共 50 条
- [42] Cloud Security and Compliance Concerns: Demystifying stakeholders' roles and responsibilities 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 653 - 658
- [43] Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1667 - 1671
- [44] A quantitative analysis of current security concerns and solutions for cloud computing Journal of Cloud Computing: Advances, Systems and Applications, 1 (1):
- [46] Comparative Approach to Cloud Security Models ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 170 - 177
- [47] The Proposed Model for Security in the Cloud, Controlled by the End User 2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 81 - 84
- [48] Cloud Security Service for Identifying Unauthorized User Behaviour CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 2581 - 2600