Cloud Security Using Face Recognition
暂无分享,去创建一个
[1] G. Nolan,et al. Computational solutions to large-scale data management and analysis , 2010, Nature Reviews Genetics.
[2] Günter Klambauer,et al. Enabling Large-Scale Bioinformatics Data Analysis with Cloud Computing , 2012, 2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications.
[3] Jacques M. Bahi,et al. A Complete Security Framework for Wireless Sensor Networks: Theory and Practice , 2015, Int. J. Inf. Technol. Web Eng..
[4] Shin-Jer Yang,et al. Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[5] Jameela Al-Jaroodi,et al. An Efficient Fault-Tolerant Algorithm for Distributed Cloud Services , 2012, 2012 Second Symposium on Network Cloud Computing and Applications.
[6] Khalid Al-Begain,et al. Quality of Service for Multimedia and Real-Time Services , 2010, Int. J. Inf. Technol. Web Eng..
[7] Brij Bhooshan Gupta,et al. Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing , 2017, Int. J. Web Serv. Res..
[8] Ganesh Chandra Deka,et al. A Survey of Cloud Database Systems , 2014, IT Professional.
[9] Kenneth J. Knapp,et al. Key issues in data center security: An investigation of government audit reports , 2011, Gov. Inf. Q..
[10] Omar Banimelhem,et al. An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks , 2013, Int. J. Inf. Technol. Web Eng..
[11] Christian Senk,et al. Biometric authentication as a service for enterprise identity management deployment: a data protection perspective , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[12] Bhavani M. Thuraisingham,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[13] Schahram Dustdar,et al. DEMODS: A Description Model for Data-as-a-Service , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[14] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[15] Yannis Manolopoulos,et al. Indexing Techniques for Web Access Logs , 2004 .
[16] T. Banirostam,et al. Functional Control of Users by Biometric Behavior Features in Cloud Computing , 2013, 2013 4th International Conference on Intelligent Systems, Modelling and Simulation.
[17] Hong Tang,et al. Voiceprint-biometric template design and authentication based on cloud computing security , 2011, 2011 International Conference on Cloud and Service Computing.
[18] R. Vanathi,et al. Improving the Security of Cloud Computing using Trusted Computing Technology , 2012 .
[19] Chandrakant D. Patel,et al. Everything as a Service: Powering the New Information Economy , 2011, Computer.
[20] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[21] Theo Huibers,et al. How Interface Design and Search Strategy Influence Children’s Search Performance and Evaluation , 2014 .
[22] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[23] James L. Wayman,et al. Technical Testing and Evaluation of Biometric Identification Devices , 1996 .
[24] Chen-Nee Chuah,et al. Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center , 2011, INFOCOM 2011.
[25] Dimitrios Katsaros,et al. Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.
[26] K. Menon,et al. Cloud computing: Applications in biological research and future prospects , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).
[27] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[28] N. Raghavendra Rao. Enterprise Management Strategies in the Era of Cloud Computing , 2015 .
[29] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[30] V. Joshi,et al. Three tier data storage security in cloud using Face fuzzy vault , 2012, 2012 International Conference on Computing, Communication and Applications.
[31] Yongzhao Zhan,et al. Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.
[32] Naixue Xiong,et al. A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications , 2011, IEEE Systems Journal.
[33] Tor-Morten Grønli,et al. Performance Evaluation of a Modern Web Architecture , 2013, Int. J. Inf. Technol. Web Eng..
[34] José Luis Alba Castro,et al. Secure crypto-biometric system for cloud computing , 2011 .
[35] James L. Wayman,et al. Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..
[36] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[37] Mikhail Khitrov,et al. Talking passwords: voice biometrics for data access and security , 2013 .
[38] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .