Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Fuzzy User Access Trust Model for Cloud Access Control

    Aakib Jawed Khan*, Shabana Mehfuz

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 113-128, 2023, DOI:10.32604/csse.2023.023378

    Abstract Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hijacking, advanced persistent threats, data threats, and many more are certain security issues with the cloud platform. APIs and service providers face a… More >

Displaying 1-10 on page 1 of 1. Per Page