[PDF][PDF] Implementation of user authentication as a service for cloud network

M Shah, AS Shah, I Ijaz - International Journal of Grid and …, 2016 - researchgate.net
There are so many security risks for the users of cloud computing, but still the organizations
are switching towards the cloud. The cloud provides data protection and a huge amount of …

[PDF][PDF] Critical Analysis of Cloud Computing Software Development Process Models

A Khan, M Fayaz, AS Shah, F Wahid - International Journal of …, 2016 - academia.edu
Nowadays, every vendor and IT service provider wants to switch into a cloud environment
for better Quality of Service (QoS), Scalability, Performance and reasonable Cost. Many …

Personalization, Screen design and E-learning System Acceptance: An Empirical Analysis

A Burdi, FH Chandio, MS Abbasi… - 2019 IEEE 6th …, 2019 - ieeexplore.ieee.org
In The study investigates Personalization, Screen design and E-learning System
Acceptance through a modified technology acceptance model. Electronic learning (E …