Effective Data Storage Security with Efficient Computing in Cloud
暂无分享,去创建一个
[1] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[2] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[3] Emad Nabil,et al. A Modified Flower Pollination Algorithm for Global Optimization , 2016, Expert Syst. Appl..
[4] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[5] Shafii Muhammad Abdulhamid,et al. Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities , 2016, J. Netw. Comput. Appl..
[6] Gary B. Wills,et al. Protecting data in personal cloud storage with security classifications , 2015, 2015 Science and Information Conference (SAI).
[7] S. Mary Saira Bhanu,et al. Two layered protection for sensitive data in cloud , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[8] Kenneth Morgan,et al. Modified cuckoo search: A new gradient free optimisation algorithm , 2011 .
[9] Faraz Fatemi Moghaddam,et al. A scalable and efficient user authentication scheme for cloud computing environments , 2014, 2014 IEEE REGION 10 SYMPOSIUM.
[10] Kiranbir Kaur,et al. An Adaptive Firefly Algorithm for Load Balancing in Cloud Computing , 2016, SocProS.
[11] Arun Kumar Sangaiah,et al. A comparative study of cuckoo search and flower pollination algorithm on solving global optimization problems , 2017, Libr. Hi Tech.
[12] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..
[13] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[14] K. Chandrasekaran,et al. Bat algorithm for scheduling workflow applications in cloud , 2015, 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV).
[15] Sarbjeet Singh,et al. A review of metaheuristic scheduling techniques in cloud computing , 2015 .
[16] David M. Nicol,et al. Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[17] Dai Yuefa. Data Security Model for Cloud Computing , 2009 .
[18] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[19] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[20] Saida Makhloufi,et al. Three powerful nature-inspired algorithms to optimize power flow in Algeria's Adrar power system , 2016 .
[21] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..