The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations

G Garrison, RL Wakefield, S Kim - International journal of information …, 2015 - Elsevier
Our study examines the effect of relational, managerial and technical IT-based capabilities
on cloud computing success; and analyzes how this success impacts firm performance with …

Towards photography through realistic fog

G Satat, M Tancik, R Raskar - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Imaging through fog has important applications in industries such as self-driving cars,
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …

[PDF][PDF] Cyber Security Management: A Review.

K Jenab, S Moslehpour - Business Management Dynamics, 2016 - researchgate.net
Cyber Security Management: A Review Page 1 Business Management Dynamics Vol.5, No.11,
May 2016, pp.16-39 ©Society for Business and Management Dynamics Cyber Security …

Systematic Literature Review (SLR) of resource scheduling and security in cloud computing

A Sheikh, M Munro, D Budgen - International …, 2019 - durham-repository.worktribe.com
Resource scheduling in cloud computing is a com-plex task due to the number and variety of
resources available and the volatility of usage-patterns of resources considering that the …

Secured sharing of data in cloud via dual authentication, dynamic unidirectional PRE, and CPABE

N Agarwal, A Rana, JP Pandey… - International Journal of …, 2020 - igi-global.com
Cloud computing is an emergent computing paradigm; however, data security is a significant
issue in recent time while outsourcing the data to the cloud preventing users to upload their …

[PDF][PDF] A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds.

MA AlZain, B Soh, E Pardede - J. Softw., 2013 - academia.edu
Cloud computing usage has increased rapidly in many companies. Cloud computing offers
many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud …

[PDF][PDF] Four most famous cyber attacks for financial gains

AF Altwairqi, MA AlZain, B Soh, M Masud… - Int. J. Eng. Adv …, 2019 - researchgate.net
Cyber attacks are on the rise every day and pose a major threat to the Internet users. Cyber
attackers are constantly capable of gaining hidden exposure at the moment and keeping a …

An improved security and privacy management system for data in multi-cloud environments using a hybrid approach

S Pachala, C Rupa, L Sumalatha - Evolutionary Intelligence, 2021 - Springer
Storing and accessing the information in the multi-cloud hosting environment becomes
popular these days. It offers benefits like the assurance of data protection, preventing …

[PDF][PDF] Cyber attacks and impacts: A case study in saudi arabia

RK Alqurashi, MA AlZain, B Soh, M Masud… - International …, 2020 - researchgate.net
With the development of technology, modern computer-assisted and Internet crimes have
been increasing all this while, and there is a need to further investigate the current status of …

Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security

R Senthilkumar, BG Geetha - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
Cloud computing is a promising technology that provides different types of services such as
data sharing and distribution. The Asymmetric Key Blum–Goldwasser Cryptography …