Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/397835
Title: | Modeling efficient data verification and threat identification strategies for establishing security in cloud computing |
Researcher: | Kavitha K |
Guide(s): | Punithavalli M |
Keywords: | Engineering and Technology Computer Science Computer Science Software Engineering |
University: | Bharathiar University |
Completed Date: | 2021 |
Abstract: | newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/397835 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 86.07 kB | Adobe PDF | View/Open |
02_declaration.pdf | 33.74 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 3.89 MB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 35 kB | Adobe PDF | View/Open | |
05_content.pdf | 35.89 kB | Adobe PDF | View/Open | |
06_list of graph and table.pdf | 42.07 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 41.96 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 679.77 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 83.93 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 1.02 MB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 767.13 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 0 B | Adobe PDF | View/Open | |
13_chapter 6.pdf | 664.22 kB | Adobe PDF | View/Open | |
14_chapter 7.pdf | 1.31 MB | Adobe PDF | View/Open | |
15_chapter 8.pdf | 211.24 kB | Adobe PDF | View/Open | |
16_chapter 9.pdf | 40.8 kB | Adobe PDF | View/Open | |
17_references.pdf | 92.92 kB | Adobe PDF | View/Open | |
18_appendix.pdf | 512.88 kB | Adobe PDF | View/Open | |
19_abbreviations.pdf | 45.04 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 126.65 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: