SURVEY SOME ATTACKS ON CLIENT SIDE, BROWSER & CLOUD
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 3
Abstract
Cloud computing is not a new name in the technology world but there are many new issues arises related with cloud. Every time in consumer mind a fear rotates because he is aware from vulnerabilities related with cloud. Security of customer data is not only responsibility of service provider but consumer should also have concern about this.In this paper I cover some security issues on customer side, on browser and some important issues related with cloud.
Authors and Affiliations
Pragya singh baghel
AUTOMATIC ALGORITHM SPECIFICATION TO SOURCE CODE RANSLATION
Computers have become all-pervasive, and are being used in a variety of areas like Microbiology, Astronomy, Social Sciences and many others. In almost all these areas, algorithmic solutions to problems are common. Howeve...
Modified Pixel Sieve Method for Visual Cryptography
Visual cryptography encodes a secret image into n shares which are distributed to n participants. Pixel Sieve method was proposed recently to encode an image into shares, but the encryption quality is poor. In this paper...
DATA MINING CLASSIFICATION TECHNIQUES APPLIED FOR BREAST CANCER DIAGNOSIS AND PROGNOSIS
Breast Cancer Diagnosis and Prognosis are two medical applications pose a great challenge to the researchers. The use of machine learning and data mining techniques has revolutionized the whole process of breast cancer D...
CLUSTER–ID ROUTING SCHEME IN WIRELESS SENSOR NETWORKS
One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor netwo...
Performance Enhancement of Intrusion Detection using Neuro - Fuzzy Intelligent System
This research work aims at developing hybrid algorithms using data mining techniques for the effective enhancement of anomaly intrusion detection performance. Many proposed algorithms have not addressed their reliability...