Amanote Research

Amanote Research

    RegisterSign In

Data Protection Techniques for Building Trust in Cloud Computing

International Journal of Modern Education and Computer Science
doi 10.5815/ijmecs.2015.08.05
Full Text
Open PDF
Abstract

Available in full text

Date

August 8, 2015

Authors
Muhammad Yousaf SaeedM.N.A. Khan
Publisher

MECS Publisher


Related search

Soft Computing Techniques for Big Data and Cloud Computing

Soft Computing
GeometrySoftwareTheoretical Computer ScienceTopology
2020English

Trust Issues in Cloud Computing

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

A Model for User Trust in Cloud Computing

International Journal on Cloud Computing: Services and Architecture
2012English

Security and Trust in Cloud Computing

Advances in Information Security, Privacy, and Ethics
2017English

A Method for User Data Protection Based on Game Theory in Cloud Computing

2017English

Application of Data Mining Techniques in Cloud Computing: A Literature Review

Pamukkale University Journal of Engineering Sciences
2018English

A Trust-Based Defensive System Model for Cloud Computing

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

SecEDMO: Enabling Efficient Data Mining With Strong Privacy Protection in Cloud Computing

IEEE Transactions on Cloud Computing
Information SystemsComputer NetworksHardwareCommunicationsComputer Science ApplicationsArchitectureSoftware
2019English

Data Security in Cloud Computing

2017English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy