Cloud security
Cloud computing is becoming popular due to its convenience and no initial capital cost to buy the physical resources. Users can conveniently use resources in the cloud such as computing resources or storage resources, in a minimum setup time. Moreover, they only need to pay for only what they use, w...
Main Author: | Hein Htet, Zaw |
---|---|
Other Authors: | School of Computer Engineering |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/59037 |
Similar Items
-
Transparent cloud storage aggregator
by: Aung, Aye Phyu Phyu
Published: (2015) -
Model of an Encrypted Cloud Relational Database Supporting Complex Predicates in WHERE Clause
by: Sidorov, Vasily, et al.
Published: (2017) -
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008) -
A study of some vulnerabilities in information security
by: Tan, Kevin Wei Loong
Published: (2021)