Gotowa bibliografia na temat „Multi-cloud; security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Multi-cloud; security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Multi-cloud; security"
Somanathan, Sureshkumar. "Securing the Cloud: Project Management Approaches to Cloud Security in Multi-Cloud Environments." International Journal of Applied Engineering & Technology 5, no. 2 (2023): 548–56. https://doi.org/10.5281/zenodo.14947914.
Pełny tekst źródłaS. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.
Pełny tekst źródłaArun, Pandiyan Perumal. "Developing a Unified Security Framework for the Establishment of Secure and Resilient Multi-Cloud Infrastructures." European Journal of Advances in Engineering and Technology 9, no. 5 (2022): 106–14. https://doi.org/10.5281/zenodo.11213828.
Pełny tekst źródłaDixit, Rucha. "Multi-Cloud for Improving Cloud Data Security." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 2696–700. http://dx.doi.org/10.22214/ijraset.2017.11371.
Pełny tekst źródłaMohideen Basha S, G. "Enhanced Cloud Computing Security based on Single to Multi Cloud System." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 805–8. http://dx.doi.org/10.21275/mr24405180103.
Pełny tekst źródłaSamarth Shah and Neil Choksi. "Federated attestation for secure microservice communication in a multi-cloud environment." World Journal of Advanced Engineering Technology and Sciences 8, no. 1 (2023): 440–58. https://doi.org/10.30574/wjaets.2023.8.1.0019.
Pełny tekst źródłaResearcher. "SECURING MULTI-CLOUD DATABASE ENVIRONMENTS: A COMPREHENSIVE APPROACH." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 416–32. https://doi.org/10.5281/zenodo.13284869.
Pełny tekst źródłaBhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.
Pełny tekst źródłaG Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.
Pełny tekst źródłaDuncan, Rory. "A multi-cloud world requires a multi-cloud security approach." Computer Fraud & Security 2020, no. 5 (2020): 11–12. http://dx.doi.org/10.1016/s1361-3723(20)30052-x.
Pełny tekst źródłaRozprawy doktorskie na temat "Multi-cloud; security"
Palesandro, Alex. "Deployment and Security Supervision for multi-cloud architectures." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE3071/document.
Pełny tekst źródłaAl-Aqrabi, Hussain. "Cloud BI : a multi-party authentication framework for securing business intelligence on the Cloud." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/615020.
Pełny tekst źródłaFramner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.
Pełny tekst źródłaTang, Yuzhe. "Secure and high-performance big-data systems in the cloud." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53995.
Pełny tekst źródłaWang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Pełny tekst źródłaZhang, Su. "Quantitative risk assessment under multi-context environments." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/18634.
Pełny tekst źródłaVelthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.
Pełny tekst źródłaLobato, João Paulo Serafim. "A blockchain-based information security solution for a distributed multi-cloud system." Master's thesis, 2018. http://hdl.handle.net/10071/19440.
Pełny tekst źródłaPravinbhai, Munjpara Priyesh. "Implementation of multi-tier authentication technique for single-sign on access of cloud services." Thesis, 2014. http://ethesis.nitrkl.ac.in/6434/1/E-72.pdf.
Pełny tekst źródłaAlaboodi, Saad Saleh. "Model-based Evaluation: from Dependability Theory to Security." Thesis, 2013. http://hdl.handle.net/10012/7649.
Pełny tekst źródłaKsiążki na temat "Multi-cloud; security"
Herath, Pushpa. Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options. Apress L. P., 2021.
Znajdź pełny tekst źródłaNomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. Packt Publishing, Limited, 2024.
Znajdź pełny tekst źródłaNomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. de Gruyter GmbH, Walter, 2024.
Znajdź pełny tekst źródłaDhivakar, Ashwin. To Implement a Multi-Level Security in Cloud Computing Using Cryptography Novel Approach. GRIN Verlag GmbH, 2014.
Znajdź pełny tekst źródłaBenmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.
Znajdź pełny tekst źródłaBenmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.
Znajdź pełny tekst źródłaBenmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.
Znajdź pełny tekst źródłaBenmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.
Znajdź pełny tekst źródłaHilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Pełny tekst źródłaCzęści książek na temat "Multi-cloud; security"
Carvallo, Pamela, Ana R. Cavalli, Wissam Mallouli, and Erkuden Rios. "Multi-cloud Applications Security Monitoring." In Green, Pervasive, and Cloud Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57186-7_54.
Pełny tekst źródłaPrithi, S., D. Sumathi, T. Poongodi, and P. Suresh. "Trust Management Framework for Handling Security Issues in Multi-cloud Environment." In Operationalizing Multi-Cloud Environments. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74402-1_16.
Pełny tekst źródłaKavitha, M. G., and D. Radha. "Quality, Security Issues, and Challenges in Multi-cloud Environment: A Comprehensive Review." In Operationalizing Multi-Cloud Environments. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74402-1_15.
Pełny tekst źródłaKamagara, Abel, Susan Babirye, and Döníz Borsos. "Optimized Multi-cloud Service Orchestration in Cloud Computing." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78544-3_13.
Pełny tekst źródłaZhao, Lihua, Minghui Du, Weibao Lei, Lin Chen, and Lei Yang. "Towards Multi-task Fair Sharing for Multi-resource Allocation in Cloud Computing." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_30.
Pełny tekst źródłaRaghuwanshi, Kapil Dev, and Puneet Himthani. "Multi-tier Authentication for Cloud Security." In Social Networking and Computational Intelligence. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2071-6_6.
Pełny tekst źródłaKasra Kermanshahi, Shabnam, Joseph K. Liu, and Ron Steinfeld. "Multi-user Cloud-Based Secure Keyword Search." In Information Security and Privacy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0_12.
Pełny tekst źródłaZhou, Fucai, Yuxi Li, Alex X. Liu, Muqing Lin, and Zifeng Xu. "Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing." In Provable Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47422-9_9.
Pełny tekst źródłaLiu, Yang, Xingxin Li, Youwen Zhu, Jian Wang, and Zhe Liu. "Secure Multi-label Classification over Encrypted Data in Cloud." In Provable Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68637-0_4.
Pełny tekst źródłaRak, Massimiliano. "Security Assurance of (Multi-)Cloud Application with Security SLA Composition." In Green, Pervasive, and Cloud Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57186-7_57.
Pełny tekst źródłaStreszczenia konferencji na temat "Multi-cloud; security"
Karadsheh, Louay, Faten Hamad, and Hussam Fakhouri. "Multi-Cloud Security Policy Optimization." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013599.
Pełny tekst źródłaFerdinand, Ajay Martin, Snowlin Preethi Janani, and Ancy Jenifer J. "Multi-Authority Authentication and Encryption for Cloud Security." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10716966.
Pełny tekst źródłaYeboah-Ofori, Abel, Alameen Jafar, Toluwaloju Abisogun, Ian Hilton, Waheed Oseni, and Ahmad Musa. "Data Security and Governance in Multi-Cloud Computing Environment." In 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2024. http://dx.doi.org/10.1109/ficloud62933.2024.00040.
Pełny tekst źródłaRekha, K. Sashi, V. M. Sivagami, R. Usharani, T. Amutha, and S. Pushparani. "Implementing Multi-factor Authentication in Cloud Services for Enhanced Security." In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET). IEEE, 2024. https://doi.org/10.1109/icraset63057.2024.10895760.
Pełny tekst źródłaMadanan, Mukesh, Pratik Patel, Prateek Agrawal, Pankaj Mudholkar, Megha Mudholkar, and V. Jaganraja. "Security Challenges in Multi-Cloud Environments: Solutions and Best Practices." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828949.
Pełny tekst źródłaSafi, Safwan Ahmed, Nagaraja J, Deepak G, Priya Nandihal, and Nandini S. "Multi-Layer Cloud Security: A Comprehensive Review of Machine Learning Approach." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035384.
Pełny tekst źródłaAbraham, Subin, Y. Anns Jubira, Ashika Parveen M.N., Lochana P, and Agnes Chellamma John Ebenezer J. "Navigating Security Challenges in Multi-Cloud Deployments: Best Practices and Solutions." In 2024 International Conference on Advances in Computing, Communication and Materials (ICACCM). IEEE, 2024. https://doi.org/10.1109/icaccm61117.2024.11058986.
Pełny tekst źródłaNacer, Amina, and Mohammed Abdmeziem. "Dynamic Obfuscation for Secure and Efficient Multi-Cloud Business Processes." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013192100003944.
Pełny tekst źródłaJasti, Amarnath, Payal Shah, Rajeev Nagaraj, and Ravi Pendse. "Security in multi-tenancy cloud." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678682.
Pełny tekst źródłaTang, Longji, Liubo Ouyang, and Wei-Tek Tsai. "Multi-factor web API security for securing Mobile Cloud." In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382287.
Pełny tekst źródłaRaporty organizacyjne na temat "Multi-cloud; security"
Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Pełny tekst źródłaSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.
Pełny tekst źródła