DOI:10.20894/IJBI. Periodicity: Bi Annual. Impact Factor: SJIF:5.065 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
K.P. Soman et al, "Understanding Cloud Computing Inerabilities. Security and Privacy ,Vol.9 ,Issue 2 ,2010 View Artical
Grobaur, B., Walloschek T., Stoker E, "Cloud computing based projects using distributed architecture", International Conference on Digital Ecosystems and ,2011 View Artical
Das Gupta , "Cloud Computing Security Threats and Responses", IEEE 3rd International Conference on Communication ,2011 View Artical
Kresimir Popovic and Zeljko Hocenski, "Emerging Security Challenges in Cloud Computing", Information and Communication Technologies ,2010 View Artical
Akhil Bhel, "Information Security of Cloud Computing for Enterprises", Advances on Information Service Sciences ,2011 View Artical
Chang-Lung Tsai and Uei-Chin Li, "A survey on security issues in service delivery models of cloud computing", Journal of Network and computer Applications ,Vol.34 ,Issue 1 ,2011 View Artical
S. Subashini and V. Kavitha, "Security Guidance for Critical Areas of Focus in Cloud Computing ,2010 View Artical
, "cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis", In proceedings of the Network and Distributed Syst ,2009 View Artical
P.Vogt, F. Nentwich, N. jovanovic, E. Kirda, C.Kruegel, and G. Vigna, "A survey on Identity and Access Management in Cloud Computing", In Proceeding of International Journal of Engineer ,Vol.3 ,Issue 4 ,2014 View Artical