-
3
-
-
84870730682
-
Towards secure communication for highly scalable mobile applications in cloud computing systems Centre for Applied Cryptographic Research
-
P. Tysowski, and M.A. Hasan Towards secure communication for highly scalable mobile applications in cloud computing systems Centre for Applied Cryptographic Research University of Waterloo Tech. Rep. C.A.C.R. 33 2011 1 33
-
(2011)
University of Waterloo Tech. Rep. C.A.C.R.
, vol.33
, pp. 1-33
-
-
Tysowski, P.1
Hasan, M.A.2
-
4
-
-
77953310709
-
Achieving secure, scalable and fine-grained data access control in cloud computing
-
Yu, S., Wang, C., Ren, K and Lou, W. Achieving secure, scalable and fine-grained data access control in cloud computing," in IEEE INFOCOM'10. 2010.
-
(2010)
IEEE INFOCOM'10
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
5
-
-
84866668858
-
-
A.N. Khan, M.L. Mat Kiah, S.U. Khan, and S.A. Madani Towards secure mobile cloud computing: A survey. Future Generation Computer Systems 29 5 2013 1278 1299
-
(2013)
Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Mat Kiah, M.L.2
Khan, S.U.3
Madani, S.A.4
-
6
-
-
84931323937
-
Enhanced Attribute Based Encryption for Cloud Computing
-
Kumar, N.S., Lakshmi, G.V.R., Balamurugan, B. Enhanced Attribute Based Encryption for Cloud Computing. Procedia Computer Science, 2015; 46; 689-696. doi:10.1016/j.procs.2015.02.127.
-
(2015)
Procedia Computer Science
, vol.46
, pp. 689-696
-
-
Kumar, N.S.1
Lakshmi, G.V.R.2
Balamurugan, B.3
-
7
-
-
84978315771
-
-
Han, J., Kamber, M and Pei, J. Data Mining: Concepts and Techniques, Third Edition, The Morgan Kaufmann Series in Data Management Systems. 2011.
-
(2011)
Data Mining: Concepts and Techniques, Third Edition, the Morgan Kaufmann Series in Data Management Systems
-
-
Han, J.1
Kamber, M.2
Pei, J.3
-
10
-
-
84930936490
-
Big Data computing and Clouds: Trends and future directions. Special Issue on Scalable Systems for Big Data Management and Analytics
-
Assuncao MD, Calheiros RN, Bianchi S, Netto MAS, Buyya R. Big Data computing and Clouds: trends and future directions. Special Issue on Scalable Systems for Big Data Management and Analytics. Journal of Parallel and Distributed Computing. 2015; 79-80:3-15.
-
(2015)
Journal of Parallel and Distributed Computing
, vol.79-80
, pp. 3-15
-
-
Assuncao, M.D.1
Calheiros, R.N.2
Bianchi, S.3
Netto, M.A.S.4
Buyya, R.5
-
11
-
-
84975094129
-
Big Data and Human Geography: Opportunities, Challenges and Risks
-
R. Kitchin Big Data and Human Geography: Opportunities, Challenges and Risks Dialogues in Human Geography. 3 3 2013 262 267
-
(2013)
Dialogues in Human Geography.
, vol.3
, Issue.3
, pp. 262-267
-
-
Kitchin, R.1
-
12
-
-
84941044100
-
Security Issues and Research Challenges
-
R.P. Padhy, M.R. Patra, S.C. Satapathy, and Cloud Computing: Security Issues and Research Challenges IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS): 1 2 2009 136 146
-
(2009)
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS)
, vol.1
, Issue.2
, pp. 136-146
-
-
Padhy, R.P.1
Patra, M.R.2
Satapathy, S.C.3
Computing, C.4
-
13
-
-
84899069262
-
Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
-
Manvi SS, Shyam GK. Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications. 2014;41:424-440. doi: 10.1016/j.jnca.2013.10.004.
-
(2014)
Journal of Network and Computer Applications
, vol.41
, pp. 424-440
-
-
Manvi, S.S.1
Shyam, G.K.2
-
15
-
-
68249129760
-
Above the Clouds: A Berkeley View of Cloud Computing
-
Armbrust, M., Fox, A., Grifith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report. No. UCB/EECS-2009-28, EECS.
-
Technical Report. No. UCB/EECS-2009-28, EECS
-
-
Armbrust, M.1
Fox, A.2
Grifith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
24
-
-
84887684572
-
Mobile, Cloud, and Big Data Computing: Contributions
-
J.C. Hsieh, A.H. Li, and C.C. Yang Mobile, Cloud, and Big Data Computing: Contributions Challenges, and New Directions in Telecardiology, International Journal of Environmental Research and Public Health 2013 10 2013 6131 6153
-
(2013)
Challenges, and New Directions in Telecardiology, International Journal of Environmental Research and Public Health 2013
, vol.10
, pp. 6131-6153
-
-
Hsieh, J.C.1
Li, A.H.2
Yang, C.C.3
-
27
-
-
85037846870
-
Self- Encrypting Disks pose Self-Decrypting Risks: How to break Hardware-based Full Disk Encryption. Technical report for the German talk "(Un)Sicherheit Hardware- basierter Festplattenverschlüsselung
-
Müller, T., Latzo, T. and Freiling, F.C. Self- Encrypting Disks pose Self-Decrypting Risks: How to break Hardware-based Full Disk Encryption, Technical report for the German talk "(Un)Sicherheit Hardware- basierter Festplattenverschlüsselung" given at the 29th Chaos Communication Congress. 2012.
-
(2012)
The 29th Chaos Communication Congress
-
-
Müller, T.1
-
31
-
-
1642505538
-
Honeypot: A supplemented active defense system for network security
-
Zhang, F., Zhou, S., Qin Z. And Liu, J., (2003), Honeypot: A supplemented active defense system for network security, In proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 231-235.
-
(2003)
Proceedings of the 4th International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 231-235
-
-
Zhang, F.1
Zhou, S.2
Qin, Z.3
Liu, J.4
|