ПросмотрComputer Science по теме "access control"
Отображаемые элементы 1-1 из 1
-
Big Data Handling Approach for Unauthorized Cloud Computing Access
(Electronics, 2022)Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the ...2024-11-22
