The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS

Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers (Basel) Jg. 11; H. 5; S. 62
Hauptverfasser: Hyseni, Dhuratë, Piraj, Nimete, Çiço, Betim, Shabani, Isak
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Basel MDPI AG 01.05.2022
Schlagworte:
ISSN:2073-431X, 2073-431X
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming.
AbstractList Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming.
Author Çiço, Betim
Hyseni, Dhuratë
Piraj, Nimete
Shabani, Isak
Author_xml – sequence: 1
  givenname: Dhuratë
  orcidid: 0000-0002-2139-0963
  surname: Hyseni
  fullname: Hyseni, Dhuratë
– sequence: 2
  givenname: Nimete
  surname: Piraj
  fullname: Piraj, Nimete
– sequence: 3
  givenname: Betim
  orcidid: 0000-0001-9078-6147
  surname: Çiço
  fullname: Çiço, Betim
– sequence: 4
  givenname: Isak
  orcidid: 0000-0003-2071-6834
  surname: Shabani
  fullname: Shabani, Isak
BookMark eNp1UV1rGzEQFCWFpkl-QN4EfXarlXSn02Mx_TCktMQOFPIgdNLKkTmfXEkX8L_vJW6htHRfdhlmhmHnNTkb04iEXAN7K4Rm71zaH6aKuQCwhrGWvyDnnCmxkAK-n_1xvyJXpezYPBpEx-Gc3G8ekN4VpCnQW7Suxkek33LaZrvfx3FL40jrwzN0SAU9_ZI8DjSkTJdDmjxdo5tyrEe6TGPNaRhmTn-kq816fUleBjsUvPq1L8jdxw-b5efFzddPq-X7m4WbM9SFDo12PToNUrZWqI71DaoOZQjIQ8N0r0BDr0MI3mnZ-k6KTnDeKx-wV0xckNXJ1ye7M4cc9zYfTbLRPAMpb43NNboBDQAoD62y0AaJLeu951YqIRolZMNh9npz8jrk9GPCUs0uTXmc4xveKgZctEzPLHViuZxKyRiMi9XW-PQCGwcDzDwVY_4pZlbCX8rfef-v-Qk8TJSi
CitedBy_id crossref_primary_10_37745_ejcsit_2013_vol13n3093103
Cites_doi 10.4018/978-1-4666-4514-1.ch001
10.1109/ICIEM51511.2021.9445377
10.1109/ICSE.2015.303
10.1186/s13677-015-0037-5
10.1093/idpl/ipx008
10.1007/11737414_18
10.1109/ICPADS.2009.46
10.1007/978-3-030-94507-7_10
10.1186/2192-113X-1-13
10.1109/MCOM.2011.6094017
10.1155/2015/601017
10.1145/1315245.1315317
10.1007/978-1-4842-2152-5
10.1145/2499370.2462161
10.1007/978-981-13-1165-9_44
10.1145/945445.945464
10.1109/MECO.2015.7181871
10.1002/9781119764113.ch11
10.1007/978-1-4302-3748-8
10.1109/ICPCSI.2017.8392213
10.1109/MECO.2018.8406050
10.1145/3191697.3214337
10.1007/s12652-020-02370-8
10.1186/s13677-014-0010-8
10.1109/TEM.2020.3045661
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.3390/computers11050062
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest - Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList CrossRef
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2073-431X
ExternalDocumentID oai_doaj_org_article_1117d167a16f4e60bdd2a47335734521
10_3390_computers11050062
GroupedDBID 5VS
8FE
8FG
AADQD
AAYXX
ABUWG
ADBBV
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
GNUQQ
GROUPED_DOAJ
HCIFZ
IAO
ICD
ITC
IVC
K6V
K7-
KQ8
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PQQKQ
PROAC
3V.
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
M0N
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c382t-9f59cbec91446a3780b5e78e4ffe2f509b7191b9fffdc946d8438322b7dfeb703
IEDL.DBID DOA
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000802617300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2073-431X
IngestDate Tue Oct 14 18:58:17 EDT 2025
Sun Nov 09 06:01:04 EST 2025
Tue Nov 18 22:13:48 EST 2025
Sat Nov 29 07:15:48 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c382t-9f59cbec91446a3780b5e78e4ffe2f509b7191b9fffdc946d8438322b7dfeb703
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-9078-6147
0000-0002-2139-0963
0000-0003-2071-6834
OpenAccessLink https://doaj.org/article/1117d167a16f4e60bdd2a47335734521
PQID 2670123609
PQPubID 2032413
ParticipantIDs doaj_primary_oai_doaj_org_article_1117d167a16f4e60bdd2a47335734521
proquest_journals_2670123609
crossref_citationtrail_10_3390_computers11050062
crossref_primary_10_3390_computers11050062
PublicationCentury 2000
PublicationDate 2022-05-01
PublicationDateYYYYMMDD 2022-05-01
PublicationDate_xml – month: 05
  year: 2022
  text: 2022-05-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Computers (Basel)
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Dorairaj (ref_30) 2015; 2015
ref_14
ref_13
ref_12
ref_34
ref_10
Uriarte (ref_27) 2011; 49
Nagarajan (ref_33) 2021; 12
ref_19
ref_18
Mishra (ref_16) 2021; 12
ref_17
ref_15
Ouedraogo (ref_25) 2015; 4
Hyseni (ref_1) 2018; 9
ref_24
ref_23
ref_22
ref_21
ref_20
ref_3
ref_2
ref_28
ref_26
Wolters (ref_31) 2017; 7
ref_9
ref_8
Czaplicki (ref_11) 2013; 48
Jaatun (ref_29) 2012; 1
ref_5
ref_4
ref_7
ref_6
Mosch (ref_32) 2014; 3
References_xml – ident: ref_9
– ident: ref_18
  doi: 10.4018/978-1-4666-4514-1.ch001
– ident: ref_23
  doi: 10.1109/ICIEM51511.2021.9445377
– ident: ref_5
– ident: ref_10
  doi: 10.1109/ICSE.2015.303
– volume: 4
  start-page: 12
  year: 2015
  ident: ref_25
  article-title: Security transparency: The next frontier for security research in the cloud
  publication-title: J. Cloud Comput.
  doi: 10.1186/s13677-015-0037-5
– volume: 7
  start-page: 165
  year: 2017
  ident: ref_31
  article-title: The security of personal data under the GDPR: A harmonized duty or a shared responsibility?
  publication-title: Int. Data Priv. Law
  doi: 10.1093/idpl/ipx008
– ident: ref_3
  doi: 10.1007/11737414_18
– ident: ref_26
  doi: 10.1109/ICPADS.2009.46
– ident: ref_15
  doi: 10.1007/978-3-030-94507-7_10
– volume: 1
  start-page: 13
  year: 2012
  ident: ref_29
  article-title: The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
  publication-title: J. Cloud Comput. Adv. Syst. Appl.
  doi: 10.1186/2192-113X-1-13
– volume: 49
  start-page: 130
  year: 2011
  ident: ref_27
  article-title: Towards an architecture for monitoring private clouds
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2011.6094017
– volume: 2015
  start-page: 601017
  year: 2015
  ident: ref_30
  article-title: An adaptive multilevel security framework for the data stored in cloud environment
  publication-title: Sci. World J.
  doi: 10.1155/2015/601017
– volume: 12
  start-page: 2114
  year: 2021
  ident: ref_33
  article-title: Comparative Analysis of Public Cloud Security Based Schemes and Cryptographic Algorithms
  publication-title: Turk. J. Comput. Math. Educ. (TURCOMAT)
– ident: ref_17
  doi: 10.1145/1315245.1315317
– ident: ref_7
  doi: 10.1007/978-1-4842-2152-5
– volume: 48
  start-page: 411
  year: 2013
  ident: ref_11
  article-title: Asynchronous functional reactive programming for GUIs
  publication-title: ACM SIGPLAN Not.
  doi: 10.1145/2499370.2462161
– ident: ref_21
– ident: ref_24
  doi: 10.1007/978-981-13-1165-9_44
– ident: ref_20
  doi: 10.1145/945445.945464
– ident: ref_6
– ident: ref_12
  doi: 10.1109/MECO.2015.7181871
– ident: ref_4
– ident: ref_28
  doi: 10.1002/9781119764113.ch11
– ident: ref_8
  doi: 10.1007/978-1-4302-3748-8
– ident: ref_14
  doi: 10.1109/ICPCSI.2017.8392213
– ident: ref_13
  doi: 10.1109/MECO.2018.8406050
– ident: ref_2
  doi: 10.1145/3191697.3214337
– volume: 12
  start-page: 7051
  year: 2021
  ident: ref_16
  article-title: Analysis of security issues of cloud-based web applications
  publication-title: J. Ambient. Intell. Humaniz. Comput.
  doi: 10.1007/s12652-020-02370-8
– volume: 9
  start-page: 203
  year: 2018
  ident: ref_1
  article-title: The Proposed Model to Increase Security of Sensitive Data in Cloud Computing
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– ident: ref_19
– volume: 3
  start-page: 10
  year: 2014
  ident: ref_32
  article-title: User-controlled resource management in federated clouds
  publication-title: J. Cloud Comput.
  doi: 10.1186/s13677-014-0010-8
– ident: ref_34
  doi: 10.1109/TEM.2020.3045661
– ident: ref_22
SSID ssj0000913821
Score 2.1879551
Snippet Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been...
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 62
SubjectTerms Algorithms
Cloud computing
cloud provider
data sources
encryption and decryption file
Paradigms
Programming
Programming languages
reactive architecture
reactive extensions
reactive programming
Security
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEF609eDF-sRqlT14EkLz2GSTk9hS0UspfUDBQ9jsQ4Ta1KYV_PfOJNuKCF68bjYQdmZn5tvMfh8hNwA6ZBhK15ExMw5TLnOECSVAlVjHMjCYtkuxCd7vx9NpMrAHboVtq9zExDJQq1ziGXnbj3hJN-Ymd4t3B1Wj8O-qldDYJXVkKgM_r3d6_cFwe8qCrJex71W_MwPA921pxRIKyHsh3iD8kZBK3v5fYbnMNQ-N_37lITmwVSa9r9ziiOzo-TFpbBQcqN3QJ-QZvIROCk1zQ4dalLGPDqqWrTdIavR1TqFCxKFFXmhFUTptRqHQpd1ZvlZ0ZOXvaLdqeZ_BnOyTPo1Ho1MyeeiNu4-OlVtwJKzRyklMmEgwaYIQUQQ8drNQ81gzY7RvoLDIOIC7LDHGKJmwSMVIc-r7GVdGZxA5zkhtns_1OaFSKKE1EtVIj0FBKDJfaA5h1XiJgoKsSdzNmqfScpGjJMYsBUyCZkp_malJbrevLCoijr8md9CQ24nIoV0O5MuX1G5JxD5ceREXXmSYjtxMKV8wHgQhDxhUNU3S2tg4tRu7SL8NfPH340uy7-NNibI3skVqq-VaX5E9-bF6LZbX1k-_AAi481k
  priority: 102
  providerName: ProQuest
Title The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
URI https://www.proquest.com/docview/2670123609
https://doaj.org/article/1117d167a16f4e60bdd2a47335734521
Volume 11
WOSCitedRecordID wos000802617300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: DOA
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: M~E
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: K7-
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: P5Z
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: BENPR
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2073-431X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913821
  issn: 2073-431X
  databaseCode: PIMPY
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFA8yPXjxW5zOkYMnoawfSdMcdUwc4iibwtRDSfMBg7qKnYL_vS9pJ8pAL15ySFPavo-89-jL74fQGRQdklLpezIhxiPKJ54wVEKpkuhERsaGbUc2wUajZDrl6TeqL9sTVsMD14LrgS8yFcRMBLEhOvZzpUJBWBRRFhHqjpCHPuPfiim3B3OLrRfUvzEjqOt7siFJqCDeUXty8Ecgcnj9K9uxizFXO2irSQ7xRf1Su2hNz_fQ9pJ4ATd-uI-eQLn4vtK4NHishduycFp3Wj1DLMKzOYbEzk69lJVW2DKeFRjyU9wvyjeFJw1rHe7XneoFrMk_8PBuMjlA91eDu_6117AkeBI-ceFxQ7kETXBb2YmIJX5ONUs0MUaHBvKBnEFNlnNjjJKcxCqx6KRhmDNldA4Of4ha83KujxCWQgmtLb6MDAjkcSIPhWagARNwBXlUG_lLkWWygRC3TBZFBqWElXK2IuU2Ov-65aXGz_ht8aXVw9dCC33tJsAgssYgsr8Moo06Sy1mjT9WWRgzB1bn8-P_eMYJ2gztMQjX-NhBrcXrmz5FG_J9Mateu2j9cjBKx11nkjDeMA_GlD7ClXR4mz58Ahb856A
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VLRJcKK-KhRZ8gAtS1MR2YvuAULu06qpltepupUocguMHqrRsls0W1D_Fb2ScxyJUqbceuDpOlMSf55uxx_MBvMWgw6SpiSMjuY-4jXmkfWowVJFOGuYDbddiE2I0khcXarwBv7uzMCGtsrOJtaG2pQlr5Hs0E3W5sVh9XPyIgmpU2F3tJDQaWJy4618YslUfhp9wfN9RenQ4HRxHrapAZJikq0j5VBl8cxUiIc2EjIvUCem494565M9CYAxTKO-9NYpnVoZqnpQWwnpX4ATB596DTc54lvZg8-BwND5br-qEKpuSJs32KWMq3jOtOEOFPJuGE4v_EGCtE3CDBmpuO9r63_7KY3jUetFkv4H9E9hw86ew1SlUkNZgPYMvOAvIeeVI6cmZ07VtJ-MmJe07kja5nBP0gEPToqycJUEabkbQkSeDWXllyaSV9yODJqV_hn2KazKcTibP4fxOPnEbevNy7l4AMdpq50IhHpNwdHh1QbUTSBs-URYdzj7E3Rjnpq21HiQ_ZjnGXAEW-Q1Y9OH9-pZFU2jkts4HATjrjqFGeN1QLr_lrckJsZ2wSSZ0knnusriwlmouGEsF4-i19WGnw1TeGq4q_wuol7dffgMPjqefT_PT4ejkFTyk4VRInQe6A73V8srtwn3zc3VZLV-3c4TA17sG4B9YZ1Gl
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VghAXyqdYKOADXJCiTRwndg4IwZYVq6LVim2lCg4h8QeqtGyWzRbUv8avY8ZxFqFKvfXA1XEiOX6eN2OP5wG8wKBDZ5mOI62Ei4SJRVS5TGOooqzSqSPa9mITcjpVJyfFbAd-93dhKK2yt4neUJtG0x75kOfSlxuLi6ELaRGzg_Gb1Y-IFKTopLWX0-ggcmjPf2H41r6eHOBcv-R8_P5o9CEKCgORThXfRIXLCo2jKCgqqlKp4jqzUlnhnOUOubSWGM_UhXPO6ELkRlFlT85raZytcbHgd6_BdSlyRelks-zzdn-H6m0qnnQHqWlaxEMdZBpaZNyM7i7-Q4VeMeACIXiWG-_9z__nDtwOvjV72y2Gu7Bjl_dgr9etYMGM3YcvuDbYcWtZ49gnW3mLz2Zdotp3pHJ2umToF1PTqmmtYSQYt2Do3rPRojkzbB5E_9ioS_RfYJ_6nE2O5vMHcHwlQ3wIu8tmaR8B05WprKXyPDoR6AZXNa-sRDJxSWHQDR1A3M93qUMFdhICWZQYiRFEygsQGcCr7SurrvzIZZ3fEYi2HalyuG9o1t_KYIgo4pMmyWWV5E7YPK6N4ZWQaZrJVKAvN4D9Hl9lMGdt-Rdcjy9__BxuIurKj5Pp4RO4xemqiE8O3YfdzfrMPoUb-ufmtF0_84uFwderRt8fuetZOg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Use+of+Reactive+Programming+in+the+Proposed+Model+for+Cloud+Security+Controlled+by+ITSS&rft.jtitle=Computers+%28Basel%29&rft.au=Dhurat%C3%AB+Hyseni&rft.au=Nimete+Piraj&rft.au=Betim+%C3%87i%C3%A7o&rft.au=Isak+Shabani&rft.date=2022-05-01&rft.pub=MDPI+AG&rft.eissn=2073-431X&rft.volume=11&rft.issue=5&rft.spage=62&rft_id=info:doi/10.3390%2Fcomputers11050062&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_1117d167a16f4e60bdd2a47335734521
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2073-431X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2073-431X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2073-431X&client=summon