Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference32 articles.
1. Cloud Security Alliance. Security Guidance for Critical A-reas of Focus in Cloud Computing V4.0, http://www.cloudsecurityalliance.org/ (2017)
2. Sun, P.: Security and privacy preserving in cloud computing: discussions and challenges. J. Netw. Comput. Appl. 160, 102642 (2020)
3. Kalluri, R.K., Guru Rao, C.V.: Addressing the security, p-rivacy and trust challenges of cloud computing. Int. J. Comput. Sci. Information Technol. 5(5), 6094–6097 (2014)
4. Asoodeh, S., Diaz, M.: Estimation efficiency under privacy constraints. IEEE Trans. Inform. Theory (2019). https://doi.org/10.1109/TIT.2018.2865558
5. Shannon, C.E.: A Mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948)