Works matching DE "CLOUD storage security measures"
Results: 72
Develop a High Storage Cloud Platform that Provides Enhanced Security.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3960
- By:
- Publication type:
- Article
Security Techniques in Cloud Computing for Cloud Data Storage.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 622
- By:
- Publication type:
- Article
A Novel Approach using Multi Cloud for Securing Cloud Data.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 399
- By:
- Publication type:
- Article
Privacy-Preserving Public Auditing for Secure Cloud Storage.
- Published in:
- International Journal of Knowledge Based Computer Systems, 2017, v. 5, n. 1, p. 8
- By:
- Publication type:
- Article
Cloud security: literature survey.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4734, doi. 10.11591/ijece.v13i4.pp4734-4742
- By:
- Publication type:
- Article
Improved ciphertext-policy time using short elliptic curve Diffie-Hellman.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 4, p. 4547, doi. 10.11591/ijece.v13i4.pp4547-4556
- By:
- Publication type:
- Article
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.
- Published in:
- Computer Journal, 2016, v. 59, n. 11, p. 1593, doi. 10.1093/comjnl/bxw019
- By:
- Publication type:
- Article
Lost in the Cloud: Cloud Storage, Privacy, and Suggestions for Protecting Users’ Data.
- Published in:
- Stanford Law Review, 2017, v. 69, n. 3, p. 867
- By:
- Publication type:
- Article
An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services.
- Published in:
- Nonlinear Dynamics, 2015, v. 80, n. 3, p. 1601, doi. 10.1007/s11071-015-1965-9
- By:
- Publication type:
- Article
Attack detection and mitigation scheme through novel authentication model enabled optimized neural network in smart healthcare.
- Published in:
- Computer Methods in Biomechanics & Biomedical Engineering, 2023, v. 26, n. 1, p. 38, doi. 10.1080/10255842.2022.2045585
- By:
- Publication type:
- Article
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 4, p. 299, doi. 10.1007/s10207-014-0255-8
- By:
- Publication type:
- Article
Body-Worn Cameras and the Cloud: The Costs of Getting it Wrong.
- Published in:
- Journal of Physical Security, 2022, v. 15, n. 1, p. 30
- By:
- Publication type:
- Article
Cybersecurity Risks to Business and Legal Sectors.
- Published in:
- Business Law International, 2024, v. 25, n. 3, p. 251
- By:
- Publication type:
- Article
Assured Deletion: A Scheme Based on Strong Nonseparability.
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/9691724
- By:
- Publication type:
- Article
Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 36, n. 1, p. 1079, doi. 10.32604/iasc.2023.031283
- By:
- Publication type:
- Article
TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management.
- Published in:
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1809, doi. 10.32604/iasc.2022.018580
- By:
- Publication type:
- Article
An Information Dispersal Algorithm Based Technique for Backup of Data in Cloud Data Centers.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 144, doi. 10.15866/irecos.v10i2.5542
- By:
- Publication type:
- Article
An Efficient Framework for Enhancing User Authentication in Cloud Storage Using Digital Watermark.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 130, doi. 10.15866/irecos.v10i2.5236
- By:
- Publication type:
- Article
PROTECTING THE INNOCENT--THE NEED TO ADAPT FEDERAL ASSET FORFEITURE LAWS TO PROTECT THE INTERESTS OF THIRD PARTIES IN DIGITAL ASSET SEIZURES.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 32, n. 1, p. 283
- By:
- Publication type:
- Article
Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 22, p. 61313, doi. 10.1007/s11042-023-17969-0
- By:
- Publication type:
- Article
Enhanced-Longest Common Subsequence based novel steganography approach for cloud storage.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 5, p. 7779, doi. 10.1007/s11042-022-13615-3
- By:
- Publication type:
- Article
A Review of Assured Data Deletion Security Techniques in Cloud Storage.
- Published in:
- Iraqi Journal of Science, 2023, v. 64, n. 5, p. 2492, doi. 10.24996/ijs.2023.64.5.33
- By:
- Publication type:
- Article
Research on security mechanism of cloud storage platform for remote sensing image.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 12, p. 3714, doi. 10.3969/j.issn.1001-3695.2014.12.050
- By:
- Publication type:
- Article
Welcome to the Web World.
- Published in:
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2015, v. 38, n. 3, p. 1
- By:
- Publication type:
- Article
STUDY OF E-COMMERCE SECURITY OF INFORMATION IN CLOUD STORAGE USING AN ALGORITHM.
- Published in:
- Pranjana: The Journal of Management Awareness, 2023, v. 26, n. 1/2, p. 81, doi. 10.5958/0974-0945.2023.00008.7
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Pranjana: The Journal of Management Awareness, 2023, v. 26, n. 1/2, p. 2
- By:
- Publication type:
- Article
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 23, p. 7685, doi. 10.1007/s00500-018-3224-8
- By:
- Publication type:
- Article
A CLOUDY FORECAST: DIVERGENCE IN THE CLOUD COMPUTING LAWS OF THE UNITED STATES, EUROPEAN UNION, AND CHINA.
- Published in:
- Georgia Journal of International & Comparative Law, 2013, v. 41, n. 2, p. 481
- By:
- Publication type:
- Article
Thumbnail Secret Image Sharing in Cloud Storage.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 17, p. 3076, doi. 10.3390/math10173076
- By:
- Publication type:
- Article
A Blockchain-Oriented Framework for Cloud-Assisted System to Countermeasure Phishing for Establishing Secure Smart City.
- Published in:
- Security & Communication Networks, 2023, v. 2023, p. 1, doi. 10.1155/2023/8168075
- By:
- Publication type:
- Article
A NEW TRUSTED AND COLLABORATIVE AGENT BASED APPROACH FOR ENSURING CLOUD SECURITY.
- Published in:
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2012, v. 10, n. 1, p. 71
- By:
- Publication type:
- Article
Investigation of Cloud Computing Security Issue.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2117
- By:
- Publication type:
- Article
Authentication Scheme in Cloud Computing Environment.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1114
- By:
- Publication type:
- Article
How About Ddos Attacks in Cloud Computing: A Survey.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1073
- By:
- Publication type:
- Article
Survey on Data Security Issues in Cloud Computing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 696
- By:
- Publication type:
- Article
Cloud Computing and its Emerging Need: Advantages and Issues.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 618
- By:
- Publication type:
- Article
SCLPV: Secure Certificate less Public Verification for Cloud-Based Cyber-Physical-Social Systems against Malevolent Auditors.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 552
- By:
- Publication type:
- Article
Data Privacy Protection Based on Micro Aggregation with Dynamic Sensitive Attribute Updating.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 7, p. 2307, doi. 10.3390/s18072307
- By:
- Publication type:
- Article
Mapping the European Legal Framework on Security Requirements for Cloud Computing Infrastructures in the Healthcare Sector.
- Published in:
- European Data Protection Law Review (EDPL), 2020, v. 6, n. 4, p. 536, doi. 10.21552/edpl/2020/4/9
- By:
- Publication type:
- Article
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment.
- Published in:
- Journal of Cloud Computing (2192-113X), 2018, v. 7, n. 1, p. 1, doi. 10.1186/s13677-018-0109-4
- By:
- Publication type:
- Article
Public auditing of log integrity for shared cloud storage systems via blockchain.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6249, doi. 10.1007/s11276-020-02373-5
- By:
- Publication type:
- Article
Encrypted image classification based on multilayer extreme learning machine.
- Published in:
- Multidimensional Systems & Signal Processing, 2017, v. 28, n. 3, p. 851, doi. 10.1007/s11045-016-0408-1
- By:
- Publication type:
- Article
Bringing Enterprise Security Home.
- Published in:
- ISACA Journal, 2022, n. 2, p. 15
- By:
- Publication type:
- Article
Thumbnail-Preserving Encryption Technology Based on Digital Processing.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2682, doi. 10.3390/electronics13142682
- By:
- Publication type:
- Article
Design of Regenerating Code Based on Security Level in Cloud Storage System.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 11, p. 2423, doi. 10.3390/electronics12112423
- By:
- Publication type:
- Article
An Effective Model of Confidentiality Management of Digital Archives in a Cloud Environment.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 18, p. N.PAG, doi. 10.3390/electronics11182831
- By:
- Publication type:
- Article
Secure cloud storage using anonymous and blackbox traceable data access control.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 4308, doi. 10.1002/sec.1343
- By:
- Publication type:
- Article
Achieving dynamic privileges in secure data sharing on cloud storage.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2211, doi. 10.1002/sec.739
- By:
- Publication type:
- Article
A post-quantum provable data possession protocol in cloud.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 5, p. 658, doi. 10.1002/sec.691
- By:
- Publication type:
- Article
IoT Collected Health Data to Store in Cloud and Access with PCMAE.
- Published in:
- Library of Progress-Library Science, Information Technology & Computer, 2024, v. 44, n. 3, p. 6939
- By:
- Publication type:
- Article