Author:
Hernández Elena,Öztürk Mehmet,Sittón Inés,Rodríguez Sara
Publisher
Springer International Publishing
Reference39 articles.
1. Hendre, A., Joshi, K.P.: A semantic approach to cloud security and compliance. In: 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, pp. 1081–1084 (2015)
2. Addis, M.C., Kutar, M.: The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness (2018)
3. Addis, M.C., Kutar, M.: The general data protection regulation (GDPR), emerging technologies and UK organisations: awareness, implementation and readiness. In: UK Academy for Information Systems Conference Proceedings 2018
4. Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V., Sastry, H.: Security algorithms for cloud computing. Procedia Comput. Sci. 85, 535–542 (2016)
5. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9. ACM, September 2008
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献