2016 10th International Conference on Intelligent Systems and Control (ISCO) 2016
DOI: 10.1109/isco.2016.7727001
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing security and privacy over multi-cloud framework using assessment techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Connectivity level is high that means network process also high. Compared with the other techniques, our method dynamically changes the network transmission and optimal path selection according to the network condition 27 .…”
Section: Introductionmentioning
confidence: 99%
“…Connectivity level is high that means network process also high. Compared with the other techniques, our method dynamically changes the network transmission and optimal path selection according to the network condition 27 .…”
Section: Introductionmentioning
confidence: 99%
“…The design scheme focused on the diverse schemes designed by diverse scholars in terms of safety by the multi-cloud implementation schemes. This designed multi-cloud framework permits the classification of prevailing techniques and to estimate the lawful features and fulfillment [14,28,34].…”
Section: Methods Of Structuring the Cloud Environmentmentioning
confidence: 99%
“…With the cloud-based services, the users must be conscious of all the information hoarded into the cloud, and the service provider must leave behind its control and safety. Moreover based on the setup of information processing to the cloud, the service provider of the cloud system acquires the fullest control on these processes [26,34].…”
Section: Development Of Confidentiality Schemementioning
confidence: 99%
See 1 more Smart Citation