A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

Identifying cloud computing risks based on firm's ambidexterity performance using fuzzy VIKOR technique

MT Taghavifard, S Majidian - Global Journal of Flexible Systems …, 2022 - Springer
Cloud computing has become a disruptive technology in recent years which brings
numerous benefits to enterprises; however, as any other technology it is accompanied with …

Cloud computing acceptance among public sector employees

MT Amron, R Ibrahim… - … Computing Electronics and …, 2021 - telkomnika.uad.ac.id
Cloud computing is one of the platforms that drive organisations and users to be better
prepared for a simpler computing platform and offers significant benefits to the quality of …

[HTML][HTML] Stimulating Preconception Care Uptake by Women With a Vulnerable Health Status Through a Mobile Health App (Pregnant Faster): Pilot Feasibility Study

SM Smith, B Bais, H Ismaili M'hamdi… - JMIR Human …, 2024 - humanfactors.jmir.org
Background A low socioeconomic status is associated with a vulnerable health status (VHS)
through the accumulation of health-related risk factors, such as poor lifestyle behaviors (eg …

[PDF][PDF] Disentangling the Concept of Information Security Properties-Enabling Effective Information Security Governance.

M Bitzer, N Brinz, P Ollig - ECIS, 2021 - researchgate.net
The hyper-dynamic, global adoption of digital technologies due to the Covid-19 pandemic
and the increasing digitalization of business models necessitate a dialogue on fundamental …

[PDF][PDF] Cloud query processing analysis: encryption and decryption

Z Ali, A Aman, R Hassan - … . Glosas de innovación aplicadas a la …, 2019 - 3ciencias.com
The usage of clouds to provide data query services is becoming an attractive solution to
services that demand scalability and cost minimization. Despite the huge advantages, cloud …

Security Enabled Framework to Access Information in Cloud Environment

R Kumar - … Conference on Machine Learning, Big Data …, 2022 - ieeexplore.ieee.org
This paper proposed a Security Enabled Framework to Access the Information in Cloud
Environment (SEFAI) which is designed by using the various secure encrypted algorithms to …

[HTML][HTML] Security in Cloud Computing: Issues and Challenges

MA Khan, P Gupta, SK Samal, P Singh… - International Journal of …, 2024 - ijisae.org
Cloud computing is a popular social phenomena that most people use on a regular basis.
There are some themes that are universally accepted, much like at any big social event. In …

Data Security Optimization at Cloud Storage using Confidentiality-based Data Classification.

D Sudarsa, AN Rao… - International Journal of …, 2024 - search.ebscohost.com
Data is the most assets for any organization, stored either in individual systems, server, or
cloud platform. Cloud, one of the trending storage systems being adapted now a day is the …