A Security-By-Distribution Approach to Manage Big Data in a Federation of Untrustworthy Clouds
暂无分享,去创建一个
[1] Kiril Ivanov Simov,et al. Analysis of the Join Performance in Vertically Distributed Cloud Databases , 2015, Int. J. Adapt. Resilient Auton. Syst..
[2] Luca Benini,et al. Collecting Datasets from Ambient Intelligence Environments , 2010, Int. J. Ambient Comput. Intell..
[3] Ting Sang,et al. A Log Based Approach to Make Digital Forensics Easier on Cloud Computing , 2013, 2013 Third International Conference on Intelligent System Design and Engineering Applications.
[4] Arti Arun Mohanpurkar,et al. A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance , 2016, Int. J. Ambient Comput. Intell..
[5] Syed Akhter Hossain,et al. NoSQL Database: New Era of Databases for Big data Analytics - Classification, Characteristics and Comparison , 2013, ArXiv.
[6] Ali Awada,et al. A Logical Model for Narcissistic Personality Disorder , 2016, Int. J. Synth. Emot..
[7] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[8] P. Mell,et al. SP 800-145. The NIST Definition of Cloud Computing , 2011 .
[9] E. F. Codd,et al. A relational model of data for large shared data banks , 1970, CACM.
[10] Vishal Bhatnagar,et al. Movie Analytics for Effective Recommendation System using Pig with Hadoop , 2016, Int. J. Rough Sets Data Anal..
[11] Vishal Bhatnagar,et al. Olympics Big Data Prognostications , 2016, Int. J. Rough Sets Data Anal..
[12] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.
[13] Nilanjan Dey,et al. Internet of Things and Big Data Technologies for Next Generation Healthcare , 2017 .
[14] Anirban Kundu,et al. A service based trust management classifier approach for cloud security , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).
[15] Nilanjan Dey,et al. Theoretical Analysis of Different Classifiers under Reduction Rough Data Set: A Brief Proposal , 2016, Int. J. Rough Sets Data Anal..
[16] Jens Kohler,et al. Performance Analysis of Vertically Partitioned Data in Clouds Through a Client-Based In-Memory Key-Value Store Cache , 2015, CISIS-ICEUTE.
[17] Matthias Baumgarten,et al. Keyword-Based Sentiment Mining using Twitter , 2013, Int. J. Ambient Comput. Intell..
[18] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..
[19] Nilanjan Dey,et al. Watermarking in Biomedical Signal Processing , 2017 .
[20] Christoph Meinel,et al. HPISecure: Towards Data Confidentiality in Cloud Applications , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.
[21] Jens Kohler,et al. Analysis of cache implementations in a vertically distributed cloud data store , 2015, 2015 Third World Conference on Complex Systems (WCCS).
[22] Jemal H. Abawajy,et al. A Layered Security Approach for Cloud Computing Infrastructure , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
[23] Houda Labiod,et al. Vehicular Networks Security: Attacks, Requirements, Challenges and Current Contributions , 2009, Int. J. Ambient Comput. Intell..
[24] Francesca Odella,et al. Technology Studies and the Sociological Debate on Monitoring of Social Interactions , 2016, Int. J. Ambient Comput. Intell..
[25] Ming Li,et al. Storing Shared Data on the Cloud via Security-Mediator , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[26] Cindy Mason,et al. Engineering Kindness: Building a Machine with Compassionate Intelligence , 2015, Int. J. Synth. Emot..
[27] Anghel Leonard. Getting Started with Hibernate OGM , 2013 .
[28] Nancy A. Lynch,et al. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.
[29] Stefan Edlich,et al. NoSQL: Einstieg in die Welt nichtrelationaler Web 2.0 Datenbanken , 2011 .
[30] Kevin Waugh,et al. A Classification of Object-Relational Impedance Mismatch , 2009, 2009 First International Confernce on Advances in Databases, Knowledge, and Data Applications.
[31] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[32] Prashant Malik,et al. Cassandra: a decentralized structured storage system , 2010, OPSR.
[33] Eric A. Brewer,et al. Towards robust distributed systems (abstract) , 2000, PODC '00.