Author:
Saxena Urvashi Rahul,Sharma Parth,Gupta Gaurav,Sahai Mihir
Publisher
Springer Nature Singapore
Reference19 articles.
1. Zhou L, Varadharajan V, Hitchens M: Integrating trust with cryptographic role-based access control for secure cloud data storage. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2013)
2. Mehraj S, Banday MT: Establishing a zero trust strategy in cloud computing environment. In: International Conference on Computer Communication and Informatics (2020)
3. Youssef AE. Alageel M: A framework for secure cloud computing. Int J Comput Sci Issues (IJCSI) 9(4):487–500 (2012)
4. Dawoud MM, Ebrahim GA, Youssef SA: In the introduction of A Cloud Computing Security Framework Based on Cloud Security Trusted Authority (2020)
5. Noor TH, Sheng QZ, Alfazi A: Reputation attacks detection for effective trust assessment among cloud services. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp 469–76