Bhatia et al., 2018 - Google Patents
A Comprehensive Study of Security in Cloud ComputingBhatia et al., 2018
View PDF- Document ID
- 4502290272379406884
- Author
- Bhatia M
- Bhardwaj A
- Singla D
- Publication year
- Publication venue
- International Journal of Computer Sciences and Engineering
External Links
Snippet
Accepted: 05/Dec/2018, Published: 31/Dec/2018 Abstract—Cloud computing has become a popular model for reducing cost of business, improvise quality of services, and provide good & secure computing. It opens up the Computing World by providing the access to anything …
- 230000003334 potential 0 abstract description 3
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Padhy et al. | Cloud computing: security issues and research challenges | |
| Narula et al. | Cloud computing security: Amazon web service | |
| CN113557509B (en) | Binding a secure key of a secure client to a hardware security module | |
| Bokhari et al. | Cloud computing service models: A comparative study | |
| Goyal | Public vs private vs hybrid vs community-cloud computing: a critical review | |
| EP3138035B1 (en) | Method and apparatus for multi-tenancy secrets management | |
| Kumar | World of cloud computing & security | |
| Singh et al. | Overview of security issues in cloud computing | |
| Sinjilawi et al. | Addressing Security and Privacy Issues in Cloud Computing. | |
| Henze et al. | Moving privacy-sensitive services from public clouds to decentralized private clouds | |
| Saeed et al. | Analytical approach for security of sensitive business cloud | |
| Mehra et al. | Analyzing cloud computing security issues and challenges | |
| Ali et al. | Emerging trends in cloud computing paradigm: An extensive literature review on cloud security, service models, and practical suggestions | |
| Bhatia et al. | A Comprehensive Study of Security in Cloud Computing | |
| Chahal et al. | A Comprehensive Study of Security in Cloud Computing | |
| Udayakumar | Design and Deploy a Secure Azure Environment | |
| Sravani et al. | Effective service security schemes in cloud computing | |
| Shukla et al. | Discerning the threats in cloud computing security | |
| Antonova et al. | ERP security, audit and process improvement | |
| Nahar et al. | Cloud computing and cloud security | |
| Sebastian et al. | A review on cloud security threats and solutions | |
| Walia | Security Vulnerability in Mobile Cloud Computing (MCC). | |
| Morsi et al. | Cloud computing challenges and opportunities | |
| Londhe et al. | Imperial Analysis of Threats and Vulnerabilities in Cloud Computing. | |
| Kumar et al. | A novel approach: Security measures and concerns of cloud computing |