The Academic Perspective Procedia publishes Academic Platform symposiums papers as three volumes in a year. DOI number is given to all of our papers.
Publisher : Academic Perspective
Journal DOI : 10.33793/acperpro
Journal eISSN : 2667-5862
[1] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
[2] Hourani, H., & Abdallah, M. (2018, July). Cloud computing: legal and security issues. In 2018 8th International Conference on Computer Science and Information Technology (CSIT) (pp. 13-16). IEEE.
[3] Pundkar, S. N., & Shekokar, N. (2016, March). Cloud computing security in multi-clouds using Shamir's secret sharing scheme. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 392-395). IEEE.
[4] MOHANTY, M. (2013). Secret sharing approach for securing cloud-based image processing.
[5] Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud security issues. In 2009 IEEE International Conference on Services Computing (pp. 517-520). IEEE.
[6] Morin, J. H., Aubert, J., & Gateau, B. (2012, January). Towards cloud computing SLA risk management: issues and challenges. In 2012 45th Hawaii International Conference on System Sciences (pp. 5509-5514). IEEE.
[7] Shirvani, M. H. (2018, July). Web Service Composition in multi-cloud environment: A bi-objective genetic optimization algorithm. In 2018 Innovations in Intelligent Systems and Applications (INISTA) (pp. 1-6). IEEE.
[8] Popović, K., & Hocenski, Ž. (2010, May). Cloud computing security issues and challenges. In The 33rd international convention mipro (pp. 344-349). IEEE.
[9] Aksakallı, İ. K. (2019). Bulut Bilişimde Güvenlik Zafiyetleri, Tehditleri ve Bu Tehditlere Yönelik Güvenlik Önerileri. Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 5(1), 8-34.
[10] Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92, 128-135.
[11] Khorshed, M. T., Ali, A. S., & Wasimi, S. A. (2012). A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation computer systems, 28(6), 833-851.
[12] Kaul, A., Tuli, S., & Jain, R. (2014, March). Combining encryption and stego-Object processing: A new direction in cloud security. In 2014 Conference on IT in Business, Industry and Government (CSIBIG) (pp. 1-4). IEEE.
[13] Arda, D. (2011). Kodlama teorisinin kriptografik açıdan incelenmesi, PhD Thesis
[14] Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612-613.
[15] Alam, M. K. (2013). An approach secret sharing algorithm in cloud computing security over single to multi clouds.
[16] Tompa, M., & Woll, H. (1989). How to share a secret with cheaters. journal of Cryptology, 1(3), 133-138.
[17] Alsolami, F., & Boult, T. E. (2014, April). CloudStash: using secret-sharing scheme to secure data, not keys, in multi-clouds. In 2014 11th International Conference on Information Technology: New Generations (pp. 315-320). IEEE.