Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
Cloud computing is a rapidly growing technology due to its highly flexible uses and applications. It also has other features such as simplicity, quick data access and reduced data storage costs. Consequently, it has been widely used by many organizations. This widespread use of cloud computing among...
| Main Authors: | Eldow, Abdalla, Shakir, Mohanaad, Talab, Mohammed Ahmed, Muttar, Ahmed Kh., Tawafak, Ragad M. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JATIT
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26264/ http://umpir.ump.edu.my/id/eprint/26264/1/Literature%20Review%20Of%20Authentication%20Layer.pdf |
Similar Items
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
A Systematic Review of Personalized Learning: Comparison between E-Learning and Learning by Coursework Program in Oman
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016)
by: Mohanaad, Shakir, et al.
Published: (2016)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Cloud Computing Model for MyGRANTs Project
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
by: Fadhil, Mohammed Alaa
Published: (2023)
by: Fadhil, Mohammed Alaa
Published: (2023)
An acceptance model for contributing factors of continuous intention to use E-learning systems in Oman higher education institutions
by: Tawafak, Ragad M
Published: (2020)
by: Tawafak, Ragad M
Published: (2020)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
An Energy-Efficient Cross-Layer approach for cloud wireless green communications
by: Sadiq, Ali Safa, et al.
Published: (2017)
by: Sadiq, Ali Safa, et al.
Published: (2017)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
The integrated framework of cloud computing implementation in higher education institution: a review of literature
by: K., Rahimah, et al.
Published: (2017)
by: K., Rahimah, et al.
Published: (2017)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Performance analysis on multi-attribute combinatorial double auction model for resource allocation in cloud computing
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
by: Mohamed El-Sherksi, Suad Abdalla
Published: (2017)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Learnability factors of AR usage performance: Validating through survey
by: Hafsa, Sayera, et al.
Published: (2021)
by: Hafsa, Sayera, et al.
Published: (2021)
Student Assessment Feedback Effectiveness Model for Enhancing Teaching Method and Developing Academic Performance
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
E-learning prospect on improving academic performance in Omani Universities
by: Tawafak, Ragad M., et al.
Published: (2019)
by: Tawafak, Ragad M., et al.
Published: (2019)
Software Agent And Cloud Computing: A Brief Review
by: Firas, D. Ahmed, et al.
Published: (2016)
by: Firas, D. Ahmed, et al.
Published: (2016)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Cloud Computing and Sustainability: An Australian Public Sector Perspective
by: Chang, Vanessa, et al.
Published: (2011)
by: Chang, Vanessa, et al.
Published: (2011)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Technology enhancement learning reflection on improving students’ satisfaction in Omani Universities
by: Tawafak, Ragad M., et al.
Published: (2018)
by: Tawafak, Ragad M., et al.
Published: (2018)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Similar Items
-
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021) -
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016) -
A Systematic Review of Personalized Learning: Comparison between E-Learning and Learning by Coursework Program in Oman
by: Tawafak, Ragad M., et al.
Published: (2019) -
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016) -
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)