2018
DOI: 10.14419/ijet.v7i1.7.10632
|View full text |Cite
|
Sign up to set email alerts
|

Secured cryptographic data model for cloud

Abstract: Cloud computing turns into the cutting edge engineering of IT Enterprise. Cloud essential key thought is to move the whole information models into the server farms where the portability and administration of information isn't completely reliable. The principle challenge in the cloud is the client information and framework application information is gotten to from the cloud supplier's premises; even security arrangements sent in the premises don't take care of the demand of the clients where the need differs. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…JADE has specific functions for simulation purposes (i.e., time synchronization, interaction, coordination, and communication between agents, etc.) (Weir Ying et al, 2009;Kumar et al, 2013;Prakash et al, 2014).…”
Section: Platforms and Toolsmentioning
confidence: 99%
“…JADE has specific functions for simulation purposes (i.e., time synchronization, interaction, coordination, and communication between agents, etc.) (Weir Ying et al, 2009;Kumar et al, 2013;Prakash et al, 2014).…”
Section: Platforms and Toolsmentioning
confidence: 99%