Author:
Thillaiarasu N.,ChenthurPandian S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference16 articles.
1. Al-Muhtadia, J., Hillb, R., Al-Rwaisa, S.: Access control using threshold cryptography for ubiquitous computing environments. J. King Saud Univ. Comput. Inf. Sci. 23(2), 71–78 (2011)
2. Chadwick, D.W., Fatema, K.: A privacy preserving authorization system for the cloud. J. Comput. Syst. Sci. 78, 1359–1373 (2012)
3. Chandramohan, D., Vengattaraman, T., Basha, M.S.S., Dhavachelvan, P.: MSRCC-Mitigation of security risks in cloud computing. Adv. Comput. Inf. Technol. 176, 525–532 (2012). doi:
10.1007/978-3-642-31513-8-54
. ISBN: 978-3-642- 31513-8
4. Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: HPPC-hierarchical Petri-net based privacy nominal model approach for cloud. In: Proceedings of the Annual IEEE India Conference (INDICON), Kochi, vol. 1052, pp. 1047–1052 (2012). doi:
10.1109/INDCON.2012.6420771
5. Chandramohan, D., Vengattaraman, T., Rajaguru, D., Baskaran, R., Dhavachelvan, P.: A privacy preserving representation for web service communicators’ in the cloud. In: Proceedings of the QSHINE-2013, 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, India, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 115, pp. 496–506 (2013). doi:
10.1007/978-3-642-37949-9_44
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献