Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[2] Xin-She Yang,et al. Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).
[3] Marcos A. Simplício,et al. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.
[4] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[5] George Pallis,et al. Cloud Computing: The New Frontier of Internet Computing , 2010, IEEE Internet Computing.
[6] Siegfried Benkner,et al. Design of an Adaptive Framework for Utility-Based Optimization of Scientific Applications in the Cloud , 2012, 2012 IEEE Fifth International Conference on Utility and Cloud Computing.
[7] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[8] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[9] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[10] Alexander Schill,et al. User-controlled resource management in federated clouds , 2014, Journal of Cloud Computing.
[11] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[12] Faraz Fatemi Moghaddam,et al. A Hybrid Encryption Algorithm Based on RSA Small-e and Efficient-RSA for Cloud Computing Environments , 2013 .
[13] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[14] Mala Kalra,et al. Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[15] Wei Tan,et al. Self-Adaptive Learning PSO-Based Deadline Constrained Task Scheduling for Hybrid IaaS Cloud , 2014, IEEE Transactions on Automation Science and Engineering.
[16] Ian Sommerville,et al. An elastic virtual infrastructure for research applications (ELVIRA) , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[17] Nabil Sultan,et al. loud computing for education : A new dawn ? , 2009 .
[18] Mhamed Zineddine,et al. Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights , 2015, Comput. Secur..
[19] Hongqi Zhang,et al. Study of the AES Realization Method on the Reconfigurable Hardware , 2013, 2013 International Conference on Computer Sciences and Applications.
[20] Max Mühlhäuser,et al. Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[21] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[22] Kemal Bicakci,et al. Mobile Authentication Secure against Man-in-the-Middle Attacks , 2014, MobileCloud.