X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (7451) 7451
Newspaper Article (4870) 4870
Book / eBook (2188) 2188
Conference Proceeding (1502) 1502
Transcript (1025) 1025
Report (922) 922
Trade Publication Article (812) 812
Publication (679) 679
Magazine Article (673) 673
Government Document (567) 567
Book Chapter (526) 526
Newsletter (221) 221
Web Resource (102) 102
Dissertation (77) 77
Book Review (51) 51
Paper (26) 26
Reference (17) 17
Data Set (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cloud computing (3445) 3445
computer security (3308) 3308
security (3244) 3244
security management (2442) 2442
network security (2187) 2187
data security (2095) 2095
internet (1910) 1910
privacy (1718) 1718
safety and security measures (1690) 1690
computer science (1542) 1542
computer science, information systems (1387) 1387
analysis (1336) 1336
information technology (1283) 1283
national security (1266) 1266
software (1228) 1228
telecommunications (1081) 1081
securities industry (1055) 1055
access control (1050) 1050
management (985) 985
internet of things (946) 946
security services (946) 946
acquisitions & mergers (911) 911
data encryption (911) 911
computer information security (889) 889
methods (844) 844
electronic books (840) 840
computers (822) 822
data integrity (814) 814
securities analysis (794) 794
capital formation (781) 781
algorithms (758) 758
automation (755) 755
computer communication networks (745) 745
securities offerings (740) 740
venture capital (736) 736
private equity (735) 735
equity stake (732) 732
computer networks (731) 731
conferences, meetings and seminars (680) 680
computer science, theory & methods (679) 679
stock exchanges (661) 661
security measures (658) 658
infrastructure (657) 657
computer software industry (644) 644
studies (636) 636
engineering, electrical & electronic (631) 631
united states (619) 619
research (606) 606
compliance (605) 605
cyberterrorism (603) 603
engineering (564) 564
big data (553) 553
computer science, software engineering (549) 549
artificial intelligence (542) 542
foreign relations (538) 538
customer services (537) 537
securities markets (533) 533
corporate profiles (520) 520
wireless networks (511) 511
statistical data (506) 506
information systems (497) 497
networks (496) 496
usage (483) 483
cybersecurity (471) 471
laws, regulations and rules (467) 467
encryption (464) 464
earnings per share (461) 461
authentication (457) 457
cryptography (453) 453
present value (451) 451
international relations (447) 447
political science (446) 446
history (440) 440
risk management (430) 430
social networks (427) 427
technology (427) 427
computer science, hardware & architecture (424) 424
information management (420) 420
cyber security (415) 415
profit margins (405) 405
standards (404) 404
product introduction (399) 399
sensors (393) 393
terrorism (389) 389
servers (386) 386
computation (381) 381
data protection (379) 379
security systems (372) 372
mathematical models (369) 369
systems and data security (366) 366
communications engineering, networks (364) 364
protection (360) 360
medical device industry (356) 356
collaboration (352) 352
index medicus (350) 350
banking industry (349) 349
computer centers (349) 349
communication (347) 347
internet crime (347) 347
trust (339) 339
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (1092) 1092
UofT at Mississauga - Stacks (283) 283
Collection Dvlpm't (Acquisitions) - Vendor file (255) 255
Trinity College (John W Graham) - Stacks (210) 210
UofT at Scarborough - Stacks (192) 192
UTL at Downsview - May be requested (189) 189
Online Resources - Online (114) 114
Law (Bora Laskin) - Stacks (81) 81
St. Michael's College (John M. Kelly) - 2nd Floor (73) 73
Engineering & Comp. Sci. - Stacks (62) 62
Victoria University E.J. Pratt - Stacks (58) 58
Collection Dvlpm't (Acquisitions) - Closed Orders (54) 54
Gerstein Science - Stacks (45) 45
Criminology - Stacks (21) 21
OISE - Stacks (15) 15
New College (Ivey) - Stacks (14) 14
University College (Laidlaw) - Stacks (14) 14
Trinity College (John W Graham) - Storage (13) 13
Faculty of Information - Stacks (12) 12
Indust. Rel's & Hum. Resources (Newman) - Library use only (9) 9
Architecture Landscape (Shore + Moffat) - Stacks (7) 7
Robarts - Not Returned (5) 5
Trinity College (John W Graham) - Reference (5) 5
Knox College (Caven) - Stacks (4) 4
Robarts - Library use only (4) 4
Thomas Fisher Rare Book - Rare Book (4) 4
UofT at Scarborough - Withdrawn (4) 4
Robarts - Government Pubs (3) 3
UofT at Mississauga - Reference (3) 3
UofT at Scarborough - May be requested in 6-10 wks (3) 3
Victoria University Emmanuel College - Stacks (3) 3
Aerospace - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (2) 2
Business (Joseph L Rotman) - Stacks (2) 2
Earth Sciences (Noranda) - Stacks (2) 2
Engineering & Comp. Sci. - May be requested in 6-10 wks (2) 2
Holland Bloorview Kids Rehabilitation - Stacks (2) 2
Richard Charles Lee Canada-Hong Kong - Library use only (2) 2
Robarts - Reference (2) 2
Royal Ontario Museum - Stacks (2) 2
UofT at Mississauga - Missing (2) 2
Astronomy & Astrophysics - Ask at library (1) 1
Collection Dvlpm't (Acquisitions) - On order (1) 1
Collection Dvlpm't (Acquisitions) - Stacks (1) 1
Credit Valley Hospital - Stacks (1) 1
East Asian (Cheng Yu Tung) - Course Reserves (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Engineering & Comp. Sci. - Processing (1) 1
Humber River Regional Hospital - Church Stacks (1) 1
Innis College - Searching (1) 1
Lakeridge Health Sciences - Oshawa (1) 1
Law (Bora Laskin) - Law Faculty Library (1) 1
Map & Data - Map Collection (1) 1
Markham Stouffville Hospital - Stacks (1) 1
Music - Stacks (1) 1
OISE - Curriculum Resources (1) 1
OISE - Material is damaged (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Providence Healthcare - Reference (1) 1
Providence Healthcare - Stacks (1) 1
Regis College - Stacks (1) 1
Robarts - Petro Jacyk (1) 1
Robarts - Processing (1) 1
Robarts - Rare Book (1) 1
Robarts - Storage (1) 1
Royal Ontario Museum - Reference (1) 1
Scarborough Hospital - Birchmount (1) 1
St. Michael's College (John M. Kelly) - 3rd Floor (1) 1
Stacks (1) 1
Trillium Health Centre - Stacks (1) 1
Trinity College (John W Graham) - Oversize (1) 1
United Church of Canada Archives - Reference (1) 1
University College (Laidlaw) - May be requested in 6-10 wks (1) 1
UofT Schools - Stacks (1) 1
UofT at Mississauga - Not returned (1) 1
UofT at Scarborough - Processing (1) 1
Victoria University E.J. Pratt - Internal dept (1) 1
Victoria University E.J. Pratt - Reference (1) 1
Victoria University E.J. Pratt - Storage (1) 1
West Park Healthcare Centre - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (20195) 20195
Portuguese (69) 69
Spanish (43) 43
German (33) 33
Chinese (17) 17
French (15) 15
Japanese (8) 8
Czech (7) 7
Turkish (5) 5
Italian (3) 3
Korean (3) 3
Russian (3) 3
Dutch (2) 2
Lithuanian (2) 2
Polish (2) 2
Slovenian (2) 2
Arabic (1) 1
Danish (1) 1
Romanian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computer Communications, ISSN 0140-3664, 08/2019, Volume 144, pp. 124 - 131
In today’s cloud computing platforms, more and more users are now working or collaborating in the multi-cloud environment, in which collaborators, clouds,... 
Reliability | Secure cloud computing | Trust management | INTRUSION DETECTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTING SECURITY | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Annales des Telecommunications/Annals of Telecommunications, ISSN 0003-4347, 06/2017, Volume 72, Issue 5-6, pp. 325 - 333
Cloud computing has attained tremendous popularity recently, leading to its fast and rapid deployment. However, privacy and security concerns have also... 
Security and management framework for cloud | Security for cloud | Security requirements for cloud environment | Security framework for cloud | TELECOMMUNICATIONS | PRIVACY | Cloud computing | Safety and security measures | Security management | Virtual computer systems | Analysis
Journal Article
2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), ISSN 1550-445X, 03/2017, pp. 1154 - 1161
Cloud computing is an emerging economic model that provides a broad network access to services with many benefits to many tenants at the same time. Although it... 
Context | Cloud computing | Computational modeling | Standards organizations | Organizations | Risk management | Security
Conference Proceeding
2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), ISSN 1550-445X, 03/2017, pp. 1146 - 1153
In today's cloud computing platforms, more and more users are now working or collaborating in multi-cloud environment, in which collaborators, clouds,... 
Measurement | Computers | Cloud computing | Organizations | Gaussian distribution | Mathematical model | Security | Trust management | secure cloud computing | Secure cloud computing
Conference Proceeding
Journal of Risk and Financial Management, ISSN 1911-8074, 04/2017, Volume 10, Issue 2, p. 10
Managing risks is of paramount importance for enabling a widespread adoption of cloud computing. Users need to understand the risks associated with the process... 
Access control | Privacy | Cloud computing | Security management | Confidentiality | Decision making | Risk management | Software engineering
Journal Article
International Journal of Grid and Utility Computing, ISSN 1741-847X, 2016, Volume 7, Issue 3, pp. 219 - 235
Journal Article
International Journal of Computer Science and Information Security, 08/2016, Volume 14, Issue 8, p. 47
  Cloud computing is growing significantly day by day, and has created a shift in the IT industry. It brings several advantages to consumers by delivering... 
Cloud computing | Data encryption | Risk assessment | Consumers | Third party | Network security | Internet | Risk management | Computer security
Journal Article
International Journal of Computer Science and Information Security, 08/2016, Volume 14, Issue 8, pp. 47 - 47
Cloud computing is growing significantly day by day, and has created a shift in the IT industry. It brings several advantages to consumers by delivering... 
Networks | Cloud computing | Risk assessment | Organizations | Consumers | Architecture (computers) | Risk management | Computer information security
Journal Article
Applied Mechanics and Materials, ISSN 1660-9336, 2014, Volume 641-642, pp. 1299 - 1302
Based on the analysis of cloud computing safety, this paper focused on the data security problems in the cloud computing, and put forward a key management... 
Data security | Cloud computing | Key management
Conference Proceeding
Computers & Security, ISSN 0167-4048, 06/2018, Volume 75, pp. 59 - 71
Security is still one of the main barriers discouraging companies and businesses which deal with sensitive information and confidential data from migrating... 
Service selection | Security evaluation | Standard Security-SLA | Security-SLA monitoring | Security-SLA optimization | COMPUTER SCIENCE, INFORMATION SYSTEMS | Brokers | Cloud computing | Safety and security measures
Journal Article
Computers & Security, ISSN 0167-4048, 06/2018, Volume 75, p. 59
Security is still one of the main barriers discouraging companies and businesses which deal with sensitive information and confidential data from migrating... 
Studies | Cloud computing | Multiple objective analysis | Security management | Customer services | Computer simulation | Computation | Standardization | Pareto optimization | Computer security | Service level agreements
Journal Article
International Journal of Distributed Systems and Technologies, ISSN 1947-3532, 01/2012, Volume 3, Issue 1, pp. 17 - 34
Journal Article
2011 IEEE 4th International Conference on Cloud Computing, ISSN 2159-6182, 07/2011, pp. 364 - 371
Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the... 
Cloud computing | cloud computing security | Computational modeling | Process control | Collaboration | Security | Standards | Monitoring | cloud computing security management | Cloud computing security | Cloud computing security management
Conference Proceeding
Future Internet, ISSN 1999-5903, 09/2019, Volume 11, Issue 9, p. 195
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for... 
Management methods | Enterprise risk management | Cloud computing | Security management | Decision making | Risk assessment | Internet | Risk management | Methods | risk management | ERM | Microsoft Azure | cloud computing | OCTAVE
Journal Article
IEEE 10th International Conference on Industrial Informatics, ISSN 1935-4576, 07/2012, pp. 852 - 856
Cloud computing allows for organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital... 
security management | Cloud computing | risk assessment | framework | Standards organizations | ISO standards | Information security | cloud service | Organizations | cloud computing
Conference Proceeding
Jisuanji Yingyong Yanjiu / Application Research of Computers, ISSN 1001-3695, 03/2013, Volume 30, Issue 3, pp. 909 - 912
This paper analyzed the special security requirement of cloud computing key management, and built the cloud computing key management framework based on XKMS.... 
Cloud computing | Architecture (computers) | Mathematical models | Management | Computer information security | Modules
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.