Storage security

Storage security is a specialty area of security that is concerned with securing data storage systems and ecosystems and the data that resides on… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2018
010203019972018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper… (More)
  • figure 2
  • figure 4
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2012
2012
Information security is currently one of the most important issues in information systems. This concerns the confidentiality of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2012
2012
  • Punyada M. Deshmukh, Achyut S. Gughane, Priyanka L. Hasija, Supriya P. Katpale
  • 2012
IT enterprise is looking forward Cloud Computing as its next generation architecture. Services provided by this new emerging… (More)
  • figure 1.1
  • figure 5.1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so… (More)
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
2007
2007
This paper presents a design of effective cryptographic file system (ECFS) for storage services. ECFS can be used to provide the… (More)
  • figure 3.1
  • figure 3.4
  • table 4.2
  • figure 4.1
Is this relevant?
2004
2004
With the widespread use of e-business coupled with the public’s awareness of data privacy issues and recent database security… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
T hrough its open standards, the Internet set the foundation for the global community and access to resources that millions of… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?