Semantic Scholar uses AI to extract papers important to this topic.
In data communication network, one of the ideal network procedures is to transmit files securely from sender to a receiver… Expand Cloud computing is a sort of computing that is contingent on distribution computing resources preceding having innate servers or… Expand The cloud is an attractive technology which led, in record time, to an unprecedented fascination. It is currently one of the… Expand The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more… Expand After analyzing and quantifying the network information security elements: confidentiality, integrity and availability, this… Expand Researches in the development of efficient security models, policies and standards for the Android platform has increased… Expand We introduce a mechanism for the verification of real-time integrity policies about the operation of a distributedsystem. Our… Expand This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy… Expand The security of disaster management systems is a serious concern because of the sensitive and complex nature of this domain. It… Expand The world's businesses, industries, and governments are beginning to rely on computer networks for timely transmission of… Expand