Schemes for verification of resources in the cloud: comparison of the cloud technology providers

A Sulich, T Zema, P Zema - Towards Industry 4.0—Current Challenges in …, 2020 - Springer
Cloud technology providers differ from each other not only by the level of their computing
cloud abstraction level but also by different computing environment conditions. The most …

IT security threats in cloud computing sourcing model

A Rot, M Sobinska - 2013 Federated Conference on Computer …, 2013 - ieeexplore.ieee.org
New information technologies have been developing nowadays at an amazing speed,
affecting the functioning of organizations significantly. Due to the development of new …

IT security risks in modern sourcing models–cloud computing. An example

A Rot, M Sobińska - Informatyka Ekonomiczna, 2013 - ceeol.com
Information technologies have been developing nowadays at an amazing speed, affecting
the functioning of organizations. Almost all of these organisations are involved in some way …

[PDF][PDF] Schemes for verification of resources in the cloud: comparison of the cloud technology providers

P Zema - researchgate.net
Cloud technology providers differ from each other not only by the level of their computing
cloud abstraction level but also by different computing environment conditions. The most …