2016
DOI: 10.19101/ijacr.2016.626005
|View full text |Cite
|
Sign up to set email alerts
|

Review of solutions for securing end user data over cloud applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…On the off chance that encryption and pressure are done in the meantime then it requires less preparing investment and more speed. 9 [33] Review of solutions for securing end user data They identified end users data security issues when using cloud computing services. It can be addressed using public key cryptography or public key infrastructure (PKI).…”
Section: S No Referencementioning
confidence: 99%
“…On the off chance that encryption and pressure are done in the meantime then it requires less preparing investment and more speed. 9 [33] Review of solutions for securing end user data They identified end users data security issues when using cloud computing services. It can be addressed using public key cryptography or public key infrastructure (PKI).…”
Section: S No Referencementioning
confidence: 99%