The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depen...
Gespeichert in:
| Veröffentlicht in: | Computers (Basel) Jg. 11; H. 5; S. 62 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Basel
MDPI AG
01.05.2022
|
| Schlagworte: | |
| ISSN: | 2073-431X, 2073-431X |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming. |
|---|---|
| AbstractList | Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming. |
| Author | Çiço, Betim Hyseni, Dhuratë Piraj, Nimete Shabani, Isak |
| Author_xml | – sequence: 1 givenname: Dhuratë orcidid: 0000-0002-2139-0963 surname: Hyseni fullname: Hyseni, Dhuratë – sequence: 2 givenname: Nimete surname: Piraj fullname: Piraj, Nimete – sequence: 3 givenname: Betim orcidid: 0000-0001-9078-6147 surname: Çiço fullname: Çiço, Betim – sequence: 4 givenname: Isak orcidid: 0000-0003-2071-6834 surname: Shabani fullname: Shabani, Isak |
| BookMark | eNp1UV1rGzEQFCWFpkl-QN4EfXarlXSn02Mx_TCktMQOFPIgdNLKkTmfXEkX8L_vJW6htHRfdhlmhmHnNTkb04iEXAN7K4Rm71zaH6aKuQCwhrGWvyDnnCmxkAK-n_1xvyJXpezYPBpEx-Gc3G8ekN4VpCnQW7Suxkek33LaZrvfx3FL40jrwzN0SAU9_ZI8DjSkTJdDmjxdo5tyrEe6TGPNaRhmTn-kq816fUleBjsUvPq1L8jdxw-b5efFzddPq-X7m4WbM9SFDo12PToNUrZWqI71DaoOZQjIQ8N0r0BDr0MI3mnZ-k6KTnDeKx-wV0xckNXJ1ye7M4cc9zYfTbLRPAMpb43NNboBDQAoD62y0AaJLeu951YqIRolZMNh9npz8jrk9GPCUs0uTXmc4xveKgZctEzPLHViuZxKyRiMi9XW-PQCGwcDzDwVY_4pZlbCX8rfef-v-Qk8TJSi |
| CitedBy_id | crossref_primary_10_37745_ejcsit_2013_vol13n3093103 |
| Cites_doi | 10.4018/978-1-4666-4514-1.ch001 10.1109/ICIEM51511.2021.9445377 10.1109/ICSE.2015.303 10.1186/s13677-015-0037-5 10.1093/idpl/ipx008 10.1007/11737414_18 10.1109/ICPADS.2009.46 10.1007/978-3-030-94507-7_10 10.1186/2192-113X-1-13 10.1109/MCOM.2011.6094017 10.1155/2015/601017 10.1145/1315245.1315317 10.1007/978-1-4842-2152-5 10.1145/2499370.2462161 10.1007/978-981-13-1165-9_44 10.1145/945445.945464 10.1109/MECO.2015.7181871 10.1002/9781119764113.ch11 10.1007/978-1-4302-3748-8 10.1109/ICPCSI.2017.8392213 10.1109/MECO.2018.8406050 10.1145/3191697.3214337 10.1007/s12652-020-02370-8 10.1186/s13677-014-0010-8 10.1109/TEM.2020.3045661 |
| ContentType | Journal Article |
| Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U DOA |
| DOI | 10.3390/computers11050062 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest - Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2073-431X |
| ExternalDocumentID | oai_doaj_org_article_1117d167a16f4e60bdd2a47335734521 10_3390_computers11050062 |
| GroupedDBID | 5VS 8FE 8FG AADQD AAYXX ABUWG ADBBV AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO GNUQQ GROUPED_DOAJ HCIFZ IAO ICD ITC IVC K6V K7- KQ8 MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC 3V. 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D M0N PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c382t-9f59cbec91446a3780b5e78e4ffe2f509b7191b9fffdc946d8438322b7dfeb703 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000802617300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2073-431X |
| IngestDate | Tue Oct 14 18:58:17 EDT 2025 Sun Nov 09 06:01:04 EST 2025 Tue Nov 18 22:13:48 EST 2025 Sat Nov 29 07:15:48 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c382t-9f59cbec91446a3780b5e78e4ffe2f509b7191b9fffdc946d8438322b7dfeb703 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-9078-6147 0000-0002-2139-0963 0000-0003-2071-6834 |
| OpenAccessLink | https://doaj.org/article/1117d167a16f4e60bdd2a47335734521 |
| PQID | 2670123609 |
| PQPubID | 2032413 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_1117d167a16f4e60bdd2a47335734521 proquest_journals_2670123609 crossref_citationtrail_10_3390_computers11050062 crossref_primary_10_3390_computers11050062 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-05-01 |
| PublicationDateYYYYMMDD | 2022-05-01 |
| PublicationDate_xml | – month: 05 year: 2022 text: 2022-05-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Computers (Basel) |
| PublicationYear | 2022 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Dorairaj (ref_30) 2015; 2015 ref_14 ref_13 ref_12 ref_34 ref_10 Uriarte (ref_27) 2011; 49 Nagarajan (ref_33) 2021; 12 ref_19 ref_18 Mishra (ref_16) 2021; 12 ref_17 ref_15 Ouedraogo (ref_25) 2015; 4 Hyseni (ref_1) 2018; 9 ref_24 ref_23 ref_22 ref_21 ref_20 ref_3 ref_2 ref_28 ref_26 Wolters (ref_31) 2017; 7 ref_9 ref_8 Czaplicki (ref_11) 2013; 48 Jaatun (ref_29) 2012; 1 ref_5 ref_4 ref_7 ref_6 Mosch (ref_32) 2014; 3 |
| References_xml | – ident: ref_9 – ident: ref_18 doi: 10.4018/978-1-4666-4514-1.ch001 – ident: ref_23 doi: 10.1109/ICIEM51511.2021.9445377 – ident: ref_5 – ident: ref_10 doi: 10.1109/ICSE.2015.303 – volume: 4 start-page: 12 year: 2015 ident: ref_25 article-title: Security transparency: The next frontier for security research in the cloud publication-title: J. Cloud Comput. doi: 10.1186/s13677-015-0037-5 – volume: 7 start-page: 165 year: 2017 ident: ref_31 article-title: The security of personal data under the GDPR: A harmonized duty or a shared responsibility? publication-title: Int. Data Priv. Law doi: 10.1093/idpl/ipx008 – ident: ref_3 doi: 10.1007/11737414_18 – ident: ref_26 doi: 10.1109/ICPADS.2009.46 – ident: ref_15 doi: 10.1007/978-3-030-94507-7_10 – volume: 1 start-page: 13 year: 2012 ident: ref_29 article-title: The design of a redundant array of independent net-storages for improved confidentiality in cloud computing publication-title: J. Cloud Comput. Adv. Syst. Appl. doi: 10.1186/2192-113X-1-13 – volume: 49 start-page: 130 year: 2011 ident: ref_27 article-title: Towards an architecture for monitoring private clouds publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2011.6094017 – volume: 2015 start-page: 601017 year: 2015 ident: ref_30 article-title: An adaptive multilevel security framework for the data stored in cloud environment publication-title: Sci. World J. doi: 10.1155/2015/601017 – volume: 12 start-page: 2114 year: 2021 ident: ref_33 article-title: Comparative Analysis of Public Cloud Security Based Schemes and Cryptographic Algorithms publication-title: Turk. J. Comput. Math. Educ. (TURCOMAT) – ident: ref_17 doi: 10.1145/1315245.1315317 – ident: ref_7 doi: 10.1007/978-1-4842-2152-5 – volume: 48 start-page: 411 year: 2013 ident: ref_11 article-title: Asynchronous functional reactive programming for GUIs publication-title: ACM SIGPLAN Not. doi: 10.1145/2499370.2462161 – ident: ref_21 – ident: ref_24 doi: 10.1007/978-981-13-1165-9_44 – ident: ref_20 doi: 10.1145/945445.945464 – ident: ref_6 – ident: ref_12 doi: 10.1109/MECO.2015.7181871 – ident: ref_4 – ident: ref_28 doi: 10.1002/9781119764113.ch11 – ident: ref_8 doi: 10.1007/978-1-4302-3748-8 – ident: ref_14 doi: 10.1109/ICPCSI.2017.8392213 – ident: ref_13 doi: 10.1109/MECO.2018.8406050 – ident: ref_2 doi: 10.1145/3191697.3214337 – volume: 12 start-page: 7051 year: 2021 ident: ref_16 article-title: Analysis of security issues of cloud-based web applications publication-title: J. Ambient. Intell. Humaniz. Comput. doi: 10.1007/s12652-020-02370-8 – volume: 9 start-page: 203 year: 2018 ident: ref_1 article-title: The Proposed Model to Increase Security of Sensitive Data in Cloud Computing publication-title: Int. J. Adv. Comput. Sci. Appl. – ident: ref_19 – volume: 3 start-page: 10 year: 2014 ident: ref_32 article-title: User-controlled resource management in federated clouds publication-title: J. Cloud Comput. doi: 10.1186/s13677-014-0010-8 – ident: ref_34 doi: 10.1109/TEM.2020.3045661 – ident: ref_22 |
| SSID | ssj0000913821 |
| Score | 2.1879551 |
| Snippet | Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been... |
| SourceID | doaj proquest crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 62 |
| SubjectTerms | Algorithms Cloud computing cloud provider data sources encryption and decryption file Paradigms Programming Programming languages reactive architecture reactive extensions reactive programming Security |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEF609eDF-sRqlT14EkLz2GSTk9hS0UspfUDBQ9jsQ4Ta1KYV_PfOJNuKCF68bjYQdmZn5tvMfh8hNwA6ZBhK15ExMw5TLnOECSVAlVjHMjCYtkuxCd7vx9NpMrAHboVtq9zExDJQq1ziGXnbj3hJN-Ymd4t3B1Wj8O-qldDYJXVkKgM_r3d6_cFwe8qCrJex71W_MwPA921pxRIKyHsh3iD8kZBK3v5fYbnMNQ-N_37lITmwVSa9r9ziiOzo-TFpbBQcqN3QJ-QZvIROCk1zQ4dalLGPDqqWrTdIavR1TqFCxKFFXmhFUTptRqHQpd1ZvlZ0ZOXvaLdqeZ_BnOyTPo1Ho1MyeeiNu4-OlVtwJKzRyklMmEgwaYIQUQQ8drNQ81gzY7RvoLDIOIC7LDHGKJmwSMVIc-r7GVdGZxA5zkhtns_1OaFSKKE1EtVIj0FBKDJfaA5h1XiJgoKsSdzNmqfScpGjJMYsBUyCZkp_malJbrevLCoijr8md9CQ24nIoV0O5MuX1G5JxD5ceREXXmSYjtxMKV8wHgQhDxhUNU3S2tg4tRu7SL8NfPH340uy7-NNibI3skVqq-VaX5E9-bF6LZbX1k-_AAi481k priority: 102 providerName: ProQuest |
| Title | The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS |
| URI | https://www.proquest.com/docview/2670123609 https://doaj.org/article/1117d167a16f4e60bdd2a47335734521 |
| Volume | 11 |
| WOSCitedRecordID | wos000802617300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: DOA dateStart: 20120101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: M~E dateStart: 20120101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: K7- dateStart: 20120101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: P5Z dateStart: 20120101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: BENPR dateStart: 20120101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2073-431X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913821 issn: 2073-431X databaseCode: PIMPY dateStart: 20120101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFA8yPXjxW5zOkYMnoawfSdMcdUwc4iibwtRDSfMBg7qKnYL_vS9pJ8pAL15ySFPavo-89-jL74fQGRQdklLpezIhxiPKJ54wVEKpkuhERsaGbUc2wUajZDrl6TeqL9sTVsMD14LrgS8yFcRMBLEhOvZzpUJBWBRRFhHqjpCHPuPfiim3B3OLrRfUvzEjqOt7siFJqCDeUXty8Ecgcnj9K9uxizFXO2irSQ7xRf1Su2hNz_fQ9pJ4ATd-uI-eQLn4vtK4NHishduycFp3Wj1DLMKzOYbEzk69lJVW2DKeFRjyU9wvyjeFJw1rHe7XneoFrMk_8PBuMjlA91eDu_6117AkeBI-ceFxQ7kETXBb2YmIJX5ONUs0MUaHBvKBnEFNlnNjjJKcxCqx6KRhmDNldA4Of4ha83KujxCWQgmtLb6MDAjkcSIPhWagARNwBXlUG_lLkWWygRC3TBZFBqWElXK2IuU2Ov-65aXGz_ht8aXVw9dCC33tJsAgssYgsr8Moo06Sy1mjT9WWRgzB1bn8-P_eMYJ2gztMQjX-NhBrcXrmz5FG_J9Mateu2j9cjBKx11nkjDeMA_GlD7ClXR4mz58Ahb856A |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJcKK-KhRZ8gAtS1MR2YvuAULu06qpltepupUocguMHqrRsls0W1D_Fb2ScxyJUqbceuDpOlMSf55uxx_MBvMWgw6SpiSMjuY-4jXmkfWowVJFOGuYDbddiE2I0khcXarwBv7uzMCGtsrOJtaG2pQlr5Hs0E3W5sVh9XPyIgmpU2F3tJDQaWJy4618YslUfhp9wfN9RenQ4HRxHrapAZJikq0j5VBl8cxUiIc2EjIvUCem494565M9CYAxTKO-9NYpnVoZqnpQWwnpX4ATB596DTc54lvZg8-BwND5br-qEKpuSJs32KWMq3jOtOEOFPJuGE4v_EGCtE3CDBmpuO9r63_7KY3jUetFkv4H9E9hw86ew1SlUkNZgPYMvOAvIeeVI6cmZ07VtJ-MmJe07kja5nBP0gEPToqycJUEabkbQkSeDWXllyaSV9yODJqV_hn2KazKcTibP4fxOPnEbevNy7l4AMdpq50IhHpNwdHh1QbUTSBs-URYdzj7E3Rjnpq21HiQ_ZjnGXAEW-Q1Y9OH9-pZFU2jkts4HATjrjqFGeN1QLr_lrckJsZ2wSSZ0knnusriwlmouGEsF4-i19WGnw1TeGq4q_wuol7dffgMPjqefT_PT4ejkFTyk4VRInQe6A73V8srtwn3zc3VZLV-3c4TA17sG4B9YZ1Gl |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VghAXyqdYKOADXJCiTRwndg4IwZYVq6LVim2lCg4h8QeqtGyWzRbUv8avY8ZxFqFKvfXA1XEiOX6eN2OP5wG8wKBDZ5mOI62Ei4SJRVS5TGOooqzSqSPa9mITcjpVJyfFbAd-93dhKK2yt4neUJtG0x75kOfSlxuLi6ELaRGzg_Gb1Y-IFKTopLWX0-ggcmjPf2H41r6eHOBcv-R8_P5o9CEKCgORThXfRIXLCo2jKCgqqlKp4jqzUlnhnOUOubSWGM_UhXPO6ELkRlFlT85raZytcbHgd6_BdSlyRelks-zzdn-H6m0qnnQHqWlaxEMdZBpaZNyM7i7-Q4VeMeACIXiWG-_9z__nDtwOvjV72y2Gu7Bjl_dgr9etYMGM3YcvuDbYcWtZ49gnW3mLz2Zdotp3pHJ2umToF1PTqmmtYSQYt2Do3rPRojkzbB5E_9ioS_RfYJ_6nE2O5vMHcHwlQ3wIu8tmaR8B05WprKXyPDoR6AZXNa-sRDJxSWHQDR1A3M93qUMFdhICWZQYiRFEygsQGcCr7SurrvzIZZ3fEYi2HalyuG9o1t_KYIgo4pMmyWWV5E7YPK6N4ZWQaZrJVKAvN4D9Hl9lMGdt-Rdcjy9__BxuIurKj5Pp4RO4xemqiE8O3YfdzfrMPoUb-ufmtF0_84uFwderRt8fuetZOg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Use+of+Reactive+Programming+in+the+Proposed+Model+for+Cloud+Security+Controlled+by+ITSS&rft.jtitle=Computers+%28Basel%29&rft.au=Dhurat%C3%AB+Hyseni&rft.au=Nimete+Piraj&rft.au=Betim+%C3%87i%C3%A7o&rft.au=Isak+Shabani&rft.date=2022-05-01&rft.pub=MDPI+AG&rft.eissn=2073-431X&rft.volume=11&rft.issue=5&rft.spage=62&rft_id=info:doi/10.3390%2Fcomputers11050062&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_1117d167a16f4e60bdd2a47335734521 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-431X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-431X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-431X&client=summon |