Special issue published: "Cloud Computing and Applications"
International Journal of Cloud Computing 5(3) 2016
- A broker framework for selecting secure cloud service provider using security risk approach
- Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption
- An enhanced approach for data sharing security in cloud computing
- Homomorphic encryption applied to secure storage and treatments of data in cloud
- A bio-inspired hybrid algorithm for effective load balancing in cloud computing
No comments:
Post a Comment