Cyber Security and Network Security. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Cyber Security and Network Security - Группа авторов страница 16

СКАЧАТЬ

      1. Khan, W.Z. et al., “Data and Privacy: Getting Consumers to Trust Products Enabled by the Internet of Things,” IEEE Consum. Electron. Mag., 8, 2, 35–38, 2019.

      2. Khan, W.Z. et al., “Enabling Consumer Trust Upon Acceptance of IoT Technologies through Security and Privacy Model,” in: Advanced Multimedia and Ubiquitous Engineering, pp. 111–17, Springer, Jazan University, Jizan, Saudi Arabia, 2016.

      3. Tripathi, A. and Mishra, A., “Cloud Computing Security Considerations”. IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2011.

      4. Rahaman, M.A., Schaad, A., Rits, M., Towards secure SOAP message exchange in a SOA, in: SWS ‘06: Proceedings of the 3rd ACM workshop on Secure Web Services, New York, NY, USA, ACM Press, pp. 77–84, 2006.

      5. Chomsiri, T., HTTPS Hacking Protection. 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Niagara Falls, ON, Canada, May 21-23, 2007, vol. 1, pp. 590–594, 2007, doi:10.1109/ainaw.2007.200.

      6. Sighom, J.R.N., Zhang, P., You, L., “Security Enhancement for Data Migration in the Cloud”. Multidisciplinary Digital Publishing Institute (MDPI), 9, 23, 1–13, 2017.

      7. Kumari, S., Princy, Reema, Kumari, S., “Security in Cloud Computing using AES & DES,”. Int. J. Recent Innov. Trends Comput. Commun., 5, 4, 194–200, 2017.

      8. Rochwerger, B. et al., “Reservoir—When One Cloud Is Not Enough,” Computer, 44, 44–51, Mar. 2011.

      9. Keahey, K. et al., “Sky Computing,” IEEE Internet Comput., 13, 5, 43–51, 2009.

      10. Ferrer, A.J. et al., “OPTIMIS: A Holistic Approach to Cloud Service Provisioning,” Future Gener. Comput. Syst., 28, 1, 66–77, 2012.

      11. Petcu, D., “Portability and Interoperability between Clouds: Challenges and Case Study,” in: Lecture Notes in Computer Science, Institute e-Austria Timi¸ vol. 6994, pp. 62–74, Springer, Soara and West University of Timi, Soara, Romania, 2011.

      12. Afzal, S. and Kavitha, G., Load balancing in cloud computing – A hierarchical taxonomical classification. J. Cloud Comput., 8, 22, 2019. https://doi. org/10.1186/s13677-019-0146-7.

      13. White, J., Dougherty, B., Schmidt, D.C., Model-driven auto-scaling of green cloud computing infrastructure. Future Gener. Comput. Syst., 28, 2, 371–378, 2012.

      15. Alabaichi, A., Ahmad, F., Mahmod, R., Security analysis of blowfish algorithm. 2013 Second International Conference on Informatics & Applications (ICIA), 2013, doi:10.1109/icoia.2013.6650222.

      *Corresponding author: [email protected]

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SS6UGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAAA8cAVoAAxsl RxwCAAACAAAAOEJJTQQlAAAAAAAQzc/6fajHvgkFcHaurwXDTjhCSU0EOgAAAAAA5QAAABAAAAAB AAAAAAALcHJpbnRPdXRwdXQAAAAFAAAAAFBzdFNib29sAQAAAABJbnRlZW51bQAAAABJbnRlAAAA AENscm0AAAAPcHJpbnRTaXh0ZWVuQml0Ym9vbAAAAAALcHJpbnRlck5hbWVURVhUAAAAAQAAAAAA D3ByaW50UHJvb2ZTZXR1cE9iamMAAAAMAFAAcgBvAG8AZgAgAFMAZQB0AHUAcAAAAAAACnByb29m U2V0dXAAAAABAAAAAEJsdG5lbnVtAAAADGJ1aWx0aW5Qcm9vZgAAAAlwcm9vZkNNWUsAOEJJTQQ7 AAAAAAItAAAAEAAAAAEAAAAAABJwcmludE91dHB1dE9wdGlvbnMAAAAXAAAAAENwdG5ib29sAAAA AABDbGJyYm9vbAAAAAAAUmdzTWJvb2wAAAAAAENybkNib29sAAAAAABDbnRDYm9vbAAAAAAATGJs c2Jvb2wAAAAAAE5ndHZib29sAAAAAABFbWxEYm9vbAAAAAAASW50cmJvb2wAAAAAAEJja2dPYmpj AAAAAQAAAAAAAFJHQkMAAAADAAAAAFJkICBkb3ViQG/gAAAAAAAAAAAAR3JuIGRvdWJAb+AAAAAA AAAAAABCbCAgZG91YkBv4A
СКАЧАТЬ