani, Sultan. "An efficient algorithm for monitoring virtual machines in clouds". Bulletin of Electrical Engineering and Informatics 8, n. 2 (1 giugno 2019): 699–705. http://dx.doi.org/10.11591/eei.v8i2.1416.
Testo completokaur, Sandeep, Gaganpreet kaur e Mohammad Shabaz. "A Secure Two-Factor Authentication Framework in Cloud Computing". Security and Communication Networks 2022 (12 marzo 2022): 1–9. http://dx.doi.org/10.1155/2022/7540891.
Testo completoChabbi, Samir, Rachid Boudour e Fouzi Semchedine. "A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone". Ingénierie des systèmes d information 25, n. 2 (15 maggio 2020): 139–52. http://dx.doi.org/10.18280/isi.250201.
Testo completoRana, Minahil, Khalid Mahmood, Muhammad Asad Saleem, Fadi Al-Turjman, Manjur Sayyadbadasha Kolhar e Chadi Altrjman. "Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems". Applied Sciences 13, n. 3 (20 gennaio 2023): 1424. http://dx.doi.org/10.3390/app13031424.
Testo completoR. Vignesh, R. Vignesh, e J. Preethi R. Vignesh. "Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage". 網際網路技術學刊 23, n. 4 (luglio 2022): 811–25. http://dx.doi.org/10.53106/160792642022072304016.
Testo completoFavre, Liliana Maria. "Formal Metamodeling for Secure Model-Driven Engineering". International Journal of Systems and Software Security and Protection 12, n. 2 (luglio 2021): 46–67. http://dx.doi.org/10.4018/ijsssp.2021070104.
Testo completo