An exhaustive review on security issues in cloud computing
S Fatima, S Ahmad - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
Abstract The Cloud Computing is growing rapidly in the current IT industry. Cloud computing
has become a buzzword in relation to Grid & Utility computing. It provides on demand …
has become a buzzword in relation to Grid & Utility computing. It provides on demand …
Secure serverless computing using dynamic information flow control
The rise of serverless computing provides an opportunity to rethink cloud security. We
present an approach for securing serverless systems using a novel form of dynamic …
present an approach for securing serverless systems using a novel form of dynamic …
A comprehensive study of challenges and issues in cloud computing
Cloud computing is a technology which provides the capability to use storage resources and
computing services via Internet. Performance and resource management are a challenging …
computing services via Internet. Performance and resource management are a challenging …
LUCON: Data flow control for message-based IoT systems
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the
exchange of data between services across enterprises. Traditional access and usage …
exchange of data between services across enterprises. Traditional access and usage …
[HTML][HTML] The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems
Data ecosystems emerged as a new paradigm to facilitate the automated and massive
exchange of data from heterogeneous information sources between different stakeholders …
exchange of data from heterogeneous information sources between different stakeholders …
[PDF][PDF] On the need for strong sovereignty in data ecosystems
Data ecosystems are the foundation of emerging data-driven business models as they (i)
enable an automated exchange between their participants and (ii) provide them with access …
enable an automated exchange between their participants and (ii) provide them with access …
Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
Internet of Things (IoT) applications, systems and services are subject to law. We argue that
for the IoT to develop lawfully, there must be technical mechanisms that allow the …
for the IoT to develop lawfully, there must be technical mechanisms that allow the …
Cppl: Compact privacy policy language
Recent technology shifts such as cloud computing, the Internet of Things, and big data lead
to a significant transfer of sensitive data out of trusted edge networks. To counter resulting …
to a significant transfer of sensitive data out of trusted edge networks. To counter resulting …
Towards tracking data flows in cloud architectures
As cloud services become central in an increasing number of applications, they process and
store more personal and business-critical data. At the same time, privacy and compliance …
store more personal and business-critical data. At the same time, privacy and compliance …
Multi-level models for data security in networks and in the Internet of things
L Logrippo - Journal of Information Security and Applications, 2021 - Elsevier
Data flow control for security is a mature research area in computer security, and its
established results can be adapted to the newer area of data security in the Internet of things …
established results can be adapted to the newer area of data security in the Internet of things …