共 50 条
- [41] Security Model of Ad hoc Cloud Computing 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 515 - 518
- [43] A Security Model for Protecting Virtualization in Cloud Computing ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 385 - 388
- [44] IT Security Threats in Cloud Computing Sourcing Model 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
- [45] Establishing Trust in Cloud Computing Security with the Help of Inter-Clouds 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1749 - 1752
- [46] Security threats and mitigation techniques affecting trust computation in cloud computing JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1161 - 1172
- [47] Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments CEIS 2011, 2011, 15
- [48] A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 10 - 15
- [49] A Review on Security Issue in Security Model of Cloud Computing Environment ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212