[PDF][PDF] Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment.
This research paper puts emphasis on using cloud computing with Blockchain (BC) to
improve the security and privacy in a cloud. The security of data is not guaranteed as there is …
improve the security and privacy in a cloud. The security of data is not guaranteed as there is …
[PDF][PDF] Analyzing the Security and Privacy Challenges in Implementing Ai and Ml Models in Multi-Tenant Cloud Environments
U Dasi, N Singla, R Balasubramanian… - … , ISSN: 2960-2068, 2024 - researchgate.net
This paper aims to establish a perspective of how privacy and security were affected due to
early integration of AI/ML in a multi-tenant cloud computing environment. It pertains to the …
early integration of AI/ML in a multi-tenant cloud computing environment. It pertains to the …
[PDF][PDF] Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology.
SK Henge, G Jayaraman, M Sreedevi… - Networks & …, 2023 - researchgate.net
The central remote servers are essential for storing and processing data for cloud computing
evaluation. However, traditional systems need to improve their ability to provide technical …
evaluation. However, traditional systems need to improve their ability to provide technical …
Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
SK Henge, GU Maheswari, R Ramalingam… - Systems, 2023 - mdpi.com
This article discusses the importance of cross-platform UX/UI designs and frameworks and
their effectiveness in building web applications and websites. Third-party libraries (TPL) and …
their effectiveness in building web applications and websites. Third-party libraries (TPL) and …
[PDF][PDF] Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy
© Analysis and detection of insider attacks using behaviour rule based architecture in
enterprise multitenancy Santosh Kumar He Page 1 © Analysis and detection of insider …
enterprise multitenancy Santosh Kumar He Page 1 © Analysis and detection of insider …