[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Security-as-a-service: a literature review

W Wang, S Yongchareon - International Journal of Web Information …, 2020 - emerald.com
Purpose This study aims to identify the level of security from existing work, analyze
categories of security as a service (SECaaS) and classify them into a meaningful set of …

Secure encryption key management as a SecaaS based on Chinese wall security policy

S Fehis, O Nouali, T Kechadi - Journal of Information Security and …, 2021 - Elsevier
Cloud computing has become very popular and many mobile IT users are accessing
business data and services without going through corporate networks. In this context the …

A Survey on Security as a Service

W Wang, S Yongchareon - … Conference, Puschino, Russia, October 7-11 …, 2017 - Springer
Abstract Security as a Service (SECaaS) has been demonstrated to be one of the
increasingly popular ways to address security problems in Cloud Computing but still not very …

[PDF][PDF] Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications.

S Mandal, DA Khan - Journal of Engineering Science & Technology …, 2021 - jestr.org
The emergence of the cloud computing paradigm has influenced business organizations for
migration over two decades. This has enabled a more incredible communication speed …

[PDF][PDF] Algorithmic Detection of Cyber Threats: Integrating Machine Learning into Modern Security Innovations

A Ali - 2024 - researchgate.net
The rapid evolution of cyber threats has necessitated the development of sophisticated
detection mechanisms that can respond to increasingly complex attack vectors. Algorithmic …

Access management solution to corporate service

J Hyytiäinen - 2024 - aaltodoc.aalto.fi
This master's thesis introduces identity and access management methods as part of IT
security activities, examines how different identity and access management methods are …

[PDF][PDF] Advancements in Algorithmic Detection: A New Frontier in Cybersecurity Innovations

A Elson - 2024 - researchgate.net
The rapid evolution of cyber threats necessitates the adoption of advanced detection
mechanisms that can effectively identify and mitigate security risks." Advancements in …

[PDF][PDF] Cyber Threat Analysis and the Development of Proactive Security Strategies for Risk Mitigation

F Dine - 2024 - researchgate.net
In the rapidly evolving digital landscape, cyber threats have become increasingly
sophisticated, posing significant risks to organizations and their assets. Cyber threat …

Usage-based access control for cloud applications

Y Ghazi, R Masood, MA Shibli… - Innovative Solutions for …, 2016 - igi-global.com
Abstract The Cloud technology takes Service Oriented Architecture to the next level, where
applications and infrastructure can be outsourced over the internet. It affords flexibility to …