Assessing Approaches of IT Infrastructure Audit

F Kipchuk, V Sokolov, P Skladannyi… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
The paper presents a brief overview of information security components criteria. Further
analysis of common schemas in financial and commerce sectors determining common items …

Joint optimization strategy of offloading in multi-UAVs-assisted edge computing networks

Z Jiang, R Cao, S Zhang - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Mobile edge computing (MEC) has been developed to solve the problem of insufficient
computing resource of edge user devices. However, it is common that the buildings obstacle …

Cooperative optimisation strategy of computation offloading in multi‐UAVs‐assisted edge computing networks

S Zhang, R Cao, Z Jiang - IET Communications, 2022 - Wiley Online Library
Mobile edge computing has been developed as a promising technology to extend diverse
services to the edge of the Internet of Things system. Motivated by the high flexibility and …

The Influence of Change Management Process on Cloud Transitioning

R Miyen, C Marnewick - South African Computer Journal, 2023 - journals.co.za
Technology is a dynamic field with constant changes, improvements, and new discoveries
even before anyone is fully comfortable or used to the way it was. Cloud computing has …

[PDF][PDF] A secure identity and access management framework in cloud environment based on dual-factor authentication

FM ALRUWAILI, AM MOSTAFA, O OUDA - Journal of Theoretical and …, 2022 - jatit.org
Assuring secure as well as user-convenient access to services and/or resources provided by
cloud service providers is a crucial requirement for the widespread acceptance of cloud …

Research on Data Security Access Control Mechanism in Cloud Computing Environment

C Luo, Y Li, Q Wang - International Conference on Big Data and Security, 2022 - Springer
Cloud computing is an Internet-based virtualization application model that has been in
development for these years. Cloud computing technology provides users with a large …

Security Aspects in Cloud Computing

A Jain, D Somwanshi - Security and Risk Analysis for Intelligent Cloud … - taylorfrancis.com
The main purpose is to secure user's privacy when utilising cloud computing. For users and
providers, data security and privacy in the cloud is a big issue. The user must check that the …

[PDF][PDF] CLOUD COMPUTING DATA STORAGE SECURITY FRAMEWORK AND MEASURING PARAMETERS OF DATA SECURITY

JC SEKHAR, VK PRATAP - researchgate.net
Cloud computing is next generation computing technology with the dynamic capabilities of
adding new resources and services as per user demand and requirement. Cloud security is …

Improved scheduling function for IEEE802. 15.4 E time slotted channel hopping (IM-TSCH) for wireless sensor networks

MIO Al-Lami - 2021 - openaccess.altinbas.edu.tr
The model of modern technology called the (IoT), is a global network of machines and
devices that are able to work and interact with one another. The Internet of Things is known …