Author:
Bahkali Ismail Mohammed,Semwal Sudhanshu Kumar
Publisher
Springer International Publishing
Reference16 articles.
1. Behl, A., Behl, K.: An analysis of cloud computing security issues. In: 2012 World Congress on Information and Communication Technologies, pp. 109–114. IEEE, October (2012)
2. Otero, A.R., Otero, C.E., Qureshi, A.: A multi-criteria evaluation of information security controls using Boolean features. Int. J. Netw. Secur. Appl. 2(4), 1–11 (2010)
3. Wang, L., Tao, J., Kunze, M., Castellanos, A.C., Kramer, D., Karl, W.: Scientific cloud computing: early definition and experience. In: 2008 10th IEEE International Conference on High Performance Computing and Communications, pp. 825–830. IEEE, September (2008)
4. Zaman, S.M., Islam, S.T., Gajrulla, U.P.: Security challenges in cloud computing
5. Behl, A.: Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: 2011 World Congress on Information and Communication Technologies, pp. 217–222. IEEE, December (2011)