2020
DOI: 10.32604/cmc.2020.011232
|View full text |Cite
|
Sign up to set email alerts
|

Information Flow Security Models for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Table 13 in the following subsection provides a brief note on the different works published recently to avoid the network attacks 104 . This gives a basic overview of what technologies and frameworks they have used in their work.…”
Section: Security and Challenges In Iot And Iiot Systemsmentioning
confidence: 99%
“…Table 13 in the following subsection provides a brief note on the different works published recently to avoid the network attacks 104 . This gives a basic overview of what technologies and frameworks they have used in their work.…”
Section: Security and Challenges In Iot And Iiot Systemsmentioning
confidence: 99%
“…Vulnerability is the cause and premise of network security risks. According to the feature system of network security data element, if the security and stability of the transmission environment cannot be guaranteed in the process of data transmission, the vulnerability of the network will lead to a direct impact on the integrity and authenticity of the data [3,4]. One of the methods to analyze network vulnerability is to analyze and measure the network information security vulnerability, and determine the information security vulnerability and the severity of the vulnerability [5,6].…”
Section: Introductionmentioning
confidence: 99%