2019
DOI: 10.1155/2019/2509898
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard

Abstract: Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Examples of functional specifications include completed tasks, pricing policies, and services' domains [43]. Operating system catalogues, single and multiple operating systems support, and cloud services model are all included in the technical specifications [44].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Examples of functional specifications include completed tasks, pricing policies, and services' domains [43]. Operating system catalogues, single and multiple operating systems support, and cloud services model are all included in the technical specifications [44].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Adding, modifying, and deleting information can only be done by the authentic user. Unauthorized users would not be able to modify information is called integrity [2]. The system should always provide accessibility to the authentic user.…”
Section: Network Attacksmentioning
confidence: 99%
“…All these sites are now evolving as the user when he likes something he generates a data, the user as according to the legal policy of these sites compromises on his privacy as this data is being used by the developers [9]. This generated data assist them to isolate the information based on the class, likes, region, interest of the user.…”
Section: Osnsmentioning
confidence: 99%
“…They are nowadays used for making certain logic control systems to measure the performance [17]. They have been used over a long time for the development of certain adaptive systems [9].…”
Section: Fuzzy Systemsmentioning
confidence: 99%
See 1 more Smart Citation