Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Rong C, Nguyen ST, Jaatun MG. Beyond lightning: a survey on security challenges in cloud computing. Comput Electr Eng. 2013;39(1):47–54.
2. Rashid A, Chaturvedi A. Cloud computing characteristics and services a brief review. Int J Comput Sci Eng. 2019;7(2):421–6.
3. Islam T, Manivannan D, Zeadally S. A classification and characterization of security threats in cloud computing Int. J Next-Gener Comput. 2016;7:3.
4. Anand P, Ryoo J, Kim H. Addressing security challenges in cloud computing—a pattern-based approach. In: Proc. - 2015 1st Int. Conf. Softw. Secur. Assur. ICSSA 2015, pp. 13–18, 2017.
5. Parekh DH, Sridaran R. An analysis of security challenges in cloud computing. Int J Adv Comput Sci Appl. 2013;4(1):38–46.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献