Review on security in bluetooth low energy mesh network in correlation with wireless mesh network security

MR Ghori, TC Wan, M Anbar… - 2019 IEEE Student …, 2019 - ieeexplore.ieee.org
Wireless Mesh Networks (WMN) are becoming inevitable in this world of high technology as
it provides low cost access to broadband services. Moreover, the technologists are doing …

[HTML][HTML] Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

A Mohammad - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
As the functionality and services provided by cloud computing increase, control access to
these services becomes more complex, and more security breaches are generated. This is …

A Systematic Review of Access Control in Cloud Computing

L Praharaj, M Gupta - Future Connected Technologies, 2023 - taylorfrancis.com
As services offered by cloud computing increase, control access to these facilities turns out
to be more complex, and more security breaches are created. This is because of the …

Bluetooth Low Energy 5 Mesh Based Hospital Communication Network (B5MBHCN)

MR Ghori, TC Wan, GC Sodhy - … , ACeS 2019, Penang, Malaysia, July 30 …, 2020 - Springer
Abstract Currently, the Wireless Ad-Hoc Networks (WAHN) are becoming very common due
to the advancements in the Internet of Things (IoT) technologies. For WAHN, there are many …

Deep Dive on Popular Security Models and Strategies of Cloud Computing

K Venkatesh, R Velvizhi, KSB Priya… - Privacy and Security …, 2022 - taylorfrancis.com
Cloud computing has been an ever inspiring paradigm transforming people's lifestyles and
working patterns in recent decades. Due to its dynamic provisioning of IT capabilities, cloud …

[PDF][PDF] Significance of Admission Control Mechanism in Cloud Computing Environment

N Ahuja, P Kanungo, S Katiyal - International Journal of Distributed & …, 2020 - academia.edu
While allocating the cloud's resources the most crucial task for any service provider is the
fulfilment of SLA obligations, since, non-meeting of these obligations results in penalty cost …

[引用][C] A Survey for Comparative Analysis of various Security Methods to protect User Authentication on Cloud

MSK Yande, B Thankachan - Turkish Journal of Computer and Mathematics …, 2020