Bring your own disclosure: analysing BYOD threats to corporate information

DA Flores, F Qazi, A Jhumka - 2016 IEEE Trustcom/BigDataSE …, 2016 - ieeexplore.ieee.org
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to
the organisational context, allowing employees to work using their personal devices …

A Survey on Property-Preserving Database Encryption Techniques in the Cloud

J Koppenwallner, E Schikuta - arXiv preprint arXiv:2312.12075, 2023 - arxiv.org
Outsourcing a relational database to the cloud offers several benefits, including scalability,
availability, and cost-effectiveness. However, there are concerns about the security and …

[PDF][PDF] Security Mapping of a Usage Based Cloud System.

R Kamatchi, K Ambekar, Y Parikh - Netw. Protoc. Algorithms, 2016 - researchgate.net
The popularity of cloud computing technology is increasing tremendously. There is no
disagreement about the effectiveness of the data storage and the data transition techniques …

[PDF][PDF] Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities

MA Hayat, S Islam, MF Hossain - researchgate.net
Industry heavyweights like Microsoft, Amazon, and Google are at the forefront of the
development and provision of cutting-edge and affordable cloud computing solutions …

A Gestão Estratégica de Compras utilizando a Computação em Nuvem

JG Vasconcelos, RG Moori… - … em Contabilidade e …, 2020 - editorarevistas.mackenzie.br
Este artigo tem por objetivo analisar o papel mediador da computação em nuvem na
relação entre gestão estratégica de compras e desempenho. A sua relevância está na …

Theory and practice of proactive database forensics

D Flores Armas - 2019 - wrap.warwick.ac.uk
Whilst external threats such as malware infections and SQL injection, are usually attributed
to cybercriminals (outsiders), trusted employees (insiders) with privileged access credentials …

[PDF][PDF] Disambiguating Cloud Security

TR Campbell - Proceedings on the International Conference on …, 2014 - world-comp.org
This work defines a vision paper that captures the intrusion parameters for a cloud network
operational within the author's own University environment. As a contribution a threat and …

[引用][C] Cloud Computing Security Risk Assessment: A Survey

I Khogali - Communications of the ACS, 2015