Security of Multimedia in Cloud using Secret Shared Key

K Sinha, S Choudhary, S Paul… - … Conference on Computing …, 2018 - ieeexplore.ieee.org
Cloud computing is playing an important role in providing a service in very economical
manner. The demand for the cloud service is increasing day by day. Due to increase in …

Partial selection of software requirements: a fuzzy method

D Mougouei, E Mougouei, DMW Powers - International Journal of Fuzzy …, 2021 - Springer
Prioritization and selection of requirements are an essential component of software
development. The process, however, often leads to ignoring some requirements due to the …

Privacy attack on IoT: a systematic literature review

LM Zagi, B Aziz - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …

A comparison study of available sofware security ontologies

M Alenezi, HA Basit, FI Khan, MA Beg - Proceedings of the 24th …, 2020 - dl.acm.org
A rising number of software and services malfunctioning due to security flaws has increased
the importance of software security and resulted in numerous knowledge sources of the …

[PDF][PDF] Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues.

S Faizi, S Rahman - CATA, 2019 - academia.edu
Software application development must include implementation of core functionality along
with secure coding to contain security vulnerabilities of applications. Considering the life …

A Comprehensive Security Review on Cloud Computing

S Farooq, P Chawla - Proceedings of Second International Conference on …, 2023 - Springer
Both in academics and industry, cloud computing technology is gaining traction. Despite its
significance and promise for increased IT effectiveness and cost savings, legal ambiguities …

SEF-SCC: Software engineering framework for service and cloud computing

M Ramachandran - Fog Computing: Concepts, Frameworks and …, 2018 - Springer
Abstract Service computing and cloud computing have emerged to address the need for
more flexible and cost-efficient computing systems where software is delivered as a service …

A Brief Study on Cloud Security

A Ajith, AS Mathew, S Remya - 2023 14th International …, 2023 - ieeexplore.ieee.org
Distributed, parallel, and grid computing are all used in a kind of computing known as cloud
computing. It serves as a flexible, affordable, and tried-and-true online delivery platform for …

Cyber security requirements engineering

C Ebert - Requirements Engineering for Service and Cloud …, 2017 - Springer
Virtually every connected system will be attacked sooner or later. This holds specifically for
cloud-based services and systems. A 100% secure solution is not feasible. Therefore …

Method and Technology for Ensuring the Software Security by Identifying and Classifying the Failures and Vulnerabilities

T Hovorushchenko, PT Popov… - Information …, 2022 - openaccess.city.ac.uk
The conducted literature review on known methods and technologies for providing the
software security and for identifying the failures and vulnerabilities of software showed that …