2012 CSI Sixth International Conference on Software Engineering (CONSEG) 2012
DOI: 10.1109/conseg.2012.6349503
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(26 citation statements)
references
References 10 publications
0
26
0
Order By: Relevance
“…In the technique [9] new environment that is trusted cloud environment being used previously that is controlled by both client and the cloud admin. It is more secured one because both the admin and client cannot make any updation in the data without permission of each other.…”
Section: ____________________________________________________________mentioning
confidence: 99%
“…In the technique [9] new environment that is trusted cloud environment being used previously that is controlled by both client and the cloud admin. It is more secured one because both the admin and client cannot make any updation in the data without permission of each other.…”
Section: ____________________________________________________________mentioning
confidence: 99%
“…4 Dubey et al [5] They proposed a new cloud computing environment where we approach a trusted cloud environment which is controlled by both the client and the cloud environment admin. Their approach is mainly divided into two parts.…”
Section: Literature Surveymentioning
confidence: 99%
“…From the piece of standard enlisting the advantages of dispersed registering are: agility, lower segment cost, device independency, zone independency, and versatility [4] [5]. In any case, the security concerns are the genuine key perspectives later on circulated processing time.…”
Section: Introductionmentioning
confidence: 99%
“…There are a couple security majors are displayed in [6], [7], [8], [9], [10], [5].Virtualization, predominant enrolling are also the more conspicuous office parts of conveyed processing. Regardless, to fulfil the execution on the parallel system and keeping up the respectability is compelling [11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation