Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2024
- Mahfooz Alam, Mohammad Shahid, Suhel Mustajab:
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions. J. Supercomput. 80(8): 11491-11555 (2024) - 2023
- Vemuri Sudarsan Rao:
Security policies and trust issues in cloud computing. Int. J. Inf. Priv. Secur. Integr. 5(3): 227-237 (2023) - 2022
- Vanshika Maheshwari, Subrata Sahana, Sanjoy Das, Indrani Das, Ankush Ghosh:
Factors Influencing Security Issues in Cloud Computing. ICACIS 2022: 348-358 - Nooh Bany Muhammad, Mariam Bazzi:
Advances in Cloud Computing: Security Issues and Challenges in the Cloud. ICICT 2022: 110-116 - 2021
- Doaa M. Bamasoud, Atheer Salem Al-Dossary, Nouf Mubarak Al-Harthy, Rudaina Abdullah Al-Shomrany, Ghaida Saeed Alghamdi, Rawan Othman Algahmdi:
Privacy and Security Issues in Cloud Computing: A Survey Paper. ICIT 2021: 387-392 - 2020
- Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam Ali Khan:
Corrigendum to "Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions". Sci. Program. 2020: 3671835:1-3671835:1 (2020) - Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam Ali Khan, Shah Nazir:
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions. Sci. Program. 2020: 8871315:1-8871315:31 (2020) - Hamed Tabrizchi, Marjan Kuchaki Rafsanjani:
A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12): 9493-9532 (2020) - Imen Merdassi, Cherif Ghazel, Leïla Azouz Saïdane:
Surveying and Analyzing Security Issues in Mobile Cloud Computing. PEMWN 2020: 1-10 - 2019
- B. Asvija, Rajagopal Eswari, M. B. Bijoy:
Security in hardware assisted virtualization for cloud computing - State of the art issues and challenges. Comput. Networks 151: 68-92 (2019) - P. Santhosh Kumar, Latha Parthiban, V. Jegatheeswari:
Privacy and security issues in cloud computing using idyllic approach. Int. J. Netw. Virtual Organisations 21(1): 30-42 (2019) - Syrine Sahmim Ep Guerbouj, Hamza Gharsellaoui, Sadok Bouamama:
A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things. Int. J. Serv. Sci. Manag. Eng. Technol. 10(3): 32-44 (2019) - Shahin Fatima, Shish Ahmad:
An Exhaustive Review on Security Issues in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(6): 3219-3237 (2019) - Shalin Parikh, Dharmin Dave, Reema Patel, Nishant Doshi:
Security and Privacy Issues in Cloud, Fog and Edge Computing. EUSPN/ICTH 2019: 734-739 - 2018
- Sudhakar Godi, Rajasekhar R. Kurra:
Novel security issues and mitigation measures in cloud computing: an Indian perspective. Int. J. Comput. Appl. Technol. 58(4): 267-287 (2018) - Monjur Ahmed, Alan T. Litchfield:
Taxonomy for Identification of Security Issues in Cloud Computing Environments. J. Comput. Inf. Syst. 58(1): 79-88 (2018) - Xiaotong Sun:
Critical Security Issues in Cloud Computing: A Survey. BigDataSecurity/HPSC/IDS 2018: 216-221 - Polyxeni Spanaki, Nicolas Sklavos:
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts. Computer and Network Security Essentials 2018: 539-553 - Mohammed-Ali Anwar:
Data security issues in the realm of mobile cloud computing: A survey. PeerJ Prepr. 6: e27050 (2018) - 2017
- Haider Abbas, Olaf Maennel, Saïd Assar:
Security and privacy issues in cloud computing. Ann. des Télécommunications 72(5-6): 233-235 (2017) - Tarunpreet Bhatia, A. K. Verma:
Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J. Supercomput. 73(6): 2558-2631 (2017) - Parnian Najafi Borazjani:
Security Issues in Cloud Computing. GPC 2017: 800-811 - M. Samir Abou El-Seoud, Hosam F. El-Sofany, Islam A. T. F. Taj-Eddin:
Comparable and Analytical Study Between Some Security Issues in Cloud Computing. ICL (2) 2017: 526-539 - Yujie Xie, Yeonju Lee, Kwangmin Kim, Pankoo Kim:
Security Issues and Solutions in Cloud Computing. Intelligent Environments (Workshops) 2017: 175-181 - Pradeep Kumar Sharma, Prem Shankar Kaushik, Prerna Agarwal, Payal Jain, Shivangi Agarwal, Kamlesh Dixit:
Issues and challenges of data security in a cloud computing environment. UEMCON 2017: 560-566 - Naveen Kumar, Anish Mathuria:
Security and Privacy Issues in Outsourced Personal Health Record. Research Advances in Cloud Computing 2017: 431-447 - 2016
- Brij B. Gupta, Shingo Yamaguchi, Pethuru Raj Chelliah:
Guest editorial special issues on security trends in mobile cloud computing, web, and social networking. EURASIP J. Inf. Secur. 2016: 27 (2016) - Lahar Singh Nishad, Akriti, Jaya Paliwal, Roli Pandey, Sumitra Beniwal, Sarvesh Kumar:
Security, Privacy Issues and challenges In Cloud Computing: A Survey. ICTCS 2016: 47:1-47:7 - Hamza Hammami, Hanen Brahmi, Imen Brahmi, Sadok Ben Yahia:
Security Issues in Cloud Computing and Associated Alleviation Approaches. SITIS 2016: 758-765 - Shimpy Harbajanka, Preeti Saxena:
Security Issues and Trust Management in Cloud Computing. WIR 2016: 1-3
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-12 13:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint