A Critical Investigation and Analysis of Strategic Techniques Before Approving Cloud Computing Service Frameworks
VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing is becoming increasingly fashionable in distributed computing
environment. Processing and Data storage use cloud environment is becoming a movement …
environment. Processing and Data storage use cloud environment is becoming a movement …
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities
Cloud computing is the most recent smart city advancement, made possible by the
increasing volume of heterogeneous data produced by apps. More storage capacity and …
increasing volume of heterogeneous data produced by apps. More storage capacity and …
[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …
internal digital resources and workloads. One major drawback or limitation of cloud …
CR-PPA: Connection Resilient Privacy Preserving Authentication for V2V Communications using VANET
L Ramya, K Umadevi - 2024 Second International Conference …, 2024 - ieeexplore.ieee.org
Background: Typically, Vehicular Ad Hoc Networks (VANETs) rely on the use of public keys
for communication authenticity verification and authorization. Reliability is a key problem for …
for communication authenticity verification and authorization. Reliability is a key problem for …
The Role of Big Tech in Providing Cybersecurity to End Users: A Qualitative Case Study
JM Morgan - 2023 - search.proquest.com
This study focused on exploring the lived experiences of big technology (big tech) end-user
assumptions of security. The problem was end-users of big technology assumed a level of …
assumptions of security. The problem was end-users of big technology assumed a level of …