Mensah‐Bonsu et al., 2019 - Google Patents
SECURITY CHALLENEGES OF CLOUD COMPUTING IN GHANAMensah‐Bonsu et al., 2019
View PDF- Document ID
- 4328720353995655927
- Author
- Mensah‐Bonsu E
- Kwarteng I
- Asiedu‐Larbi E
- Publication year
External Links
Snippet
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.(The NIST …
- 238000003860 storage 0 abstract description 46
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111033502B (en) | Authentication using biometric data and irreversible functions via blockchain | |
US8910278B2 (en) | Managing services in a cloud computing environment | |
Agarwal et al. | The security risks associated with cloud computing | |
Akhtar et al. | A comprehensive overview of privacy and data security for cloud storage | |
Soares et al. | Cloud security: state of the art | |
Karmakar et al. | Cloud computing application: Research challenges and opportunity | |
Henze et al. | Moving privacy-sensitive services from public clouds to decentralized private clouds | |
Alshareef | Current development, challenges, and future trends in cloud computing: A survey | |
Bulusu et al. | A study on cloud computing security challenges | |
Taneja et al. | Information Security in cloud computing: A Systematic Literature Review and analysis | |
Roy et al. | A Study on Google Cloud Platform (GCP) and Its Security | |
Almtrf et al. | Framework modeling for User privacy in cloud computing | |
Diogenes et al. | Microsoft Azure Security Center | |
Cangea | A Comparative Analysis of Internet of Things Security Strategies. | |
Rai et al. | Study of security risk and vulnerabilities of cloud computing | |
Mensah‐Bonsu et al. | SECURITY CHALLENEGES OF CLOUD COMPUTING IN GHANA | |
Ots | Azure Security Handbook | |
Malik et al. | Cloud security in E-commerce applications | |
Al-Thobhani et al. | Cloud computing Security Solutions and Privacy. | |
Raza et al. | A review on security issues and their impact on hybrid cloud computing environment | |
Udaykumar | Design And Deploy Secure Azure Environment | |
Yadav et al. | A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security | |
Barrow et al. | Security in Cloud computing for service delivery models: Challenges and solutions | |
Kolhar et al. | Cloud Computing Data Auditing Algorithm | |
Walia | Security Vulnerability in Mobile Cloud Computing (MCC). |