Author:
Nair Amrutha Muralidharan,Santhosh R.
Publisher
Springer Nature Singapore
Reference35 articles.
1. M. Madiajagan, M. Jog, Cloud computing: exploring security design approaches in infrastructure as a service, in International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (2012), pp. 156–159
2. V. Nirmala, R. Sivanandhan, R. Lakshmi, Data confidentiality and integrity verification using user authenticator scheme in cloud, in Proceedings of the IEEE International Conference on Green High Performance Computing (ICGHPC) (2013), pp. 1–5
3. H. Tianfield, Security issues in cloud computing. Systems, Man, and Cybernetics (SMC), in Processing of the EEE International Conference on cyber security (2012), pp. 1082–1089
4. V. Anne, J. Rao, R. Kurra, Enforcing the security within mobile devices using clouds and its infrastructure, in Proceedings of the CSI Sixth International Conference on Software Engineering (CONSEG) (2012), pp. 1–4
5. R. PatilMadhubala, Information assurance technology analysis center(iatac), in Data and Analysis Center for Software (dacs), software security assurance, state-of-the art report(soar) (2007)