Bibliography 2023 03 29T063942 082

Running head BIBLIOGRAPHY Bibliography Pavan Kumar Kurra Submitted to Nathan Garrelts MISI- - Capstone Project Ferris State University Spring CBIBLIOGRAPHY Problem Many third party users employees etc are allowed to access sensitive data in the cloud without proper accessibility and security Question What accountability does a service provider have for protecting con ?dential data that is stored in the cloud CBIBLIOGRAPHY References Ayoleke I Cloud Computing Security Issues and Challenges - Retrieved from https www researchgate net pro ?le IbikunleAyoleke publication Cloud C omputingSecurityIssuesandChallenges links deec df a aa pdf Chow R Golle P Jakobsson M Masuoka R Molina J Controlling Data in the Cloud Outsourcing Computation without Outsourcing Control - Retrieved from http markus-jakobsson com papers jakobsson-ccsw pdf cloud-council org March Security for Cloud Computing Ten Steps to Ensure Success - Retrieved from http www cloud-council org deliverables CSCC- Security-for- Cloud-Computing- -Steps-to-Ensure-Success pdf Dutta A Peng G Choudhary A Risks in Enterprise Cloud Computing The Perspective of IT Experts - Retrieved from http eprints whiterose ac uk WRRO pdf Firdhous M Ghazali O Hassan S Trust Management in Cloud Computing A Critical Review - Retrieved from http arxiv org ftp arxiv papers pdf G Sehra S S Singh J Policy Speci ?cation in Role based Access Control on Clouds - Retrieved from http arxiv org ftp arxiv papers pdf Huang J Nicol D M December Trust mechanisms for cloud computing Retrieved from http link springer com article - X- - fulltext html CBIBLIOGRAPHY Hwang K Li D Trusted Cloud Computing with Secure Resources and Data Coloring - Retrieved from http gridsec usc edu hwang papers trusted- cloud- computing pdf I S P J International Journal of Advanced Research in Computer Science and Software Engineering - Retrieved from http www ijarcsse com docs papers Volume November V I - pdf K P S J P Analysis of Di ?erent Access Control Mechanism in Cloud - Retrieved from http citeseerx ist psu edu viewdoc download doi rep rep type pdf Kalyani H Rahul P Ambika P Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption - Retrieved from http www ijetae com ?les Volume Issue IJETAE pdf Karwasra N Sharma M CLOUD COMPUTING SECURITY RISKS AND ITS FUTURE - Retrieved from http static ijcsce org wp- content uploads IJCSCE SI pdf Khan A R ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT - Retrieved from http www arpnjournals com jeas researchpapers rp jeas pdf Khan K M Malluhi Q Establishing Trust in Cloud Computing - Retrieved from http www computer org cms ComputingNow HomePage rWITEstablishin gTrustCloudComputing pdf CBIBLIOGRAPHY Kharche H Chouhan D S Building Trust In Cloud Using Public Key Infrastructure - Retrieved from https thesai org Downloads Volume No Paper - BuildingTrustInCloudUsingPublicKey Infrastructure pdf Mell P Grance T July E ?ectively and Securely Using the Cloud Computing Paradigm - Retrieved from https www cs purdue edu homes bb cs handouts Cloud NIST pdf Morsy M A Grundy J Müller I November An Analysis of The

  • 32
  • 0
  • 0
Afficher les détails des licences
Licence et utilisation
Gratuit pour un usage personnel Aucune attribution requise
Partager