An Efficent Security Farmework Design for Cloud Computing using Artificial Neural Networks
暂无分享,去创建一个
[1] D. Prasad,et al. An Etiquette Approach for Public Audit and Preserve Data at Cloud , 2014 .
[2] Sanjeev Kumar,et al. A Comparative Study of Call Admission Control in Mobile Multimedia Networks using Soft Computing , 2014 .
[3] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[4] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[5] Krishan Kumar,et al. A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN) , 2014, ICTCS '14.
[6] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[7] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[8] Ahmed Shawish,et al. Cloud Computing: Paradigms and Technologies , 2014 .
[9] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[10] Jacek M. Zurada,et al. Introduction to artificial neural systems , 1992 .
[11] Hakim Weatherspoon,et al. RACS: a case for cloud storage diversity , 2010, SoCC '10.
[12] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[13] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[14] Jin Wang,et al. Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update , 2014 .
[15] Siani Pearson,et al. An Adaptive Privacy Management System for Data Repositories , 2005, TrustBus.
[16] D. Meng. Data security in cloud computing , 2013, 2013 8th International Conference on Computer Science & Education.
[17] Yen-Chang Chen,et al. A counterpropagation fuzzy-neural network modeling approach to real time streamflow prediction , 2001 .
[18] Satish Kumar Pradhan,et al. Cryptography using Artificial Neural Networks , 2009 .
[19] David W. Chadwick,et al. A privacy preserving authorisation system for the cloud , 2012, J. Comput. Syst. Sci..
[20] Peter J. Denning,et al. Data Security , 1979, CSUR.
[21] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[22] Anazida Zainal,et al. Data integrity and privacy model in cloud computing , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[23] Pramod Kumar,et al. Mobility based call admission control and resource estimation in mobile multimedia networks using artificial neural networks , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).