Network function virtualization: State-of-the-art and research challenges

R Mijumbi, J Serrat, JL Gorricho… - … surveys & tutorials, 2015 - ieeexplore.ieee.org
Network function virtualization (NFV) has drawn significant attention from both industry and
academia as an important shift in telecommunication service provisioning. By decoupling …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

A survey on cloud computing security: Issues, threats, and solutions

S Singh, YS Jeong, JH Park - Journal of Network and Computer …, 2016 - Elsevier
Over the internet, the cloud computing reveals a remarkable potential to provide on-demand
services to consumers with greater flexibility in a cost effective manner. While moving …

Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

Wearable devices in healthcare: Privacy and information security issues

L Cilliers - Health information management journal, 2020 - journals.sagepub.com
Background: Mobile health has provided new and exciting ways for patients to partake in
their healthcare. Wearable devices are designed to collect the user's health data, which can …

Enhanced QoS-based model for trust assessment in cloud computing environment

H Hassan, AI El-Desouky, A Ibrahim… - IEEE …, 2020 - ieeexplore.ieee.org
Trust management becomes an urgent requirement in the cloud environment and a trust
relationship between service user and service provider is required. Trust is the estimation of …

Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

An empirical investigation of intent to adopt mobile payment systems using a trust-based extended valence framework

AG Chin, MA Harris, R Brookshire - Information Systems Frontiers, 2022 - Springer
The purpose of this research is to assess the impact of trust, when balanced with risk and
benefit, on consumer intention to adopt mobile payment systems. A research model is …