Advocacy for Online Proceedings: Features of the Digital World and Their Role in How Communication is Shaped in Remote International Arbitration

JP Gómez-Moreno - International Journal for the Semiotics of Law-Revue …, 2024 - Springer
The Covid-19 pandemic disrupted in-person dispute resolution proceedings, leading to the
rapid adoption of digital technologies for remote hearings in international arbitration. The …

Identity and access management framework for multi-tenant resources in hybrid cloud computing

S Deochake, V Channapattan - … of the 17th International Conference on …, 2022 - dl.acm.org
While more organizations have been trying to move their infrastructure to the cloud in recent
years, there have been significant challenges in the identity management in the hybrid …

[PDF][PDF] Considerations on Evaluation of Practical Cloud Data Protection

R Mei, HB Yan, Y He, Q Wang, S Zhu… - China Cyber Security …, 2022 - library.oapen.org
With the continuous growth of enterprises' digital transformation, business-driven cloud
computing has seen tremendous growth. The security community has proposed a large …

Secure Coding and Software Vulnerabilities in Implementation Phase of Software Development

M Khurana - ECS Transactions, 2022 - iopscience.iop.org
The methodology in software development has shifted from waterfall to agile, which has
earned appreciation as cost-effective development due to its speedy software delivery …

Considerations on Evaluation of Practical Cloud Data Protection

S Zhu, W Wen - Cyber Security: 19th China Annual Conference …, 2022 - books.google.com
With the continuous growth of enterprises' digital transformation, business-driven cloud
computing has seen tremendous growth. The security community has proposed a large …

[PDF][PDF] A quantitative study on the usage of a cryptographic software tool for data and communications encryption.

M Tomeo, W Mutale, M Kisow, JJ Scarpino… - Issues in Information …, 2023 - iacis.org
The purpose of this study was to provide a comprehensive understanding of the usage of
software encryption and its importance in securing data and communications. Although …