Ahmad et al., 2017 - Google Patents
Cloud Computing–Threats and ChallengesAhmad et al., 2017
View PDF- Document ID
- 10939209686824432491
- Author
- Ahmad I
- Bakht H
- Mohan U
- Publication year
- Publication venue
- J. Comput. Manag. Stud
External Links
Snippet
Recent advances in cloud technologies have gained much eminence in successfully delivering computing services, but yet to receive much needed attention to offer comprehensive evaluation of the existing security and privacy issues. Due to the distributed …
- 238000011160 research 0 abstract description 11
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Claycomb et al. | Insider threats to cloud computing: Directions for new research challenges | |
Ashktorab et al. | Security threats and countermeasures in cloud computing | |
Arogundade | Network security concepts, dangers, and defense best practical | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Gupta et al. | Taxonomy of cloud security | |
Kunduru | The perils and defenses of enterprise cloud computing: a comprehensive review | |
Tep et al. | A taxonomy of cloud attack consequences and mitigation strategies: The role of access control and privileged access management | |
Jouini et al. | Surveying and analyzing security problems in cloud computing environments | |
Alhenaki et al. | Security in cloud computing: a survey | |
Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
Ahmad et al. | Cloud Computing–Threats and Challenges | |
Atieh | Assuring the optimum security level for network, physical and cloud infrastructure | |
Sureshkumar et al. | A study of the cloud security attacks and threats | |
Chuka-Maduji et al. | Cloud computing security challenges and related defensive measures: A survey and taxonomy | |
Malomo et al. | A survey on recent advances in cloud computing security | |
Ahmad et al. | Security challenges from abuse of cloud service threat | |
Teo et al. | A review on cloud computing security | |
Ahmed et al. | Modeling Security Risk Factors in a Cloud Computing Environment. | |
Kumar | Intrusion detection and prevention system in enhancing security of cloud environment | |
Ahir et al. | A Systematic Survey on Cloud Security Threats, Impacts and Remediation | |
Nazir et al. | Security threats with associated mitigation techniques in cloud computing | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Patil et al. | A Review of the OW ASP Top 10 Web Application Security Risks and Best Practices for Mitigating These Risks | |
Salim et al. | A Literature Review of Challenges and Solutions in Cloud Security | |
Raju et al. | Survey about cloud computing threats |