Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes
暂无分享,去创建一个
[1] John Wang. Implementation and Integration of Information Systems in the Service Sector , 2012 .
[2] Kris Luyten,et al. A Unified Approach to Uncertainty-Aware Ubiquitous Localisation of Mobile Users , 2011, Int. J. Inf. Technol. Web Eng..
[3] Rajkumar Buyya,et al. NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[4] Dzmitry Kliazovich,et al. GreenCloud: A Packet-Level Simulator of Energy-Aware Cloud Computing Data Centers , 2010, GLOBECOM.
[5] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[6] Ada Scupola. Developing Technologies in E-Services, Self-Services, and Mobile Communication: New Concepts , 2011 .
[7] Massimo Villari,et al. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice , 2012 .
[8] Jie Wu,et al. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..
[9] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[10] Alice Good,et al. Impact of EU data protection laws on cloud-computing:capturing cloud-computing challenges and fault lines , 2015 .
[11] Ernesto Damiani,et al. An Agent-Based Model for Awareness-Based Sustainability , 2015 .
[12] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[13] Barry W. Johnson. Design & analysis of fault tolerant digital systems , 1988 .
[14] Rajkumar Buyya,et al. CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..
[17] Mark de Reuver,et al. Opening Up the Smart Home: A Classification of Smart Living Service Platforms , 2013, Int. J. E Serv. Mob. Appl..
[18] Jaime Gómez,et al. Tool Support for Model-driven Development of Web Applications , 2005, Int. J. Inf. Technol. Web Eng..
[19] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[20] Kyrill Meyer,et al. How IT-Enabled Services Can Help to Change our World Building Networks for the Energy-Efficient City of Tomorrow , 2011, Int. J. Serv. Sci. Manag. Eng. Technol..
[21] Hui Li,et al. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.
[22] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[23] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[24] Abdelkader Bousselham,et al. GPU Scaling: From Personal Supercomputing to the Cloud , 2014, Int. J. Inf. Technol. Web Eng..
[25] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[26] Anirban Kundu,et al. Page Ranking Validation using Cellular Automata in Cloud , 2015, Int. J. Cloud Appl. Comput..
[27] Raj Kumar,et al. Handbook of Research on Promotional Strategies and Consumer Influence in the Service Sector , 2016 .
[28] Kirk D. Fiedler,et al. The Impact of Location-Aware Systems in Hospitals: A Tri-Core Perspective , 2011, Int. J. Inf. Syst. Serv. Sect..
[29] Rajkumar Buyya,et al. Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities , 2009, 2009 International Conference on High Performance Computing & Simulation.
[30] Naveen Sharma,et al. Towards autonomic workload provisioning for enterprise Grids and clouds , 2009, 2009 10th IEEE/ACM International Conference on Grid Computing.
[31] Ramakrishna Kotla,et al. Zyzzyva: speculative byzantine fault tolerance , 2007, TOCS.
[32] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.