2012
DOI: 10.2478/cait-2012-0009
|View full text |Cite
|
Sign up to set email alerts
|

Secured Multi-Cloud Virtual Infrastructure with Improved Performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…To validate the performance of our framework, we compared its results with other existing methods in terms of detecting attackers at the user authentication level [26][27][28][29][30][31][32][33][34]. The results were compared based on cryptology at the identification level, and on the validity of responses to user requests.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To validate the performance of our framework, we compared its results with other existing methods in terms of detecting attackers at the user authentication level [26][27][28][29][30][31][32][33][34]. The results were compared based on cryptology at the identification level, and on the validity of responses to user requests.…”
Section: Discussionmentioning
confidence: 99%
“…Currently we can compare our system with some other mechanisms mentioned in section three, namely [26][27][28][29][30][31][32][33][34] (see Table 2). This table compares these systems with ours in terms of data security, availability, complexity and risk.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The author performs a detailed survey on the stage in which the part of collaboration can be performed. In [5], the problem currency exchange in the cloud has been analyzed. The method adapts the linear regression model to predict the currency rate prediction according to the data present in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…The various methodologies and schemes are proposed to secure the cloud infrastructure in [1][2][3][4]. The users in wireless LAN are authenticated using Service set identifier [5] and based on the behaviour of the existing users credits are assigned to authorize them to access the cloud resources [6].…”
Section: Related Workmentioning
confidence: 99%