Mamidi, 2025 - Google Patents
Privacy and Security in Cloud-Based Banking: A Technical PerspectiveMamidi, 2025
View PDF- Document ID
- 14918283715731231358
- Author
- Mamidi S
- Publication year
- Publication venue
- IJSAT-International Journal on Science and Technology
External Links
Snippet
This comprehensive technical article explores the multifaceted challenges and solutions for privacy andsecurity in cloud-based banking environments. As financial institutions accelerate their digitaltransformation initiatives, they face the dual imperative of delivering …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11659048B2 (en) | Cybersecurity maturity assessment | |
Sharma | Behavioral analytics and zero trust | |
Dalal | Addressing Challenges in Cybersecurity Implementation Across Diverse Industrial and Organizational Sectors | |
Wang et al. | Security-as-a-service: a literature review | |
Das et al. | A comprehensive analysis of trust, privacy, and security measures in the digital age | |
Antwi | Threat Detection in Multi-Cloud Environments | |
Acharya | Assessing the Resilience of Adaptive Intrusion Prevention Systems in SaaS-Driven E-Retail Ecosystems | |
Ranasinghe | Multi-Dimensional Risk Analysis of Insider Threats to Confidential Data in Distributed E-Commerce Clouds | |
Basak et al. | API security risk and resilience in financial institutions | |
Mamidi | Privacy and Security in Cloud-Based Banking: A Technical Perspective | |
Haryanto | Cross-Comparative Study of Cloud-Native Security Platforms to Detect and Neutralize Insider Attacks in Online Retail | |
Dule et al. | Introduction to Internet of Things Security | |
Kadam | Cyber security breaches in corporate networks: a literature review on recent threats and their impact | |
Itodo | A novel framework for the adoption of zero trust security for small, medium and large-scale organizations | |
Rajesh et al. | Integrating Security and Compliance in Distributed Microservices Architecture | |
Olaonipekun | Securing Digital Transactions in Critical Sectors: Frameworks and Strategies | |
Alabdulhadi | Information Security and Privacy in the Cloud of Healthcare Sector, and The Use of Miter Att&ck Framework to Keep the Healthcare Secure | |
Abikoye | Development of Secure Cloud-Based Government Solutions | |
Thangaraj | The Hidden Costs of Cloud Security Based on Understanding Financial Implications for Businesses | |
Ruiz-Vanoye et al. | Strategic planning for computer science security of networks and systems in SMEs | |
Jekot et al. | IT risk assessment and penetration test: Comparative analysis of IT controls verification techniques | |
Wang et al. | An Integrated Framework for Managing Information Technology Security Uncertainty | |
Jha | Core Cybersecurity Concepts | |
Adhikari et al. | Addressing Insider Threats in Organizational Networks: Applying Access Control, Monitoring, and Policy Enforcement to Improve Information Assurance | |
Suman et al. | Cyber Risk Management in IoT Security Technologies |