Vol. 7, No. 2, 2019
Contents
- Cover Page
- Inside Cover Page
- Editorial Board
- Foreword and Editorial
- Table of Contents
- Copyright
- A Methodology for Assessing Security Vulnerability of Cloud Services
Volume 7, No. 2, 2019, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2019.7.2.01
Authors: Kwang-Kyu Seo - Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control
Volume 7, No. 2, 2019, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2019.7.2.02
Authors: Jae-Kyu Lee, You-jin Song - A Survey on Essential Strategies for Avoiding Cloud Data Leaks
Volume 7, No. 2, 2019, 8 pages,
DOI: http://dx.doi.org/10.21742/ijria.2019.7.2.03
Authors: Ch. Sudhakar, S. NagaMallik Raj - Implementation of Low Cost Memory Subsystem for Low-end IoT Devices
Volume 7, No. 2, 2019, 6 pages,
DOI: http://dx.doi.org/10.21742/ijria.2019.7.2.04
Authors: Jonghee M. Youn, Doosan Cho - A Detailed Review on Focus Areas of Cyber Security
Volume 7, No. 2, 2019, 8 pages,
DOI: http://dx.doi.org/10.21742/ijria.2019.7.2.05
Authors: N. Thirupathi Rao, Debnath Bhattacharyya