191,627 Hits in 3.9 sec

Evaluating cloud deployment scenarios based on security and privacy requirements

Christos Kalloniatis, Haralambos Mouratidis, Shareeful Islam
2013 Requirements Engineering  
Although, the literature provides a large number of references to works that consider cloud computing security issues, no work has been provided, to our knowledge, which supports the elicitation of security  ...  These challenges need to be understood and analysed in the context of an organisation's security and privacy goals and relevant cloud computing deployment models.  ...  Section 2 presents cloud computing and it discusses security and privacy properties relate to it, focusing on cloud computing specific security and privacy properties.  ... 
doi:10.1007/s00766-013-0166-7 fatcat:eruxlt4seba4zhrq5fbacm43lq

Author Index Volume 15 (2007)

2007 Journal of Computer Security  
Hubaux, Securing vehicular ad hoc networks (1) 39 -68 Rossi, S., see Bossi, A. (3) 373 -416 Skalka, C., X.S. Wang and P.  ...  IOS Press Author Index Volume 15 (2007) The issue number is given in front of the page numbers. Backes, M., D. Basin and M.  ... 
doi:10.3233/jcs-2007-15606 fatcat:epmnd3ykdjcbdc244ykrj5rinq

2019 Index IEEE Letters of the Computer Society Vol. 2

2020 Letters of the IEEE Computer Society  
., +, LOCS Dec. 2019 36-39 Game theory A Secure Virtual Controller for Traffic Management in SDN.  ...  Rakus, M., +, LOCS June 2019 9-11 Rendering (computer graphics) A S T V X  ... 
doi:10.1109/locs.2020.2964156 fatcat:2if35ztherbxdpfej42fneplfu

A comprehensive bibliography of linguistic steganography

Richard Bergmair
2007 Security, Steganography, and Watermarking of Multimedia Contents IX  
In Okamoto Sihan Qing Yongfei Han Tatsuaki, editor, Information and Communications Security: First In- ternational Conference, volume 1334 of Lecture Notes in Computer Science.  ...  Davida and Yair Frankel, editors, Information Security: Fourth International Conference, volume 2200 of Lecture Notes in Computer Science, page 156ff. Springer, October 2001. Richard Bergmair 19.  ... 
doi:10.1117/12.711325 dblp:conf/sswmc/Bergmair07 fatcat:t24nhyv5yjap7agw4lli5zwgme

A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems

Insaf Ullah, Noor Ul Amin, Ahmad Almogren, Muhammad Asghar Khan, M. Irfan Uddin, Qiaozhi Hua
2020 IEEE Access  
VOLUME XX, 2017 1     ⤱    LXKXD [2]     ⤱    CYL [39]     ⤱    HZJX [40]     ⤱    QTLG [38]         Our CB-PS         2) COMPUTATIONAL COST In Table  ...  EFFICIENCY In this phase, we compare our CB-PS with the existing related schemes TBKAV [1] , LXKXD [2] , CYL [39] , HZJX [40] , and QTLG [38] on the basis of three major parameters: security, computational  ...  Figure 5: Computational cost comparison 3) COMMUNICATION OVERHEAD Sending additional bits along with the actual cipher text is called communication overhead.  ... 
doi:10.1109/access.2020.3033758 fatcat:745n3yssvnhnffzcy2zkggbfvu

Page 39 of Journal of Systems Management Vol. 34, Issue 12 [page]

1983 Journal of Systems Management  
Computer Network Security Design Considerations [2 Volumes] by Gerald Cole [Vol. 1] and Frank Heinrich [Vol. 2]. [U.S.] National Bureau of Stan- dards Monograph 500-21.  ...  DP SECURITY. Computer Security Manage- ment by Donn Parker. (Reston Publishing, 11480 Sunset Hills Rd., Reston VA 22090. Price: $14.95.)... Fighting Computer Crime by Donn Parker.  ... 

Analyzing and Evaluating critical challenges and practices for software vendor organizations to secure Big Data on Cloud Computing: An AHP-based Systematic Approach

Abdul Wahid Khan, Maseeh Ullah Khan, Javed Ali Khan, Arshad Ahmad, Khalil Khan, Muhammad Zamir, Wonjoon Kim, Muhammad Fazal Ijaz
2021 IEEE Access  
Cloud computing Security association also discussed the main challenges of security of big data on cloud environment as [28, 38, 46, 47, 64, 70, 79] :  "Secure the computation in distributed programming  ...  p-39 L. Review= 1 1 1 PCSC6.5 Over the internet (broadband networks) a cloud computing vendors organization can provides all services to their end users.  ...  Author Name: Preparation of Papers for IEEE Access (February 2017) 23 VOLUME XX, 2017 organization level of our proposed security model and finally to assist them in using big data on cloud.  ... 
doi:10.1109/access.2021.3100287 fatcat:5y74lr46c5ehbc72agpdw7fbcq

Author Index Volume 21 (2013)

2013 Journal of Computer Security  
Ryan, Privacy-supporting cloud computing by in-browser key translation (6) (1) 41 -87 Bilogrevic, I., see Jadliwala, M. ( (1) 1 -39 Du, Y., see Homer, J. (4) 561 -597 El Defrawy, K., see Baron, J. (  ...  IOS Press Author Index Volume 21 (2013) The issue number is given in front of the page numbers. Acar, U.A., A. Ahmed, J. Cheney and R.  ... 
doi:10.3233/jcs-2013-21608 fatcat:tlsvkxt5fzb4vdcxvqzjwwruca

Page 39 of Economic Review - Federal Reserve Bank of Atlanta Vol. , Issue [page]

1967 Economic Review - Federal Reserve Bank of Atlanta  
WILLIAM SCHLEICHER, JR. 39  ...  Computations by this Bank. MARCH 1967 Common Characteristics The high volume does not necessarily indicate that the increase was shared by all types of cor- porations.  ... 

Enterprise Computer Security: A Literature Review

Dennis Acuna
2016 Journal of the Midwest Association for Information Systems  
Given the relevance of computer security in today's IT environment, this finding suggests that enterprise computer security is an under studied research topic.  ...  security risk.  ...  Acuna / Enterprise Computer Security Journal of the Midwest Association for Information Systems | Vol. 2016, Issue 1, January 2016  ... 
doi:10.17705/3jmwa.00016 fatcat:bm63xfa6vre6lbkavo7lowdluy

An Integrated Knowledge Graph to Automate Cloud Data Compliance

Karuna Pande Joshi, Lavanya Elluri, Ankur Nagar, Amith Hendre
2020 IEEE Access  
INDEX TERMS Cloud computing, cloud security, security domains, security compliance models, cloud security models.  ...  It includes the data threats and security controls that are needed to mitigate the risks.  ...  His research interests include cloud computing and financial services. VOLUME 8, 2020 FIGURE 1 . 1 High-level reference architecture of cloud data security.  ... 
doi:10.1109/access.2020.3008964 fatcat:fs3i5xhzrnavhbs6v4lqt6wz4a

Page 5 of Science Trends Vol. 36, Issue 11 [page]

1976 Science Trends  
(Glossary for Computer Systems Security, FIPS Pub. 39, SD Cat. No. C13.52:39, available at 60 cents from Superintendent of Documents, Government of Printing Office, Wash., DC 20402.)  ...  COMPUTER SECURITY: pertaining to privacy, and security related to data information systems hardware Alphabetic listing of approximately 170 terms and definitions and software. 19 pages.  ... 

Permissioned Blockchain and Deep Reinforcement Learning Enabled Security and Energy Efficient Healthcare Internet of Things

Long Liu, Zhichao Li
2022 IEEE Access  
As for handling the limited energy constraint, we employ the mobile edge computing (MEC) method to offload the computing tasks to alleviate the computational burden and energy consumption of the proposed  ...  To address the security issue, a permissioned blockchain method is adopted to guarantee the security of the proposed H-IoT system.  ...  . .}), the H-IoT system generates a computing task of C (k) bits at time slot k [39] .  ... 
doi:10.1109/access.2022.3176444 fatcat:3zcbwuyopzb75oladlcbj4c5qu

Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique

B.V.D. S. Sekhar, P.V.G.D. Prasad Reddy, G.P.S. Varma
2017 Journal of Global Information Management  
camid=4v1 This title is available in InfoSci-Journals, InfoSci-Select, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology, InfoSci-Knowledge Discovery, Information  ...  Journal of Global Information Management (pp. 39-41).  ... 
doi:10.4018/jgim.2017100105 fatcat:vzuve565lfgjdhhx7juopyt5ga

Author index volume 39 (1985)

1985 Theoretical Computer Science  
AUTHOR INDEX VOLUME 39 (1985) (The issue number is given in front of the page numbers) Arnold, A., A syntactic congruence for rational to-languages (Note) (2, 3) 333-335 Back, R.J.R. and H.  ...  Otto, On the security of name-stamp protocols Heintz, J., Definability and fast quantifier elimination in algebraically closed fields 47-68 Berarducci, A., see C.  ... 
doi:10.1016/0304-3975(85)90152-5 fatcat:bxtjhuy4mzcobpmadiz3rifdlu
« Previous Showing results 1 — 15 out of 191,627 results