2016
DOI: 10.19101/ijatee.2016.319004
|View full text |Cite
|
Sign up to set email alerts
|

Security of text data outsourcing in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 24 publications
(23 reference statements)
0
1
0
Order By: Relevance
“…6 [30] Text data outsourcing They have explored and analysis's different security breaches in cloud Computing. They have discussed data security along with the access control and authorization and suggest some suggestions.…”
Section: [29]mentioning
confidence: 99%
“…6 [30] Text data outsourcing They have explored and analysis's different security breaches in cloud Computing. They have discussed data security along with the access control and authorization and suggest some suggestions.…”
Section: [29]mentioning
confidence: 99%