Author:
Manimuthu A.,Murugaboopathi G.
Publisher
Springer Science and Business Media LLC
Reference17 articles.
1. Cheng H, Rong C, Qian M, Wang W (2018) Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882
2. Gerard Lynn T, Leimbach T (2014) Potential and impacts of cloud computing services and social network websites, science and technology options assessment. https://www.researchgate.net/publication/261758174
3. Jain JR, Asaduzzaman A (2016) A novel data logging framework to enhance security of cloud computing. In: SoutheastCon 2016. IEEE, pp 1–6
4. Karam Y, Baker T, Taleb-Bendiab A (2012) Security support for intention driven elastic cloud computing. In: Computer modeling and simulation (EMS), sixth UK Sim/AMSS European symposium, pp 67–73
5. Li X, Xu Q, Chen C (2015) Designing a hierarchical decentralized system for distributing large-scale, cross-sector, and multipollutant control accountabilities. IEEE Syst J 11(4):2774–2783
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献