69 results on '"Imad M. Abbadi"'
Search Results
2. Approaches for Zero Trust Adoption Based upon Organization Security Level.
3. Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles.
4. Expanding DevSecOps Practices and Clarifying the Concepts within Kubernetes Ecosystem.
5. Approaches for Zero Trust Adoption Based upon Organization Security Level
6. Clouds Trust Anchors.
7. Dynamics of trust in Clouds - Challenges and research agenda.
8. Insiders analysis in Cloud computing focusing on home healthcare system.
9. Middleware Services at Cloud Application Layer.
10. Clouds' Infrastructure Taxonomy, Properties, and Management Services.
11. Operational trust in Clouds' environment.
12. Secure Virtual Layer Management in Clouds.
13. Defining and Analyzing Insiders and Their Threats in Organizations.
14. Toward Trustworthy Clouds' Internet Scale Critical Infrastructure.
15. Middleware Services at Cloud Virtual Layer.
16. Replay Attack of Dynamic Rights within an Authorised Domain.
17. Preventing Insider Information Leakage for Enterprises.
18. Sharing but Protecting Content Against Internal Leakage for Organisations.
19. Software Licence Protection and Management for Organisations.
20. DRM domain authentication using electronic payment systems.
21. Preventing information leakage between collaborating organisations.
22. Digital Rights Management Using a Master Control Device.
23. Digital rights management using a mobile phone.
24. Towards Trustworthy Resource Scheduling in Clouds.
25. A framework for establishing trust in Cloud provenance.
26. Cloud Management and Security
27. A framework for establishing trust in the Cloud.
28. Trust in the Cloud.
29. Secure information sharing for grid computing.
30. Challenges for Provenance in Cloud Computing.
31. Towards Trustworthy Resource Scheduling in Clouds
32. Towards Trustworthy Resource Scheduling in Clouds (to appear)
33. Software Licence Protection and Management for Organisations
34. Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
35. Challenges for Establishing Trust in Clouds
36. Cloud Structure
37. Clouds Chains of Trust
38. Provenance in Clouds
39. Automated Management Services
40. Real-Life Examples
41. Establishing Trust in Clouds
42. Cloud Properties
43. Fundamentals of Cloud Management
44. A framework for establishing trust in Cloud provenance
45. TClouds: Privacy and Resilience for Internet−scale Critical Infrastructures
46. Trustworthy middleware services in the cloud
47. Trust in the cloud
48. Secure information sharing for grid computing
49. Preventing Information Leakage between Collaborating Organisations
50. DRM Domain Authentication using Electronic Payment Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.