Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-01860-z
Abstract: Cloud service provide the information security to protect the data using broad set of privacy policies and controls. Various security mechanisms concentrates the reality of key leakage issues to deal the security policy. The problem…
read more here.
Keywords:
proactive security;
security encryption;
encryption standard;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3062204
Abstract: The multi-tenancy in a cloud along with its dynamic and self-service nature could cause severe security concerns, such as isolation breaches among cloud tenants. To mitigate such concerns and ensure the accountability and transparency of…
read more here.
Keywords:
auditing system;
proactive security;
security;
cloud ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3208574
Abstract: Proactive security-constrained unit commitment (SCUC) is one of the effective resilience-oriented responses to keep the secure operation of the power system during natural disasters. The approaches proposed in the previous research works cannot guarantee high-quality…
read more here.
Keywords:
unit commitment;
security constrained;
constrained unit;
typhoon ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Software Engineering"
DOI: 10.1109/tse.2021.3119721
Abstract: Security by design is a recommended approach, addressing end-to-end security and privacy in the design of software systems. To realize this approach, proactive security behavior is required from software developers. This research follows results from…
read more here.
Keywords:
software;
security behavior;
proactive security;
design ... See more keywords