The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations
G Garrison, RL Wakefield, S Kim - International journal of information …, 2015 - Elsevier
Our study examines the effect of relational, managerial and technical IT-based capabilities
on cloud computing success; and analyzes how this success impacts firm performance with …
on cloud computing success; and analyzes how this success impacts firm performance with …
Towards photography through realistic fog
Imaging through fog has important applications in industries such as self-driving cars,
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …
[PDF][PDF] Cyber Security Management: A Review.
K Jenab, S Moslehpour - Business Management Dynamics, 2016 - researchgate.net
Cyber Security Management: A Review Page 1 Business Management Dynamics Vol.5, No.11,
May 2016, pp.16-39 ©Society for Business and Management Dynamics Cyber Security …
May 2016, pp.16-39 ©Society for Business and Management Dynamics Cyber Security …
Systematic Literature Review (SLR) of resource scheduling and security in cloud computing
Resource scheduling in cloud computing is a com-plex task due to the number and variety of
resources available and the volatility of usage-patterns of resources considering that the …
resources available and the volatility of usage-patterns of resources considering that the …
Secured sharing of data in cloud via dual authentication, dynamic unidirectional PRE, and CPABE
Cloud computing is an emergent computing paradigm; however, data security is a significant
issue in recent time while outsourcing the data to the cloud preventing users to upload their …
issue in recent time while outsourcing the data to the cloud preventing users to upload their …
[PDF][PDF] A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds.
Cloud computing usage has increased rapidly in many companies. Cloud computing offers
many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud …
many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud …
[PDF][PDF] Four most famous cyber attacks for financial gains
Cyber attacks are on the rise every day and pose a major threat to the Internet users. Cyber
attackers are constantly capable of gaining hidden exposure at the moment and keeping a …
attackers are constantly capable of gaining hidden exposure at the moment and keeping a …
An improved security and privacy management system for data in multi-cloud environments using a hybrid approach
S Pachala, C Rupa, L Sumalatha - Evolutionary Intelligence, 2021 - Springer
Storing and accessing the information in the multi-cloud hosting environment becomes
popular these days. It offers benefits like the assurance of data protection, preventing …
popular these days. It offers benefits like the assurance of data protection, preventing …
[PDF][PDF] Cyber attacks and impacts: A case study in saudi arabia
With the development of technology, modern computer-assisted and Internet crimes have
been increasing all this while, and there is a need to further investigate the current status of …
been increasing all this while, and there is a need to further investigate the current status of …
Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security
R Senthilkumar, BG Geetha - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
Cloud computing is a promising technology that provides different types of services such as
data sharing and distribution. The Asymmetric Key Blum–Goldwasser Cryptography …
data sharing and distribution. The Asymmetric Key Blum–Goldwasser Cryptography …