Author:
Alassafi Madini O.,Hussain Raid K.,Ghashgari Ghada,Walters R. J.,Wills G. B.
Publisher
Springer International Publishing
Reference62 articles.
1. Abd, S.K., Salih, R.T., Hashim, F.: Cloud computing security risks with authorization access for secure multi-tenancy based on AAAS protocol. In: IEEE Region 10 Conference TENCON, pp. 1–5 (2015)
2. Abu-Musa, A.: Exploring information technology governance (ITG) in developing countries: an empirical study. Int. J. Digit. Account. Res. 7(13), 71–120 (2007)
3. Alharthi, A., et al.: An overview of cloud services adoption challenges in higher education institutions (2015)
4. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015). http://linkinghub.elsevier.com/retrieve/pii/S0020025515000638
5. Aljahdali, H., Townend, P., Xu, J.: Enhancing multi-tenancy security in the cloud IaaS model over public deployment. In: Proceedings of the 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013, pp. 385–390 (2013)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献