A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Although, the literature provides a large number of references to works that consider cloud computing security issues, no work has been provided, to our knowledge, which supports the elicitation of security ... These challenges need to be understood and analysed in the context of an organisation's security and privacy goals and relevant cloud computing deployment models. ... Section 2 presents cloud computing and it discusses security and privacy properties relate to it, focusing on cloud computing specific security and privacy properties. ...doi:10.1007/s00766-013-0166-7 fatcat:eruxlt4seba4zhrq5fbacm43lq
Hubaux, Securing vehicular ad hoc networks (1) 39 -68 Rossi, S., see Bossi, A. (3) 373 -416 Skalka, C., X.S. Wang and P. ... IOS Press Author Index Volume 15 (2007) The issue number is given in front of the page numbers. Backes, M., D. Basin and M. ...doi:10.3233/jcs-2007-15606 fatcat:epmnd3ykdjcbdc244ykrj5rinq
., +, LOCS Dec. 2019 36-39 Game theory A Secure Virtual Controller for Traffic Management in SDN. ... Rakus, M., +, LOCS June 2019 9-11 Rendering (computer graphics) A S T V X ...doi:10.1109/locs.2020.2964156 fatcat:2if35ztherbxdpfej42fneplfu
In Okamoto Sihan Qing Yongfei Han Tatsuaki, editor, Information and Communications Security: First In- ternational Conference, volume 1334 of Lecture Notes in Computer Science. ... Davida and Yair Frankel, editors, Information Security: Fourth International Conference, volume 2200 of Lecture Notes in Computer Science, page 156ff. Springer, October 2001. Richard Bergmair 19. ...doi:10.1117/12.711325 dblp:conf/sswmc/Bergmair07 fatcat:t24nhyv5yjap7agw4lli5zwgme
VOLUME XX, 2017 1 ⤱ LXKXD  ⤱ CYL  ⤱ HZJX  ⤱ QTLG  Our CB-PS 2) COMPUTATIONAL COST In Table ... EFFICIENCY In this phase, we compare our CB-PS with the existing related schemes TBKAV  , LXKXD  , CYL  , HZJX  , and QTLG  on the basis of three major parameters: security, computational ... Figure 5: Computational cost comparison 3) COMMUNICATION OVERHEAD Sending additional bits along with the actual cipher text is called communication overhead. ...doi:10.1109/access.2020.3033758 fatcat:745n3yssvnhnffzcy2zkggbfvu
Journal of Systems Management
Computer Network Security Design Considerations [2 Volumes] by Gerald Cole [Vol. 1] and Frank Heinrich [Vol. 2]. [U.S.] National Bureau of Stan- dards Monograph 500-21. ... DP SECURITY. Computer Security Manage- ment by Donn Parker. (Reston Publishing, 11480 Sunset Hills Rd., Reston VA 22090. Price: $14.95.)... Fighting Computer Crime by Donn Parker. ...
Cloud computing Security association also discussed the main challenges of security of big data on cloud environment as [28, 38, 46, 47, 64, 70, 79] : "Secure the computation in distributed programming ... p-39 L. Review= 1 1 1 PCSC6.5 Over the internet (broadband networks) a cloud computing vendors organization can provides all services to their end users. ... Author Name: Preparation of Papers for IEEE Access (February 2017) 23 VOLUME XX, 2017 organization level of our proposed security model and finally to assist them in using big data on cloud. ...doi:10.1109/access.2021.3100287 fatcat:5y74lr46c5ehbc72agpdw7fbcq
Ryan, Privacy-supporting cloud computing by in-browser key translation (6) (1) 41 -87 Bilogrevic, I., see Jadliwala, M. ( (1) 1 -39 Du, Y., see Homer, J. (4) 561 -597 El Defrawy, K., see Baron, J. ( ... IOS Press Author Index Volume 21 (2013) The issue number is given in front of the page numbers. Acar, U.A., A. Ahmed, J. Cheney and R. ...doi:10.3233/jcs-2013-21608 fatcat:tlsvkxt5fzb4vdcxvqzjwwruca
WILLIAM SCHLEICHER, JR. 39 ... Computations by this Bank. MARCH 1967 Common Characteristics The high volume does not necessarily indicate that the increase was shared by all types of cor- porations. ...
Journal of the Midwest Association for Information Systems
Given the relevance of computer security in today's IT environment, this finding suggests that enterprise computer security is an under studied research topic. ... security risk. ... Acuna / Enterprise Computer Security Journal of the Midwest Association for Information Systems | Vol. 2016, Issue 1, January 2016 ...doi:10.17705/3jmwa.00016 fatcat:bm63xfa6vre6lbkavo7lowdluy
INDEX TERMS Cloud computing, cloud security, security domains, security compliance models, cloud security models. ... It includes the data threats and security controls that are needed to mitigate the risks. ... His research interests include cloud computing and financial services. VOLUME 8, 2020 FIGURE 1 . 1 High-level reference architecture of cloud data security. ...doi:10.1109/access.2020.3008964 fatcat:fs3i5xhzrnavhbs6v4lqt6wz4a
(Glossary for Computer Systems Security, FIPS Pub. 39, SD Cat. No. C13.52:39, available at 60 cents from Superintendent of Documents, Government of Printing Office, Wash., DC 20402.) ... COMPUTER SECURITY: pertaining to privacy, and security related to data information systems hardware Alphabetic listing of approximately 170 terms and definitions and software. 19 pages. ...
As for handling the limited energy constraint, we employ the mobile edge computing (MEC) method to offload the computing tasks to alleviate the computational burden and energy consumption of the proposed ... To address the security issue, a permissioned blockchain method is adopted to guarantee the security of the proposed H-IoT system. ... . .}), the H-IoT system generates a computing task of C (k) bits at time slot k  . ...doi:10.1109/access.2022.3176444 fatcat:3zcbwuyopzb75oladlcbj4c5qu
camid=4v1 This title is available in InfoSci-Journals, InfoSci-Select, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology, InfoSci-Knowledge Discovery, Information ... Journal of Global Information Management (pp. 39-41). www.igi-global.com/article/expert-opinion/51246? ...doi:10.4018/jgim.2017100105 fatcat:vzuve565lfgjdhhx7juopyt5ga
AUTHOR INDEX VOLUME 39 (1985) (The issue number is given in front of the page numbers) Arnold, A., A syntactic congruence for rational to-languages (Note) (2, 3) 333-335 Back, R.J.R. and H. ... Otto, On the security of name-stamp protocols Heintz, J., Definability and fast quantifier elimination in algebraically closed fields 47-68 Berarducci, A., see C. ...doi:10.1016/0304-3975(85)90152-5 fatcat:bxtjhuy4mzcobpmadiz3rifdlu
« Previous Showing results 1 — 15 out of 191,627 results