Elucidating the Robust and Resilient Cloud Security Solution Approaches
暂无分享,去创建一个
Pethuru Raj | John Bosco Balaguru Rayappan | Rengarajan Amirtharaj | A. Parvathy | C. Nithya | K. Thenmozhi
[1] Fengju Kang,et al. Cloud Simulation Resource Scheduling Algorithm Based on Multi-dimension Quality of Service , 2012 .
[2] Bo Ding,et al. A Cloud-Based Collaborative Manufacturing Resource Sharing Services , 2012 .
[3] Rusli Abdullah,et al. Security Facilitation in Collaborative Cloud Data Storage Implementation Environment Based on Multi Agent System Architecture , 2012 .
[4] Yingjie Xia,et al. A Hierarchical Access Control Scheme in Cloud using HHECC , 2010 .
[5] Yu Dingguo,et al. Research on Trust Cloud-based Subjective Trust Management Model under Open Network Environment , 2011 .
[6] Elijah Blessing Rajsingh,et al. Efficient Service Selection Middleware using ELECTRE Methodology for Cloud Environments , 2012 .
[7] Hao Yuan,et al. Resource Scheduling of Cloud Computing for Node of Wireless Sensor Network Based on Ant Colony Algorithm , 2012 .
[8] Rusli Abdullah,et al. Multi Agent System Architecture Oriented Prometheus Methodology Design to Facilitate Security of Cloud Data Storage , 2011 .
[9] Dongqing Xie,et al. A High-capacity Steganographic Scheme for 3D Point Cloud Models , 2010 .
[10] Zetao Jiang,et al. A New Rapid Triangulation Method of Space Closed Point Cloud , 2011 .
[11] Isabella M. Venter,et al. Grid Security: Evaluation of Active and Passive Attacks with Proposed Countermeasures , 2011 .
[12] Ademola P. Abidoye,et al. A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment , 2012 .
[13] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..