Gotowa bibliografia na temat „Multi-cloud; security”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Multi-cloud; security”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Multi-cloud; security"

1

Somanathan, Sureshkumar. "Securing the Cloud: Project Management Approaches to Cloud Security in Multi-Cloud Environments." International Journal of Applied Engineering & Technology 5, no. 2 (2023): 548–56. https://doi.org/10.5281/zenodo.14947914.

Pełny tekst źródła
Streszczenie:
An initiative of this magnitude is required in order to achieve transparency and the security awareness in cloudbasedsystems. Because of the complexity of the application components, it is especially challenging in multicloudconfigurations, where the components of the application are distributed over multiple clouds. Whencompanies implement multi-cloud strategies in order to take advantage of the benefits offered by a large numberof cloud-based service providers, they are confronted with significant security challenges that are caused by thedispersed and complex structure of these systems. Mul
Style APA, Harvard, Vancouver, ISO itp.
2

S. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Arun, Pandiyan Perumal. "Developing a Unified Security Framework for the Establishment of Secure and Resilient Multi-Cloud Infrastructures." European Journal of Advances in Engineering and Technology 9, no. 5 (2022): 106–14. https://doi.org/10.5281/zenodo.11213828.

Pełny tekst źródła
Streszczenie:
The advent of cloud computing has revolutionized the landscape of information technology infrastructure, offering unprecedented scalable, efficient, and flexible infrastructure resources. Multi-cloud infrastructures, involving the orchestrated use of services from multiple cloud providers, have emerged in response to diverse organizational needs, including enhanced resilience, risk management, and access to specific capabilities. However, the complexity and heterogeneity of multi-cloud environments pose significant security challenges, necessitating robust and resilient security mechanisms to
Style APA, Harvard, Vancouver, ISO itp.
4

Dixit, Rucha. "Multi-Cloud for Improving Cloud Data Security." International Journal for Research in Applied Science and Engineering Technology V, no. XI (2017): 2696–700. http://dx.doi.org/10.22214/ijraset.2017.11371.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Mohideen Basha S, G. "Enhanced Cloud Computing Security based on Single to Multi Cloud System." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 805–8. http://dx.doi.org/10.21275/mr24405180103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Samarth Shah and Neil Choksi. "Federated attestation for secure microservice communication in a multi-cloud environment." World Journal of Advanced Engineering Technology and Sciences 8, no. 1 (2023): 440–58. https://doi.org/10.30574/wjaets.2023.8.1.0019.

Pełny tekst źródła
Streszczenie:
The proliferation of microservices architectures in cloud environments necessitates robust security mechanisms to ensure the integrity and confidentiality of inter-service communication. Traditional security methods, such as centralized attestation and encryption, often struggle to scale effectively in multi-cloud deployments. Federated attestation presents a promising solution by enabling distributed trust models across different cloud providers, allowing microservices to authenticate and verify each other’s integrity without relying on a centralized authority. In a multi-cloud environment, w
Style APA, Harvard, Vancouver, ISO itp.
7

Researcher. "SECURING MULTI-CLOUD DATABASE ENVIRONMENTS: A COMPREHENSIVE APPROACH." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 416–32. https://doi.org/10.5281/zenodo.13284869.

Pełny tekst źródła
Streszczenie:
This technical article explores comprehensive strategies for securing multi-cloud database environments, addressing organizations' complex challenges when leveraging services from multiple cloud providers. It examines key areas such as authentication, encryption, access control, and continuous monitoring, providing a framework for enhancing security posture in diverse cloud landscapes. The article discusses the unique security challenges of multi-cloud setups, including inconsistent policies, expanded attack surfaces, and compliance issues.  It then delves into robust security measures, c
Style APA, Harvard, Vancouver, ISO itp.
8

Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.

Pełny tekst źródła
Streszczenie:
Kubernetes enables organizations to manage applications globally, from multi-cloud to hybrid clouds. This paper presents challenges and solutions for workload orchestration, scaling, and security in such infrastructures. Running workloads across different cloud providers enables one to escape vendor lock-in and improve service availability. However, it leads to more complexity in terms of management and security. This paper will analyze the tendency of Kubernetes to orchestrate across multiple clouds in which it operates in a Multi-Cloud environment. It covers important solutions for scaling &
Style APA, Harvard, Vancouver, ISO itp.
9

G Sreenivasa Yadav. "Cloud Guardian: A Comprehensive Approach to Cloud Security Posture Management with Automated Multi-Cloud and Container Security." Communications on Applied Nonlinear Analysis 32, no. 3 (2024): 345–62. http://dx.doi.org/10.52783/cana.v32.1983.

Pełny tekst źródła
Streszczenie:
As organizations increasingly adopt multi-cloud environments and containerized applications to improve scalability and operational efficiency, managing security across these diverse platforms has become a critical challenge. Traditional security tools and manual processes are insufficient to handle the complexity and dynamic nature of modern cloud infrastructures. This research introduces Cloud Guardian, a cloud security posture management (CSPM) platform that automates security assessments, policy enforcement, and threat detection across multi-cloud platforms and containerized environments. C
Style APA, Harvard, Vancouver, ISO itp.
10

Duncan, Rory. "A multi-cloud world requires a multi-cloud security approach." Computer Fraud & Security 2020, no. 5 (2020): 11–12. http://dx.doi.org/10.1016/s1361-3723(20)30052-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Multi-cloud; security"

1

Palesandro, Alex. "Deployment and Security Supervision for multi-cloud architectures." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE3071/document.

Pełny tekst źródła
Streszczenie:
Le Cloud Computing représente une des plus importantes avancées numériques de ces dix dernières années. Le modèle de service offert par le cloud computing est basé sur une allocation élastique et à la demande des ressources et une facturation au plus juste de leur utilisation. Plusieurs catégories d’application sont en train de migrer vers le cloud (par exemple : les NFV et les applications du Big Data). D’autres domaines applicatifs, soumis à une législation plus stricte, sont plus frileux. Leurs exigences sont souvent liées à des problématiques de sécurité et/ou à la non satisfaction par les
Style APA, Harvard, Vancouver, ISO itp.
2

Al-Aqrabi, Hussain. "Cloud BI : a multi-party authentication framework for securing business intelligence on the Cloud." Thesis, University of Derby, 2016. http://hdl.handle.net/10545/615020.

Pełny tekst źródła
Streszczenie:
Business intelligence (BI) has emerged as a key technology to be hosted on Cloud computing. BI offers a method to analyse data thereby enabling informed decision making to improve business performance and profitability. However, within the shared domains of Cloud computing, BI is exposed to increased security and privacy threats because an unauthorised user may be able to gain access to highly sensitive, consolidated business information. The business process contains collaborating services and users from multiple Cloud systems in different security realms which need to be engaged dynamically
Style APA, Harvard, Vancouver, ISO itp.
3

Framner, Erik. "A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-71354.

Pełny tekst źródła
Streszczenie:
Storing personal information in a secure and reliable manner may be crucial for organizational as well as private users. Encryption protects the confidentiality of data against adversaries but if the cryptographic key is lost, the information will not be obtainable for authorized individuals either. Redundancy may protect information against availability issues or data loss, but also comes with greater storage overhead and cost. Cloud storage serves as an attractive alternative to traditional storage as one is released from maintenance responsibilities and does not have to invest in in-house I
Style APA, Harvard, Vancouver, ISO itp.
4

Tang, Yuzhe. "Secure and high-performance big-data systems in the cloud." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53995.

Pełny tekst źródła
Streszczenie:
Cloud computing and big data technology continue to revolutionize how computing and data analysis are delivered today and in the future. To store and process the fast-changing big data, various scalable systems (e.g. key-value stores and MapReduce) have recently emerged in industry. However, there is a huge gap between what these open-source software systems can offer and what the real-world applications demand. First, scalable key-value stores are designed for simple data access methods, which limit their use in advanced database applications. Second, existing systems in the cloud need automa
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.

Pełny tekst źródła
Streszczenie:
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. One of the earliest secure MPC primitives is the Shamir's secret sharing (SSS) scheme. SSS has many advantages over other popular secure MPC primitives like garbled circuits (GC) -- it provides information-theoretic security guarantee, requires no complex long-integer operations, and often leads to more efficient protocols. Nonetheless, SSS receives less attention in the signal processing community because SSS requires a larger number of honest participan
Style APA, Harvard, Vancouver, ISO itp.
6

Zhang, Su. "Quantitative risk assessment under multi-context environments." Diss., Kansas State University, 2014. http://hdl.handle.net/2097/18634.

Pełny tekst źródła
Streszczenie:
Doctor of Philosophy<br>Department of Computing and Information Sciences<br>Xinming Ou<br>If you cannot measure it, you cannot improve it. Quantifying security with metrics is important not only because we want to have a scoring system to track our efforts in hardening cyber environments, but also because current labor resources cannot administrate the exponentially enlarged network without a feasible risk prioritization methodology. Unlike height, weight or temperature, risk from vulnerabilities is sophisticated to assess and the assessment is heavily context-dependent. Existing vulnerabil
Style APA, Harvard, Vancouver, ISO itp.
7

Velthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.

Pełny tekst źródła
Streszczenie:
Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. Security and authentication have not been enough considered and they lack behind. The goal of this research is to improve the authentication and security for data analytic tools.Currently, the aforementioned big data analytic tools are using Kerberos for authenticat
Style APA, Harvard, Vancouver, ISO itp.
8

Lobato, João Paulo Serafim. "A blockchain-based information security solution for a distributed multi-cloud system." Master's thesis, 2018. http://hdl.handle.net/10071/19440.

Pełny tekst źródła
Streszczenie:
Com o aumento dos dados gerados a nível mundial impulsionado pelo rápido crescimento da Internet das coisas e dos aparelhos conectados, torna-se de extrema importância guardar e manter guardado, fora do alcance de pessoas indesejadas, tudo o que nos diz respeito e/ou que nos possa comprometer, mesmo que de forma inadvertida. Nesta senda da segurança da informação e proteção de dados numa era da Internet das coisas cada vez mais conectada, surgiu a oportunidade de desenvolver, embora que apenas conceptualmente, uma solução que pretende atender aos requisitos cada vez mais exigentes das pessoas
Style APA, Harvard, Vancouver, ISO itp.
9

Pravinbhai, Munjpara Priyesh. "Implementation of multi-tier authentication technique for single-sign on access of cloud services." Thesis, 2014. http://ethesis.nitrkl.ac.in/6434/1/E-72.pdf.

Pełny tekst źródła
Streszczenie:
In the last few years, Cloud computing is one of the most emerging technology in the world of computation. This technology provides services with one of the three service models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). This model allows users and organizations to share their vital information, crucial computing resources across the world. Securing these essential resources from the unauthorized access of the users is one of the major issues which leads to reduce the growth of this technology in the Information Technology (IT) Industrie
Style APA, Harvard, Vancouver, ISO itp.
10

Alaboodi, Saad Saleh. "Model-based Evaluation: from Dependability Theory to Security." Thesis, 2013. http://hdl.handle.net/10012/7649.

Pełny tekst źródła
Streszczenie:
How to quantify security is a classic question in the security community that until today has had no plausible answer. Unfortunately, current security evaluation models are often either quantitative but too specific (i.e., applicability is limited), or comprehensive (i.e., system-level) but qualitative. The importance of quantifying security cannot be overstated, but doing so is difficult and complex, for many reason: the “physics” of the amount of security is ambiguous; the operational state is defined by two confronting parties; protecting and breaking systems is a cross-disciplinary mechani
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Multi-cloud; security"

1

Herath, Pushpa. Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options. Apress L. P., 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. Packt Publishing, Limited, 2024.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Nomani, Qamar, Julie Davila, and Rehman Khan. Mastering Cloud Security Posture Management: Secure Multi-Cloud Infrastructure Across AWS, Azure, and Google Cloud Using Proven Techniques. de Gruyter GmbH, Walter, 2024.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Dhivakar, Ashwin. To Implement a Multi-Level Security in Cloud Computing Using Cryptography Novel Approach. GRIN Verlag GmbH, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Benmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Benmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Benmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Benmammar, Badr. Intelligent Network Management and Control: Intelligent Security, Multi-Criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio. Wiley & Sons, Incorporated, John, 2021.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Pełny tekst źródła
Streszczenie:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretic
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Multi-cloud; security"

1

Carvallo, Pamela, Ana R. Cavalli, Wissam Mallouli, and Erkuden Rios. "Multi-cloud Applications Security Monitoring." In Green, Pervasive, and Cloud Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57186-7_54.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Prithi, S., D. Sumathi, T. Poongodi, and P. Suresh. "Trust Management Framework for Handling Security Issues in Multi-cloud Environment." In Operationalizing Multi-Cloud Environments. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74402-1_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kavitha, M. G., and D. Radha. "Quality, Security Issues, and Challenges in Multi-cloud Environment: A Comprehensive Review." In Operationalizing Multi-Cloud Environments. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74402-1_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kamagara, Abel, Susan Babirye, and Döníz Borsos. "Optimized Multi-cloud Service Orchestration in Cloud Computing." In Advanced Sciences and Technologies for Security Applications. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78544-3_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zhao, Lihua, Minghui Du, Weibao Lei, Lin Chen, and Lei Yang. "Towards Multi-task Fair Sharing for Multi-resource Allocation in Cloud Computing." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Raghuwanshi, Kapil Dev, and Puneet Himthani. "Multi-tier Authentication for Cloud Security." In Social Networking and Computational Intelligence. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2071-6_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kasra Kermanshahi, Shabnam, Joseph K. Liu, and Ron Steinfeld. "Multi-user Cloud-Based Secure Keyword Search." In Information Security and Privacy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Zhou, Fucai, Yuxi Li, Alex X. Liu, Muqing Lin, and Zifeng Xu. "Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing." In Provable Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47422-9_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Liu, Yang, Xingxin Li, Youwen Zhu, Jian Wang, and Zhe Liu. "Secure Multi-label Classification over Encrypted Data in Cloud." In Provable Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68637-0_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rak, Massimiliano. "Security Assurance of (Multi-)Cloud Application with Security SLA Composition." In Green, Pervasive, and Cloud Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57186-7_57.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Multi-cloud; security"

1

Karadsheh, Louay, Faten Hamad, and Hussam Fakhouri. "Multi-Cloud Security Policy Optimization." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013599.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ferdinand, Ajay Martin, Snowlin Preethi Janani, and Ancy Jenifer J. "Multi-Authority Authentication and Encryption for Cloud Security." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10716966.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yeboah-Ofori, Abel, Alameen Jafar, Toluwaloju Abisogun, Ian Hilton, Waheed Oseni, and Ahmad Musa. "Data Security and Governance in Multi-Cloud Computing Environment." In 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2024. http://dx.doi.org/10.1109/ficloud62933.2024.00040.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Rekha, K. Sashi, V. M. Sivagami, R. Usharani, T. Amutha, and S. Pushparani. "Implementing Multi-factor Authentication in Cloud Services for Enhanced Security." In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET). IEEE, 2024. https://doi.org/10.1109/icraset63057.2024.10895760.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Madanan, Mukesh, Pratik Patel, Prateek Agrawal, Pankaj Mudholkar, Megha Mudholkar, and V. Jaganraja. "Security Challenges in Multi-Cloud Environments: Solutions and Best Practices." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828949.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Safi, Safwan Ahmed, Nagaraja J, Deepak G, Priya Nandihal, and Nandini S. "Multi-Layer Cloud Security: A Comprehensive Review of Machine Learning Approach." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035384.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Abraham, Subin, Y. Anns Jubira, Ashika Parveen M.N., Lochana P, and Agnes Chellamma John Ebenezer J. "Navigating Security Challenges in Multi-Cloud Deployments: Best Practices and Solutions." In 2024 International Conference on Advances in Computing, Communication and Materials (ICACCM). IEEE, 2024. https://doi.org/10.1109/icaccm61117.2024.11058986.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Nacer, Amina, and Mohammed Abdmeziem. "Dynamic Obfuscation for Secure and Efficient Multi-Cloud Business Processes." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013192100003944.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Jasti, Amarnath, Payal Shah, Rajeev Nagaraj, and Ravi Pendse. "Security in multi-tenancy cloud." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678682.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Tang, Longji, Liubo Ouyang, and Wei-Tek Tsai. "Multi-factor web API security for securing Mobile Cloud." In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382287.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Multi-cloud; security"

1

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Pełny tekst źródła
Streszczenie:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
Style APA, Harvard, Vancouver, ISO itp.
2

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3178.

Pełny tekst źródła
Streszczenie:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditio
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!