Data accessing based on the popularity value for cloud computing
暂无分享,去创建一个
Pinki Roy | Balamurugan Balusamy | Pandi Vijayakumar | Suyel Namasudra | P. Vijayakumar | S. Namasudra | B. Balusamy | Pinki Roy
[1] Yun Liu,et al. Read and reply behaviors in a BBS social network , 2010, 2010 2nd International Conference on Advanced Computer Control.
[2] Yu Zhang,et al. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[4] Pinki Roy,et al. Time efficient secure DNA based access control model for cloud computing environment , 2017, Future Gener. Comput. Syst..
[5] Abhishek Majumder,et al. Taxonomy and Classification of Access Control Models for Cloud Environments , 2014 .
[6] Huang Xiuli,et al. Access Control of Cloud Service Based on UCON , 2009, CLOUD-II 2009.
[7] Pinki Roy,et al. Secure and efficient data access control in cloud computing environment: A survey , 2016, Multiagent Grid Syst..
[8] Ahmad Khademzadeh,et al. A Three-Layer Access Control Architecture Based on UCON for Enhancing Cloud Computing Security , 2012 .
[9] Mateusz Dzida,et al. On popularity-based load balancing in content networks , 2012, 2012 24th International Teletraffic Congress (ITC 24).
[10] SK Hafizul Islam,et al. An effective key distribution for secure internet pay-TV using access key hierarchies , 2016, Secur. Commun. Networks.
[11] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Pinki Roy,et al. A new secure authentication scheme for cloud computing environment , 2017, Concurr. Comput. Pract. Exp..
[13] Abdul Raouf Khan,et al. ACCESS CONTROL IN CLOUD COMPUTING ENVIRONMENT , 2012 .
[14] Pinki Roy,et al. A New Table Based Protocol for Data Accessing in Cloud Computing , 2017, J. Inf. Sci. Eng..
[15] B. Balamurugan,et al. Extensive Survey on Usage of Attribute Based Encryption in Cloud , 2014 .
[16] Muttukrishnan Rajarajan,et al. Secure data access in cloud computing , 2010, 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application.
[17] P. Venkata Krishna,et al. An Efficient Framework for Health System Based on Hybrid Cloud with ABE-Outsourced Decryption , 2015 .
[18] Gail-Joon Ahn,et al. Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[20] Chittaranjan Hota,et al. Capability-based Cryptographic Data Access Control in Cloud Computing , 2011 .
[21] Jie Wu,et al. A connectivity-based popularity prediction approach for social networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[22] Ryan Ausanka-Crues,et al. Methods for Access Control : Advances and Limitations , 2006 .
[23] Lili Sun,et al. A purpose based usage access control model , 2010 .
[24] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[25] Binoy Krishna Roy,et al. Nonlinear Active Control Based Hybrid Synchronization between Hyperchaotic and Chaotic Systems , 2014 .
[26] Saroj K. Biswas,et al. Redundancy-driven modified Tomek-link based undersampling: A solution to class imbalance , 2017, Pattern Recognit. Lett..
[27] Rui Jiang,et al. A Novel Data Access Scheme in Cloud Computing , 2012 .
[28] Pinki Roy,et al. Cloud Computing: Fundamentals and Research Issues , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[29] Ripon Patgiri,et al. A Deep Dive into the Hadoop World to Explore Its Various Performances , 2016 .
[30] Xin Wang,et al. Popularity-driven coordinated caching in Named Data Networking , 2012, 2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).
[31] Abhishek Majumder,et al. Profile based access control model in cloud computing environment , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).
[32] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[33] Muthu Ramachandran,et al. Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .
[34] Binoy Krishna Roy,et al. A Novel hyperchaotic System with Stable and Unstable Line of Equilibria and Sigma Shaped Poincare Map , 2016 .