2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2010
DOI: 10.1109/euc.2010.114
|View full text |Cite
|
Sign up to set email alerts
|

Above the Trust and Security in Cloud Computing: A Notion Towards Innovation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…The mechanism cited in [9] is more secure than the previous scenarios. In the next section, the mechanism in [9], together with its pitfalls, will be discussed in detail.…”
Section: Proposed Mechanism "Mcsauth"mentioning
confidence: 82%
See 2 more Smart Citations
“…The mechanism cited in [9] is more secure than the previous scenarios. In the next section, the mechanism in [9], together with its pitfalls, will be discussed in detail.…”
Section: Proposed Mechanism "Mcsauth"mentioning
confidence: 82%
“…An authentication mechanism was proposed in [9] for cloud computing to avoid any misuse of cloud systems. This mechanism is said to be an improvement over SSL "Secure Socket Layer", as SSL has some fallbacks like session hijacking and Man-in-the-Middle.…”
Section: Proposed Mechanism "Mcsauth"mentioning
confidence: 99%
See 1 more Smart Citation
“…While outsourcing information to a cloud storage controlled by a cloud service provider relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved [19]. It is difficult for companies and private users to keep at all times in control the information or data they entrust to Cloud suppliers.…”
Section: Privacy Challenges Of Cloud Computing and Companies Concernsmentioning
confidence: 99%
“…Cloud computing is a model to deliver on demand computing resources with the minimal effort and management [1,2]. It is the sharing the computer resources over the internet.…”
Section: Introductionmentioning
confidence: 99%