
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security and privacy concerns in cloud-based scientific and business workflows: A systematic review
Nafiseh Soveizi, Fatih Türkmen, Dimka Karastoyanova
Future Generation Computer Systems (2023) Vol. 148, pp. 184-200
Open Access | Times Cited: 25
Nafiseh Soveizi, Fatih Türkmen, Dimka Karastoyanova
Future Generation Computer Systems (2023) Vol. 148, pp. 184-200
Open Access | Times Cited: 25
Showing 25 citing articles:
Security challenges for workflow allocation model in cloud computing environment: a comprehensive survey, framework, taxonomy, open issues, and future directions
Mahfooz Alam, Mohammad Shahid, Suhel Mustajab
The Journal of Supercomputing (2024) Vol. 80, Iss. 8, pp. 11491-11555
Closed Access | Times Cited: 10
Mahfooz Alam, Mohammad Shahid, Suhel Mustajab
The Journal of Supercomputing (2024) Vol. 80, Iss. 8, pp. 11491-11555
Closed Access | Times Cited: 10
The Implementation Strategy of Cost Control and the Construction of a Guarantee Model of Financial BPO in the Cloud Computing Environment
Weigang Zhong, Lihong Zhao, Qiaomei Dou
International Journal of Information System Modeling and Design (2025) Vol. 16, Iss. 1, pp. 1-21
Open Access
Weigang Zhong, Lihong Zhao, Qiaomei Dou
International Journal of Information System Modeling and Design (2025) Vol. 16, Iss. 1, pp. 1-21
Open Access
Cloud-based artificial intelligence and audit report: the mediating role of the auditor
Yazan Abu Huson, Laura Sierra‐García, María Antonia García Benau, et al.
VINE Journal of Information and Knowledge Management Systems (2025)
Closed Access
Yazan Abu Huson, Laura Sierra‐García, María Antonia García Benau, et al.
VINE Journal of Information and Knowledge Management Systems (2025)
Closed Access
Survey on Secure Scientific Workflow Scheduling in Cloud Environments
Hadeel Amjed Saeed, Sufyan Al-Janabi, Esam Taha Yassen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 51-51
Open Access
Hadeel Amjed Saeed, Sufyan Al-Janabi, Esam Taha Yassen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 51-51
Open Access
Prospective Directions in the Computer Systems Industry Foundation Classes (IFC) for Shaping Data Exchange in the Sustainability and Resilience of Cities
Donatus Ebere Okonta, Vladimir Vuković, Ezri Hayat
Electronics (2024) Vol. 13, Iss. 12, pp. 2297-2297
Open Access | Times Cited: 3
Donatus Ebere Okonta, Vladimir Vuković, Ezri Hayat
Electronics (2024) Vol. 13, Iss. 12, pp. 2297-2297
Open Access | Times Cited: 3
SecFlow: Adaptive Security-Aware Workflow Management System in Multi-cloud Environments
Nafiseh Soveizi, Fatih Türkmen
Lecture notes in business information processing (2024), pp. 281-297
Closed Access | Times Cited: 2
Nafiseh Soveizi, Fatih Türkmen
Lecture notes in business information processing (2024), pp. 281-297
Closed Access | Times Cited: 2
Integrating MLSecOps in the Biotechnology Industry 5.0
Naseela Pervez, Alexander J. Titus
IntechOpen eBooks (2024)
Open Access | Times Cited: 2
Naseela Pervez, Alexander J. Titus
IntechOpen eBooks (2024)
Open Access | Times Cited: 2
Seguridad de la Información en la Nube: Una revisión sistemática
Elvis Ortiz, C. Vidal, Alberto Carlos Mendoza de los Santos
Revista Científica Ciencias Ingenieriles (2024) Vol. 4, Iss. 1, pp. 69-78
Open Access | Times Cited: 1
Elvis Ortiz, C. Vidal, Alberto Carlos Mendoza de los Santos
Revista Científica Ciencias Ingenieriles (2024) Vol. 4, Iss. 1, pp. 69-78
Open Access | Times Cited: 1
Digitalization of Document Management and Monitoring in the Department of the Interior and Local Government Negros Occidental
B. Martínez Rodríguez, Vincent T. Aquiatan, Christian Jun A. Verallo, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-8
Closed Access | Times Cited: 1
B. Martínez Rodríguez, Vincent T. Aquiatan, Christian Jun A. Verallo, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-8
Closed Access | Times Cited: 1
Enhancing Workflow Security in Multi-cloud Environments Through Monitoring and Adaptation upon Cloud Service and Network Security Violations
Nafiseh Soveizi, Dimka Karastoyanova
Lecture notes in computer science (2023), pp. 157-175
Closed Access | Times Cited: 3
Nafiseh Soveizi, Dimka Karastoyanova
Lecture notes in computer science (2023), pp. 157-175
Closed Access | Times Cited: 3
Maximizing Data Privacy: Empirical Analysis of Multi-Keyword Data Search and Privacy Protection over Cloud Computing Paradigm
V.S. Prakash, N. Karthikeyan, A. Kanagaraj, et al.
(2024), pp. 1-6
Closed Access
V.S. Prakash, N. Karthikeyan, A. Kanagaraj, et al.
(2024), pp. 1-6
Closed Access
Uncovering Cloud Security Complexities-A Comprehensive Five-Perspective Taxonomic Review
Aman Kumar Routh, Prabhat Ranjan
Research Square (Research Square) (2024)
Open Access
Aman Kumar Routh, Prabhat Ranjan
Research Square (Research Square) (2024)
Open Access
A surrogate model-based ESM parameter tuning scientific workflow management framework for HPC
Liang Hu, Xianwei Wu, Xilong Che
Research Square (Research Square) (2024)
Open Access
Liang Hu, Xianwei Wu, Xilong Che
Research Square (Research Square) (2024)
Open Access
Design of a mathematical fusion model for enhanced cloud data security
Amruta Tapas Paul, Pradeep N. Fale, Bhushan M. Manjre, et al.
AIP conference proceedings (2024) Vol. 3139, pp. 100005-100005
Closed Access
Amruta Tapas Paul, Pradeep N. Fale, Bhushan M. Manjre, et al.
AIP conference proceedings (2024) Vol. 3139, pp. 100005-100005
Closed Access
A Comparative Analysis on Exploration of Stegosploits across Various Media Formats
R Asharani, K Vidyalakshmi
(2024), pp. 1-8
Closed Access
R Asharani, K Vidyalakshmi
(2024), pp. 1-8
Closed Access
Factors Influencing Cloud Business Intelligence Adoption and Use at Organisational Level
Hasnain Sultan, Lee-Kwun Chan, Pei-Hwa Siew, et al.
ITM Web of Conferences (2024) Vol. 67, pp. 01019-01019
Open Access
Hasnain Sultan, Lee-Kwun Chan, Pei-Hwa Siew, et al.
ITM Web of Conferences (2024) Vol. 67, pp. 01019-01019
Open Access
Enhancing Cloud Data Security using Artificial Neural Networks for Users’ Account Hijacking Security Threats
Sumeet Gill, Renu Devi
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 34, pp. 3538-3552
Open Access
Sumeet Gill, Renu Devi
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 34, pp. 3538-3552
Open Access
A surrogate model-based ESM parameter tuning scientific workflow management framework for HPC
Liang Hu, Xianwei Wu, Xilong Che
Earth Science Informatics (2024)
Closed Access
Liang Hu, Xianwei Wu, Xilong Che
Earth Science Informatics (2024)
Closed Access
Addressing Security and Privacy Concerns in Cloud-Based Deep Learning Systems
Kapil Rajput, K. Raj Thilak, Manisha Aeri, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-6
Closed Access
Kapil Rajput, K. Raj Thilak, Manisha Aeri, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2024), pp. 1-6
Closed Access
Encrypted fully model-free event-triggered HVAC control
Zhenan Feng, Ehsan Nekouei
Journal of Building Engineering (2024), pp. 111385-111385
Closed Access
Zhenan Feng, Ehsan Nekouei
Journal of Building Engineering (2024), pp. 111385-111385
Closed Access
eDALAYON: A Document Management and Monitoring System for the Department of the Interior and Local Government, Philippines
B. Martínez Rodríguez, Christian Jun A. Verallo, Vincent T. Aquiatan, et al.
(2024) Vol. 1, Iss. 1, pp. 34-41
Closed Access
B. Martínez Rodríguez, Christian Jun A. Verallo, Vincent T. Aquiatan, et al.
(2024) Vol. 1, Iss. 1, pp. 34-41
Closed Access
CLOUD-BASED BIGBLUEBUTTON IMPLEMENTATION SUPPORTS VIRTUAL MEETINGS AT RRI MEDAN
Muhammad Rifqi Sakti, Akhyar Lubis
TEKNOKOM (2022) Vol. 6, Iss. 2, pp. 160-164
Open Access | Times Cited: 1
Muhammad Rifqi Sakti, Akhyar Lubis
TEKNOKOM (2022) Vol. 6, Iss. 2, pp. 160-164
Open Access | Times Cited: 1
Data Security in AWS S3 Cloud Storage
Rajeshree Khande, Sheetal Rajapurkar, Pratik Barde, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access
Rajeshree Khande, Sheetal Rajapurkar, Pratik Barde, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access
Turbo Powered Symmetric and Asymmetric Traffic Encryption Methods in Multi-Cloud Environment
M. A. Pranav, U. Akshith Bharadwaj, Prakhar Bhanu, et al.
(2023), pp. 562-569
Closed Access
M. A. Pranav, U. Akshith Bharadwaj, Prakhar Bhanu, et al.
(2023), pp. 562-569
Closed Access
The Effect of Security Levels, Resource Requirements, and Scalability on User Acceptance of Cloud Computing Systems in Technology Companies in Indonesia
Muhamad Bakhar, Muchamad Sobri Sungkar
West Science Interdisciplinary Studies (2023) Vol. 1, Iss. 12, pp. 1398-1407
Open Access
Muhamad Bakhar, Muchamad Sobri Sungkar
West Science Interdisciplinary Studies (2023) Vol. 1, Iss. 12, pp. 1398-1407
Open Access