Agent Based Public Audit for Secured Cloud Storage

Download Now
Provided by: International Journal of Advanced Computer Technology (IJACT)
Topic: Cloud
Format: PDF
Operating system kernels typically enforce lowest restrictions on the applications permissible to execute leading to the power of malicious programs to abuse system resources. Malware running as standalone processes will freely execute enjoying the privileges provided to the user account running the method. Main stream software package kernels lack a robust and reliable mechanism for distinctive the running processes and binding them to the corresponding possible applications. Method authentication is completely different from method identification.
Download Now

Find By Topic