Artykuły w czasopismach na temat „Cloud computing and storage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Cloud computing and storage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Joshi, Pratik R. "Deduplication using Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30186.
Pełny tekst źródłaPrerana, M. Suryawanshi, A. Patil Sangram, and S. Shewale Ajinkya. "General Discussion about Cloud Computing." Recent Trends in Cloud Computing and Web Engineering 2, no. 2 (2020): 1–4. https://doi.org/10.5281/zenodo.3937977.
Pełny tekst źródłaAiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.
Pełny tekst źródłaSong, Kai. "Research of Distributed Cache Technology Based on Cloud Computing." Applied Mechanics and Materials 443 (October 2013): 477–81. http://dx.doi.org/10.4028/www.scientific.net/amm.443.477.
Pełny tekst źródłaCholkar, Pushpjeet, and Margi Patel. "Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing." International Journal of Science and Research (IJSR) 12, no. 10 (2023): 1816–22. http://dx.doi.org/10.21275/sr231017115439.
Pełny tekst źródłaGautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Pełny tekst źródłaShubhangi, Sahare, and Dr.D.V.Rojatkar. "Cloud Computing." International Journal of Trend in Scientific Research and Development 1, no. 6 (2017): 786–89. https://doi.org/10.31142/ijtsrd4685.
Pełny tekst źródłaAnish, Chandan, and Karthikeyan R. "Designing an Energy-Efficient Cloud Network." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1654–56. https://doi.org/10.5281/zenodo.14776340.
Pełny tekst źródłaSantiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.
Pełny tekst źródłaOuf, Shimaa, and Mona Nasr. "Cloud Computing." International Journal of Cloud Applications and Computing 5, no. 2 (2015): 53–61. http://dx.doi.org/10.4018/ijcac.2015040104.
Pełny tekst źródłaKhan, Nawsher, A. Noraziah, Elrasheed I. Ismail, Mustafa Mat Deris, and Tutut Herawan. "Cloud Computing." International Journal of E-Entrepreneurship and Innovation 3, no. 2 (2012): 51–59. http://dx.doi.org/10.4018/jeei.2012040104.
Pełny tekst źródłaAmar, More1 and Sarang Joshi2. "PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, August (2018): 01–13. https://doi.org/10.5281/zenodo.1438586.
Pełny tekst źródłaWagobera Edgar Kedi, Chibundom Ejimuda, and Mojeed Dayo Ajegbile. "Cloud computing in healthcare: A comprehensive review of data storage and analysis solutions." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 290–98. http://dx.doi.org/10.30574/wjaets.2024.12.2.0291.
Pełny tekst źródłaSomula, Rama Subbareddy, and Sasikala R. "A Survey on Mobile Cloud Computing: Mobile Computing + Cloud Computing (MCC = MC + CC)." Scalable Computing: Practice and Experience 19, no. 4 (2018): 309–37. http://dx.doi.org/10.12694/scpe.v19i4.1411.
Pełny tekst źródłaNandigana, Vishal. "Multi-Scale Data Center Room for Computing and Storage." Indonesian Journal of Computer Science 10, no. 2 (2021): 238–44. http://dx.doi.org/10.33022/ijcs.v10i2.3018.
Pełny tekst źródłaKewate, Neha. "A Review on AWS - Cloud Computing Technology." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 258–63. http://dx.doi.org/10.22214/ijraset.2022.39802.
Pełny tekst źródłaBhavani, S. Durga, Gudlanarva Sudhakar, and Ujjwal Karna. "Data Storage Security in Cloud Computing: A Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 1 (2017): 52–57. http://dx.doi.org/10.23956/ijarcsse/v7i1/0148.
Pełny tekst źródłaDr., R. Sridevi*1 &. C. B. Banupriya2. "A SURVEY ON CRYPTOGRAPHIC CLOUD STORAGE TECHNIQUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 602–5. https://doi.org/10.5281/zenodo.829787.
Pełny tekst źródłaRanadive, Shreya Sambhaji, Harshada Sanjay Sawant, and Jayesh Ekanath Pinjarkar. "Secure File Storage on Cloud Computing Using Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1803–7. http://dx.doi.org/10.22214/ijraset.2022.41631.
Pełny tekst źródłaJewargi, Kiran. "What is Cloud computing Benfits and challenges of Cloud." Global Journal of Computer Sciences: Theory and Research 13, no. 1 (2023): 28–33. http://dx.doi.org/10.18844/gjcs.v13i1.8622.
Pełny tekst źródłaHasan, Ayad. "Study of Efficient Cloud Storage Architectures for the Security Environment." Journal of Kufa for Mathematics and Computer 10, no. 1 (2023): 63–71. http://dx.doi.org/10.31642/jokmc/2018/100108.
Pełny tekst źródłaSalunke, Nagesh Rajendra. "Files Storage & Sharing Platform Using Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 1338–44. http://dx.doi.org/10.22214/ijraset.2021.38994.
Pełny tekst źródłaGarima, Anand. "DATA SECURITY TECHNIQUE IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 8 (2018): 538–44. https://doi.org/10.5281/zenodo.1402460.
Pełny tekst źródłaKumar, Dr Vinod, Er Gagandeep Raheja, and Ms Jyoti Sodhi. "CLOUD COMPUTING." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 5–7. http://dx.doi.org/10.24297/ijct.v4i1a.3025.
Pełny tekst źródłaOjha, Pranav. "Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems." Journal of Research in Science and Engineering 6, no. 8 (2024): 52–56. http://dx.doi.org/10.53469/jrse.2024.06(08).12.
Pełny tekst źródłaS, Prabu, Gpinath Ganapathy, and Ranjan Goyal. "Enhanced Data Security for Public Cloud Environment with Secured Hybrid Encryption Authentication Mechanisms." Scalable Computing: Practice and Experience 19, no. 4 (2018): 351–60. http://dx.doi.org/10.12694/scpe.v19i4.1422.
Pełny tekst źródłaMs., Ravneet Kaur. "Cloud Computing: Architecture and Services." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 06 (2018): 20–23. https://doi.org/10.5281/zenodo.1258086.
Pełny tekst źródłaLi, Qiang, Kui Yang, and Li Ma. "Data Security Research for Cloud Computing." Applied Mechanics and Materials 687-691 (November 2014): 2764–67. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2764.
Pełny tekst źródłaJahnavi, R. "Data storage operations protection in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 43. http://dx.doi.org/10.26634/jcc.10.2.20418.
Pełny tekst źródłaVorobeva, Irina Alekseevna, Alexander Vladimirovich Panov, Alexander Arkadyevich Safronov, and Alexey Ivanovich Sazonov. "Cloud Computing Models for Business." International Journal of Emerging Technology and Advanced Engineering 12, no. 1 (2022): 163–72. http://dx.doi.org/10.46338/ijetae0122_16.
Pełny tekst źródłaMisawa, Shigeki, Christopher Hollowell, Jerome Lauret, Tejas Rao, and Alexandr Zaytsev. "Financial Case Study on the Use of Cloud Resources in HEP Computing." EPJ Web of Conferences 295 (2024): 07022. http://dx.doi.org/10.1051/epjconf/202429507022.
Pełny tekst źródłaIbtihal, Mouhib, El Ouadghiri Driss, and Naanani Hassan. "Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment." International Journal of Cloud Applications and Computing 7, no. 2 (2017): 27–40. http://dx.doi.org/10.4018/ijcac.2017040103.
Pełny tekst źródłaAhmed Ibrahim Turki and Qasim Mohammed Hussein. "Solutions of diagnosis of security issues and attacks for storage in cloud computing." Tikrit Journal of Pure Science 23, no. 4 (2018): 118–23. http://dx.doi.org/10.25130/tjps.v23i4.532.
Pełny tekst źródłaHu, Yuan Yuan, Lu Wang, and Xiao Dong Zhang. "Cloud Storage Virtualization Technology and its Architecture." Applied Mechanics and Materials 713-715 (January 2015): 2435–39. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2435.
Pełny tekst źródłaRashid Abdulqadir, Hindreen, Subhi R. M. Zeebaree, Hanan M. Shukur, et al. "A Study of Moving from Cloud Computing to Fog Computing." Qubahan Academic Journal 1, no. 2 (2021): 60–70. http://dx.doi.org/10.48161/qaj.v1n2a49.
Pełny tekst źródłaNikhil, Sreenivasan. "Data Storage Issues in Cloud Computing." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 906–10. https://doi.org/10.5281/zenodo.3843179.
Pełny tekst źródłaGururaj, H. L. "A comprehensive analysis of security challenges in mobile cloud computing." i-manager’s Journal on Cloud Computing 10, no. 2 (2023): 35. http://dx.doi.org/10.26634/jcc.10.2.20419.
Pełny tekst źródłaPrasad, Shweta Sukhram, and Aarti Kanahiyalal Yadava. "Research on Cloud Data Storage Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3507–10. http://dx.doi.org/10.22214/ijraset.2022.44694.
Pełny tekst źródłaIndoria, Parul, and Abhishek Didel. "An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 12 (2013): 404–9. https://doi.org/10.5281/zenodo.14613552.
Pełny tekst źródłaRasina Begum, B., and P. Chithra. "Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption." Asian Journal of Engineering and Applied Technology 9, no. 1 (2020): 13–17. http://dx.doi.org/10.51983/ajeat-2020.9.1.1084.
Pełny tekst źródłaYang, Jing Bo, Shu Huang, and Pan Jiang. "Research on Distributed Heterogeneous Data Storage Algorithm in Cloud Computing Data Center." Applied Mechanics and Materials 624 (August 2014): 553–56. http://dx.doi.org/10.4028/www.scientific.net/amm.624.553.
Pełny tekst źródłaKhan, Humra. "Energy Management in Cloud Through Green Cloud Technologies." Journal of Management and Service Science (JMSS) 2, no. 2 (2022): 1–11. http://dx.doi.org/10.54060/jmss.v2i2.19.
Pełny tekst źródłaAlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.
Pełny tekst źródłaPark, Jeong-Su, Yu-Mi Bae, and Sung-Jae Jung. "Technical analysis of Cloud Storage for Cloud Computing." Journal of the Korean Institute of Information and Communication Engineering 17, no. 5 (2013): 1129–37. http://dx.doi.org/10.6109/jkiice.2013.17.5.1129.
Pełny tekst źródłaAnitha, K. L., and Gopalakrishnan Nair T.R. "Data storage lock algorithm with cryptographic techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3843–49. https://doi.org/10.11591/ijece.v9i5.pp3843-3849.
Pełny tekst źródłaHuang, Lin Na, and Feng Hua Liu. "Data Storage Technology and its Development Based on Cloud Computing." Advanced Materials Research 756-759 (September 2013): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1275.
Pełny tekst źródłaHamlen, Kevin, Murat Kantarcioglu, Latifur Khan, and Bhavani Thuraisingham. "Security Issues for Cloud Computing." International Journal of Information Security and Privacy 4, no. 2 (2010): 36–48. http://dx.doi.org/10.4018/jisp.2010040103.
Pełny tekst źródłaTkachenko, Olha, Oleksandr Tkachenko, and Kostiantyn Tkachenko. "Actual Trends of Cloud Computing and Technologies in Optimization of Data Storage." Digital Platform: Information Technologies in Sociocultural Sphere 3, no. 2 (2020): 192–208. https://doi.org/10.31866/2617-796x.3.2.2020.220602.
Pełny tekst źródłaFirmansyah, Amin, Fid Aksara L.M., and Sutardi. "PEMANFAATAN OPEN SOURCE OWNCLOUD SEBAGAI MEDIA PENYIMPANAN DATA BERBASIS CLOUD COMPUTING." semanTIK 5, no. 1 (2019): 89–96. https://doi.org/10.5281/zenodo.3066822.
Pełny tekst źródłaПАВЛОВА, А. А., Д. А. ЦИВДИНОВА, Б. А. ЧИЛГИРОВ, et al. "OVERVIEW OF THE INTERNATIONAL DISTRIBUTED COMPUTING MARKET AND DATA STORAGE (CLOUD STORAGE)." Экономика и предпринимательство, no. 1(162) (February 11, 2024): 562–66. http://dx.doi.org/10.34925/eip.2024.162.1.105.
Pełny tekst źródła