X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cloud computing (27) 27
computer science, software engineering (16) 16
computer science, theory & methods (13) 13
analysis (12) 12
security (11) 11
computer science (9) 9
computer science, information systems (9) 9
telecommunications (8) 8
computer security (7) 7
algorithms (6) 6
computer science, hardware & architecture (6) 6
computer science, interdisciplinary applications (6) 6
internet (6) 6
internet of things (6) 6
outsourcing (6) 6
privacy (6) 6
authentication (5) 5
big data (5) 5
computation (5) 5
data integrity (5) 5
energy consumption (5) 5
edge computing (4) 4
engineering, electrical & electronic (4) 4
information security (4) 4
information storage and retrieval (4) 4
networks (4) 4
optimization (4) 4
things (4) 4
access control (3) 3
communication (3) 3
computer architecture (3) 3
computer simulation (3) 3
data centers (3) 3
fog computing (3) 3
mobile cloud computing (3) 3
openflow (3) 3
remote data auditing (3) 3
research (3) 3
routing (3) 3
sensors (3) 3
signatures (3) 3
smart cities (3) 3
software (3) 3
software defined networks (3) 3
storage (3) 3
studies (3) 3
virtualization (3) 3
wireless sensor networks (3) 3
ad hoc networks (2) 2
algorithm (2) 2
architecture (2) 2
big data storage (2) 2
cellular networks (2) 2
checking (2) 2
cloud (2) 2
cloud-computing (2) 2
communications traffic (2) 2
computational modeling (2) 2
computer and information sciences (2) 2
computer networks (2) 2
computer science, artificial intelligence (2) 2
computer storage devices (2) 2
control systems (2) 2
data privacy (2) 2
data security (2) 2
data- och informationsvetenskap (2) 2
deterrence (2) 2
distribuerade datorsystem (2) 2
efficient (2) 2
electronic devices (2) 2
fog (2) 2
index medicus (2) 2
integrity (2) 2
management (2) 2
media and communication technology (2) 2
medicine (2) 2
medieteknik (2) 2
methods (2) 2
mobile computing (2) 2
mobile devices (2) 2
model (2) 2
models, theoretical (2) 2
multidisciplinary sciences (2) 2
natural sciences (2) 2
naturvetenskap (2) 2
network virtualization (2) 2
object recognition (2) 2
policy compliance (2) 2
proxy re-encryption (2) 2
real-time systems (2) 2
research article (2) 2
resource allocation (2) 2
retrieval (2) 2
risk (2) 2
routers (2) 2
safety and security measures (2) 2
science (2) 2
servers (2) 2
software protection (2) 2
surveys (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Network and Computer Applications, ISSN 1084-8045, 04/2014, Volume 40, Issue 1, pp. 325 - 344
Journal Article
International Journal of Computers and Applications, ISSN 1206-212X, 04/2020, Volume 42, Issue 3, pp. 213 - 215
Journal Article
Information Sciences, ISSN 0020-0255, 02/2017, Volume 380, pp. 101 - 116
Cloud computing has emerged as a new computing paradigm that offers great potential for storing data remotely. Presently, many organizations have reduced the... 
Cloud computing | Big data storage | Data integrity | Remote data auditing | Data dynamic | SOFTWARE PROTECTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | Information storage and retrieval | Data security | Analysis | Big data | Outsourcing | Computer storage devices
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2017, Volume 19, Issue 4, pp. 2662 - 2680
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2019, Volume 21, Issue 2, pp. 1718 - 1743
With recent advances of information and communication technology, smart city has been emerged as a new paradigm to dynamically optimize the resources in cities... 
Access control | Privacy | Data privacy | security | Smart cities | Sensors | Internet of Things | cloud computing | big data | Cloud Computing | Big Data | Security | ACCESS-CONTROL | KEY MANAGEMENT | BIG DATA-STORAGE | INTERNET | CLOUD | COMPUTER SCIENCE, INFORMATION SYSTEMS | privacy | NETWORKS | TELECOMMUNICATIONS | DATA ANALYTICS FRAMEWORK | AUTHENTICATION | THINGS | ADVANCED METERING INFRASTRUCTURE
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 02/2018, Volume 56, Issue 2, pp. 144 - 149
Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and... 
Access control | Cloud computing | Computational modeling | Task analysis | Computer architecture | Edge computing | TELECOMMUNICATIONS | INTERNET | THINGS | ENGINEERING, ELECTRICAL & ELECTRONIC | Computer-generated environments | Research | Computer simulation | Security management | Computation | Computer security
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 05/2018, Volume 29, Issue 5, pp. 999 - 1012
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 04/2019, Volume 31, Issue 8, pp. e5164 - n/a
Journal Article
Information Sciences, ISSN 0020-0255, 05/2018, Volume 444, pp. 187 - 187
This article has been retracted at the request of the Editor-in-Chief due to excessive overlap  with the publication authored by the same authors and entitled... 
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 06/2015, Volume 52, pp. 52 - 68
Journal Article
Information Sciences, ISSN 0020-0255, 02/2017, Volume 380, pp. 101 - 116
This article has been withdrawn at the request of the author(s) and/or editor. The Publisher apologizes for any inconvenience this may cause. The full Elsevier... 
Information storage and retrieval | Cloud computing | Big data | Data security | Computer storage devices
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 07/2017, Volume 72, pp. 273 - 287
With the thriving growth of the cloud computing, the security and privacy concerns of outsourcing data have been increasing dramatically. However, because of... 
Access control | Cloud computing | Attribute-based encryption | Thematic taxonomy | STORAGE | REVOCATION | CRYPTOGRAPHY | MULTI-AUTHORITY | AUTHENTICATION | SECURE | SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | PROXY RE-ENCRYPTION | SCHEMES | Control systems | Analysis
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2015, Volume 47, Issue 4, pp. 1 - 34
Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely... 
replication | network coding | erasure coding | cloud computing | Remote data auditing | Network coding | Cloud computing | Replication | Remote Data Auditing | Erasure coding | STORAGE | Security | DATA POSSESSION | INTEGRITY | ARCHITECTURE | COMPUTER SCIENCE, THEORY & METHODS | CHECKING | Reliability | Performance | Surveys | Information storage and retrieval | Outsourcing
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 08/2014, Volume 43, pp. 121 - 141
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 08/2019, Volume 97, pp. 587 - 597
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that... 
Deterrence | Employee | Organisation | Motivation | Information security | Insider | Risk | Employee motivation | Models | Safety and security measures | Analysis
Journal Article
Computers & Security, ISSN 0167-4048, 09/2015, Volume 53, pp. 65 - 78
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which many businesses simply cannot operate. However,... 
Risk | Conscious care behaviour | Organization policy | Information security | Awareness | SELF-EFFICACY | PROTECTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | MODEL | CYBER SECURITY | IMPACT | INTENTION | USERS | TRUST | POLICY COMPLIANCE | Information science | Cyberterrorism | Analysis
Journal Article