Design and Performance Characterization of Practically Realizable Graph-Based Security Aware Algorithms for Hierarchical and Non-hierarchical Cloud Architectures
暂无分享,去创建一个
Bharadwaj Veeravalli | Xiaoli Wang | Rahul Vishwanath Kale | B. Veeravalli | Rahul Kale | Xiaoli Wang
[1] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[2] Yun Tian,et al. SecHDFS: A Secure Data Allocation Scheme for Heterogenous Hadoop Systems , 2016, 2016 IEEE International Conference on Networking, Architecture and Storage (NAS).
[3] Abdelhamid Mellouk,et al. ITS-cloud: Cloud computing for Intelligent transportation system , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[4] Stergios V. Anastasiadis,et al. Virtualization-aware access control for multitenant filesystems , 2014, 2014 30th Symposium on Mass Storage Systems and Technologies (MSST).
[5] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.
[6] Patrick Martin,et al. Secure and Efficient Data Placement in Mobile Healthcare Services , 2014, DEXA.
[7] Dong Lin,et al. Data Center Networks , 2013, SpringerBriefs in Computer Science.
[8] Wei Du,et al. Security-aware intermediate data placement strategy in scientific cloud workflows , 2014, Knowledge and Information Systems.
[9] Meikang Qiu,et al. Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.
[10] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[11] Dianxiang Xu,et al. Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing , 2012, Journal of Grid Computing.
[12] Seungmin Kang,et al. A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[13] Gongjun Yan,et al. Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.
[14] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.