Paper
Addressing cloud computing security issues
Published Mar 1, 2012 · Dimitrios Zissis, D. Lekkas
Future Gener. Comput. Syst.
Q1 SJR score
2,015
Citations
133
Influential Citations
Abstract
Abstract hidden due to publisher request; this does not indicate any issues with the research. Click the full text link above to read the abstract and view the original source.
Study Snapshot
This paper proposes a Trusted Third Party solution using cryptography and Public Key Infrastructure to ensure authentication, integrity, and confidentiality in cloud computing environments.
PopulationOlder adults (50-71 years)
Sample size24
MethodsObservational
OutcomesBody Mass Index projections
ResultsSocial networks mitigate obesity in older groups.
Full text analysis coming soon...
References
Dynamic trust enhanced security model for trusted platform based services
The Trust Enhanced Secure Model (TESM) for trusted computing platforms reduces uncertainties by combining hard and soft trust, enabling better security decision-making.
2011·63citations·A. Nagarajan et al.·Future Gener. Comput. Syst.
Future Gener. Comput. Syst.
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
Cloud computing can enable computing as the 5th utility by providing essential services and promoting market-oriented resource allocation through virtual machines and market-based strategies.
2009·1815citations·R. Buyya et al.·Future Gener. Comput. Syst.
Future Gener. Comput. Syst.
Citations
Multi-Tenant Cloud FPGA: A Survey on Security, Trust and Privacy
Multi-tenant cloud FPGAs enhance performance and flexibility, but introduce new security challenges due to hardware reconfiguration at run-time.
2025·0citations·Muhammed Kawser Ahmed et al.·ACM Transactions on Reconfigurable Technology and Systems
ACM Transactions on Reconfigurable Technology and Systems
The Role of Containers and Kubernetes in Scaling Java Applications in Multi - Cloud Environments
Containers and Kubernetes effectively scale Java applications across multiple clouds, enabling efficient multi-cloud solutions with high availability rates.
2025·0citations·Santhosh Chitraju Gopal Varma·International Journal of Science and Research (IJSR)
International Journal of Science and Research (IJSR)
Damages on complex structural systems: Effects on load paths
Random damage on structural systems can cause a transition from parallel-like to series-like behavior, potentially leading to non-robust situations.
2025·0citations·Lorenza Abbracciavento et al.·International Journal of Solids and Structures
International Journal of Solids and Structures
Security measures for protection of personal identification information in Mozambique
Mozambique's government agencies should implement effective security measures to protect personal identification information, including regular backups and testing.
2024·0citations·Renato Augusto Pereira et al.·Information Development
Information Development
Sustainable Parking Space Management Using Machine Learning and Swarm Theory—The SPARK System
The SPARK system, combining machine learning and swarm theory, efficiently detects available parking spaces, reducing traffic congestion and pollution with an accuracy of 87.33%.
2024·1citation·Artur Janowski et al.·Applied Sciences
Applied Sciences