-
1
-
-
77954051808
-
The NIST definition of cloud computing
-
P. Mell and T. Grance, "The NIST definition of cloud computing," Nat. Inst. Stand. Technol., vol. 53, no. 6, pp. 50-50, 2009.
-
(2009)
Nat. Inst. Stand. Technol.
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
2
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications, and approaches
-
H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches," Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, 2013.
-
(2013)
Wireless Commun. Mobile Comput.
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
3
-
-
84907000737
-
Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments
-
J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, "Joint virtual machine and bandwidth allocation in software defined network (sdn) and cloud computing environments," in Proc. IEEE Int. Conf. Commun., 2014, pp. 2969-2974.
-
(2014)
Proc. IEEE Int. Conf. Commun.
, pp. 2969-2974
-
-
Chase, J.1
Kaewpuang, R.2
Yonggang, W.3
Niyato, D.4
-
4
-
-
84907737354
-
Secure and privacy-preserving data storage service in public cloud
-
H. Li, W. Sun, F. Li, and B. Wang, "Secure and privacy-preserving data storage service in public cloud," J. Comput. Res. Develop., vol. 51, no. 7, pp. 1397-1409, 2014.
-
(2014)
J. Comput. Res. Develop.
, vol.51
, Issue.7
, pp. 1397-1409
-
-
Li, H.1
Sun, W.2
Li, F.3
Wang, B.4
-
5
-
-
84996541764
-
Efficient data collection in sensor-cloud system with multiple mobile sinks
-
Y. Li, T. Wang, G. Wang, J. Liang, and H. Chen, "Efficient data collection in sensor-cloud system with multiple mobile sinks," in Proc. Adv. Serv. Comput., 10th Asia-Pac. Serv. Comput. Conf., 2016, pp. 130-143.
-
(2016)
Proc. Adv. Serv. Comput., 10th Asia-Pac. Serv. Comput. Conf.
, pp. 130-143
-
-
Li, Y.1
Wang, T.2
Wang, G.3
Liang, J.4
Chen, H.5
-
6
-
-
84975761150
-
Survey on secure cloud storage
-
L. Xiao, Q. Li, and J. Liu, "Survey on secure cloud storage," J. Data Acquis. Process., vol. 31, no. 3, pp. 464-472, 2016.
-
(2016)
J. Data Acquis. Process.
, vol.31
, Issue.3
, pp. 464-472
-
-
Xiao, L.1
Li, Q.2
Liu, J.3
-
7
-
-
0019608784
-
On sharing secrets and reed-solomon codes
-
R. J. McEliece and D. V. Sarwate, "On sharing secrets and reed-solomon codes," Commun. ACM, vol. 24, no. 9, pp. 583-584, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
9
-
-
79951581342
-
Computational intelligence in wireless sensor networks: A survey
-
First Quarter
-
R. Kulkarni, A. Forster, and G. Venayagamoorthy, "Computational intelligence in wireless sensor networks: A survey," IEEE Commun. Surv. Tuts., vol. 13, no. 1, pp. 68-96, First Quarter 2011.
-
(2011)
IEEE Commun. Surv. Tuts.
, vol.13
, Issue.1
, pp. 68-96
-
-
Kulkarni, R.1
Forster, A.2
Venayagamoorthy, G.3
-
10
-
-
84986631527
-
A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Nov.
-
Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, "A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
11
-
-
85017189145
-
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
-
J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, "A secure cloud-assisted urban data sharing framework for ubiquitous-cities," Pervasive Mobile Comput., vol. 41, pp. 219-230, 2017.
-
(2017)
Pervasive Mobile Comput.
, vol.41
, pp. 219-230
-
-
Shen, J.1
Liu, D.2
Shen, J.3
Liu, Q.4
Sun, X.5
-
12
-
-
85019226137
-
Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data
-
Aug.
-
Z. Fu, F. Huang, K. Ren, J. Weng, and C. Wang, "Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data," IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1874-1884, Aug. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.8
, pp. 1874-1884
-
-
Fu, Z.1
Huang, F.2
Ren, K.3
Weng, J.4
Wang, C.5
-
13
-
-
85048073162
-
Privacy preservation cloud storage architecture research
-
J. Hou, C. Piao, and T. Fan, "Privacy preservation cloud storage architecture research," J. Hebei Acad. Sci., vol. 30, no. 2, pp. 45-48, 2013.
-
(2013)
J. Hebei Acad. Sci.
, vol.30
, Issue.2
, pp. 45-48
-
-
Hou, J.1
Piao, C.2
Fan, T.3
-
14
-
-
80051569765
-
A method on protection of user data privacy in cloud storage platform
-
Q. Hou, Y. Wu, W. Zheng, and G. Yang, "A method on protection of user data privacy in cloud storage platform," J. Comput. Res. Develop., vol. 48, no. 7, pp. 1146-1154, 2011.
-
(2011)
J. Comput. Res. Develop.
, vol.48
, Issue.7
, pp. 1146-1154
-
-
Hou, Q.1
Wu, Y.2
Zheng, W.3
Yang, G.4
-
15
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham et al., "Xen and the art of virtualization," ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164-177, 2003.
-
(2003)
ACM SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
-
17
-
-
84991088919
-
Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Dec.
-
Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, "Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement," IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
18
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Sep.
-
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546-2559, Sep. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.9
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
19
-
-
84962448916
-
A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
-
Feb.
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
20
-
-
85077359111
-
Enabling semantic search based on conceptual graphs over encrypted outsourced data
-
[Online]
-
Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C.-N. Yang, "Enabling semantic search based on conceptual graphs over encrypted outsourced data," IEEE Trans. Serv. Comput.. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/TSC.2016.2622697
-
IEEE Trans. Serv. Comput.
-
-
Fu, Z.1
Huang, F.2
Sun, X.3
Vasilakos, A.4
Yang, C.-N.5
-
21
-
-
84872023192
-
Cloud storage architecture
-
G. Kulkarni, R. Waghmare, R. Palwe, V. Waykule, H. Bankar, and K. Koli, "Cloud storage architecture," in Proc. 7th Int. Conf. Telecommun. Syst., Serv., Appl., 2012, pp. 76-81.
-
(2012)
Proc. 7th Int. Conf. Telecommun. Syst., Serv., Appl.
, pp. 76-81
-
-
Kulkarni, G.1
Waghmare, R.2
Palwe, R.3
Waykule, V.4
Bankar, H.5
Koli, K.6
-
22
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Feb.
-
C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
23
-
-
85020435750
-
An efficient public auditing protocol with novel dynamic structure for cloud data
-
Oct.
-
J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, "An efficient public auditing protocol with novel dynamic structure for cloud data," IEEE Trans. Inf. Forensics Security, vol. 12, no. 10, pp. 2402-2415, Oct. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.10
, pp. 2402-2415
-
-
Shen, J.1
Shen, J.2
Chen, X.3
Huang, X.4
Susilo, W.5
-
24
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
L. Wei et al., "Security and privacy for storage and computation in cloud computing," Inf. Sci., vol. 258, pp. 371-386, 2014.
-
(2014)
Inf. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
-
25
-
-
85048079156
-
Formulating a security layer of cloud data storage framework based on multi agent system architecture
-
R. Atan, A.M. Talib, and M. A. A. Murad, "Formulating a security layer of cloud data storage framework based on multi agent system architecture," GSTF J. Comput., vol. 1, no. 1, pp. 121-124, 2014.
-
(2014)
GSTF J. Comput.
, vol.1
, Issue.1
, pp. 121-124
-
-
Atan, R.1
Talib, A.M.2
Murad, M.A.A.3
-
26
-
-
85018555959
-
Maintaining the balance between privacy and data integrity in internet of things
-
M. Z. A. Bhuiyan, T. Wang, T. Hayajneh, and G. M. Weiss, "Maintaining the balance between privacy and data integrity in internet of things," in Proc. Int. Conf. Manage. Eng., Softw. Eng. Serv. Sci., 2017, pp. 177-182.
-
(2017)
Proc. Int. Conf. Manage. Eng., Softw. Eng. Serv. Sci.
, pp. 177-182
-
-
Bhuiyan, M.Z.A.1
Wang, T.2
Hayajneh, T.3
Weiss, G.M.4
-
27
-
-
84866627419
-
Fog computing and its role in the internet of things
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proc. 1st Edition MCC Workshop Mobile Cloud Comput, 2012, pp. 13-16.
-
(2012)
Proc. 1st Edition MCC Workshop Mobile Cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
28
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Comput. Netw., vol. 52, no. 12, pp. 2292-2330, 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
29
-
-
84947260890
-
Maximizing real-time streaming services based on a multi-servers networking framework
-
T. Wang et al., "Maximizing real-time streaming services based on a multi-servers networking framework," Comput. Netw., vol. 93, pp. 199-212, 2015.
-
(2015)
Comput. Netw.
, vol.93
, pp. 199-212
-
-
Wang, T.1
-
30
-
-
84978471363
-
Reliable wireless connections for fast-moving rail users based on a chained fog structure
-
T. Wang et al., "Reliable wireless connections for fast-moving rail users based on a chained fog structure," Inf. Sci., vol. 379, pp. 160-176, 2017.
-
(2017)
Inf. Sci.
, vol.379
, pp. 160-176
-
-
Wang, T.1
-
31
-
-
85013200542
-
Data delivery from WSNs to cloud based on a fog structure
-
J. Zeng, T. Wang, Y. Lai, J. Liang, and H. Chen, "Data delivery from WSNs to cloud based on a fog structure," in Proc. Int. Conf. Adv. Cloud Big Data, 2016, pp. 104-109.
-
(2016)
Proc. Int. Conf. Adv. Cloud Big Data
, pp. 104-109
-
-
Zeng, J.1
Wang, T.2
Lai, Y.3
Liang, J.4
Chen, H.5
-
32
-
-
70349459300
-
Cloud computing: Distributed internet computing for it and scientific research
-
Sep./Oct.
-
M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, "Cloud computing: Distributed internet computing for it and scientific research," IEEE Internet Comput., vol. 13, no. 5, pp. 10-13, Sep./Oct. 2009.
-
(2009)
IEEE Internet Comput.
, vol.13
, Issue.5
, pp. 10-13
-
-
Dikaiakos, M.D.1
Katsaros, D.2
Mehra, P.3
Pallis, G.4
Vakali, A.5
-
33
-
-
84966258415
-
A geometric approach to the representations of the full linear group over a galois field
-
R. Steinberg, "A geometric approach to the representations of the full linear group over a galois field," Trans. Amer. Math. Soc., vol. 71, no. 2, pp. 274-282, 1951.
-
(1951)
Trans. Amer. Math. Soc.
, vol.71
, Issue.2
, pp. 274-282
-
-
Steinberg, R.1
|