Kostadinovska, 2016 - Google Patents
Cloud security-An approach with modern cryptographic solutionsKostadinovska, 2016
View PDF- Document ID
- 8446243950284361036
- Author
- Kostadinovska I
- Publication year
- Publication venue
- Unpublished M. Sc. Thesis submitted to the Faculty of Computer and Information Science, University of Ljubljana, Slovenia
External Links
Snippet
Cloud computing is in the spotlight of computer industry today. With its new aspects and capabilities that have been proclaimed, cloud computing is a rapidly evolving model. Cloud may be the next evolution in IT history and is radically changing the way an enterprise …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmed et al. | Taxonomy for identification of security issues in cloud computing environments | |
Rao | A study on data storage security issues in cloud computing | |
Thilakanathan et al. | Secure data sharing in the cloud | |
Arora et al. | Cloud security ecosystem for data security and privacy | |
Kumar et al. | A survey on secure cloud: security and privacy in cloud computing | |
Sauber et al. | A new secure model for data protection over cloud computing | |
Sugumaran et al. | An architecture for data security in cloud computing | |
Kiraz | A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing | |
Jakóbik | Big data security | |
Murray et al. | Cloud service security & application vulnerability | |
Srikanth et al. | Security issues in cloud and mobile cloud: A comprehensive survey | |
Shibli et al. | Access control as a service in cloud: challenges, impact and strategies | |
Adlam et al. | Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure | |
Leila et al. | A new framework of authentication over cloud computing | |
Dahiya et al. | IMPLEMENTING MULTILEVEL DATA SECURITY IN CLOUD COMPUTING. | |
GR et al. | Investigational analysis of security measures effectiveness in cloud computing: A study | |
Kostadinovska | Cloud security-An approach with modern cryptographic solutions | |
Rajvanshi et al. | Data Protection in Cloud Computing | |
Hussain et al. | Survey on security and privacy of cloud computing paradigm: Challenges and mitigation methods | |
Parekh et al. | Mitigating cloud security threats using public-key infrastructure | |
Jha et al. | Cloud computing security challenges and related mitigation strategies | |
Waizenegger | Data security in multi-tenant environments in the cloud | |
Praharaj et al. | A systematic review of Access Control in Cloud Computing | |
Gagged et al. | Improved secure dynamic bit standard technique for a private cloud platform to address security challenges | |
El-Sofany et al. | Studying Security of Data in Cloud Computing Through Cryptographic Approach |