Review of access control mechanisms in cloud computing
Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. There are many advantages related to this technology like unlimited storage, cost eff...
| Main Authors: | Muhammad Rizwan, Ghori, Ahmed, Abdulghani Ali |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Institute of Physics Publishing
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/22896/ http://umpir.ump.edu.my/id/eprint/22896/1/Review%20of%20access%20control%20mechanisms%20in%20cloud%20computing.pdf |
Similar Items
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
VANET routing protocols: review, implementation and analysis
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Software Agent And Cloud Computing: A Brief Review
by: Firas, D. Ahmed, et al.
Published: (2016)
by: Firas, D. Ahmed, et al.
Published: (2016)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
A review of cloud computing implementation in ASEAN countries
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
An integrated model to evaluate the effects of cloud computing services on SMEs performance
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Fuzz test case generation for penetration testing in mobile cloud computing applications
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Design and implementation cloud computing (TOC, Abstract, chapter 1 and Reference only)
by: Norliza Hashim,
Published: (2014)
by: Norliza Hashim,
Published: (2014)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016)
by: Mohanaad, Shakir, et al.
Published: (2016)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Similar Items
-
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017) -
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017) -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
VANET routing protocols: review, implementation and analysis
by: Muhammad Rizwan, Ghori, et al.
Published: (2018) -
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)