Author of the publication

An Automated Methodology for Secured User Allocation in Cloud.

, , and . SSCC, volume 625 of Communications in Computer and Information Science, page 137-151. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain based Secured Virtual Machine Image Monitor., , and . ICISSP, page 432-439. SCITEPRESS, (2021)Hyperledger based Verifiable and Secure Cloud Data Deletion., , , and . INFOCOM Workshops, page 1-6. IEEE, (2023)A cloud based autonomous multipurpose system with self-communicating bots and swarm of drones., , , , , , , , , and 2 other author(s). CCWC, page 649-653. IEEE, (2018)A Novel Software Defined Security Framework for SDN., , , , , and . CRiSIS, volume 14529 of Lecture Notes in Computer Science, page 216-230. Springer, (2023)A low cost fully autonomous GPS (Global Positioning System) based quad copter for disaster management., , , , , , , , , and 1 other author(s). CCWC, page 654-660. IEEE, (2018)Cloud computing security challenges & solutions-A survey., , , , , , , , and . CCWC, page 347-356. IEEE, (2018)A Quantitative Methodology for Cloud Security Risk Assessment., , and . CLOSER, page 92-103. SciTePress, (2017)An Automated Methodology for Secured User Allocation in Cloud., , and . SSCC, volume 625 of Communications in Computer and Information Science, page 137-151. Springer, (2016)