Cloud Security and Compliance - A Semantic Approach in End to End Security
暂无分享,去创建一个
[1] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[2] Ryohei Egusa,et al. EDA-BASED ESTIMATION OF VISUAL ATTENTION BY OBSERVATION OF EYE BLINK FREQUENCY , 2017 .
[3] Canras Batunlu,et al. SMART SENSING SYSTEM FOR ENHANCEING THE RELIABILITY OF POWER ELECTRONIC DEVICES USED IN WIND TURBINES , 2017 .
[4] Guowu Yang,et al. Optimal synthesis of multiple output Boolean functions using a set of quantum gates by symbolic reachability analysis , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[5] Jianbo Li,et al. SOCIAL POPULARITY BASED ROUTING IN DELAY TOLERANT NETWORKS , 2016 .
[6] Yen-Hong A. Chen,et al. ASSESSMENT TO EFFECTIVENESS OF THE NEW EARLY STREAMER EMISSION LIGHTNING PROTECTION SYSTEM , 2017 .
[7] J. M. Gnanasekar,et al. Sector Routing Protocol (SRP) in Ad-hoc Networks , 2015 .
[8] Farah Sharmin,et al. Design of a Compact Reversible Random Access Memory , 2011 .
[9] Mustapha Nadi,et al. AN IN VITRO COST-EFFECTIVE TEST BENCH FOR ACTIVE CARDIAC IMPLANTS, REPRODUCING HUMAN EXPOSURE TO ELECTRIC FIELDS 50 HZ , 2017 .
[10] Paolo Visconti,et al. Development and Characterization of a Solarbased Energy Harvesting and Power Management System for a WSN Node Applied to Optimized Goods Transport and Storage , 2016 .
[11] M.Rajesh J.M Gnanasekar. Routing and Broadcast Development for Minimizing Transmission Interruption in Multi rate Wireless Mesh Networks using Directional Antennas , 2015 .
[12] Iman Heidarpour Shahrezaei,et al. A TOTAL QUALITY ASSESSMENT SOLUTION FOR SYNTHETIC APERTURE RADAR NLFM WAVEFORM GENERATION AND EVALUATION IN A COMPLEX RANDOM MEDIA , 2017 .
[13] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[14] Patrizio Primiceri,et al. A SOLAR-POWERED WHITE LED-BASED UV-VIS SPECTROPHOTOMETRIC SYSTEM MANAGED BY PC FOR AIR POLLUTION DETECTION IN FARAWAY AND UNFRIENDLY LOCATIONS , 2017 .
[15] Olfa Boubaker,et al. Full Order Unknown Inputs Observer for Multiple Time-Delay Systems , 2016 .
[16] Sallehuddin Ibrahim,et al. TECHNIQUES IN ADVANCING THE CAPABILITIES OF VARIOUS NITRATE DETECTION METHODS: A REVIEW , 2017 .
[17] J. van Leeuwen,et al. Information Security , 2003, Lecture Notes in Computer Science.
[18] M. Rajesh,et al. GCC over Heterogeneous Wireless Ad hoc Networks , 2015 .
[19] Lafifa Jamal,et al. Design of Optimal Reversible Carry Look-Ahead Adder with Optimal Garbage and Quantum Cost , 2012 .
[20] Kamakoti Veezhinathan,et al. Constructing Online Testable Circuits Using Reversible Logic , 2010, IEEE Transactions on Instrumentation and Measurement.
[21] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[22] Aslam B Nandyal,et al. ENHANCEMENT OF CLOUD SECURITY THROUGH SCHEDULED HIDING OF DATA , 2015 .
[23] Samarendra Nath Sur,et al. FEEDBACK EQUALIZER FOR VEHICULAR CHANNEL , 2017 .
[25] Chokri Rekik,et al. DESIGN AND DEVELOPMENT OF 3D PRINTED MYOELECTRIC ROBOTIC EXOSKELETON FOR HAND REHABILITATION , 2017 .
[26] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[27] J. M. Gnanasekar,et al. Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Int. J. Wirel. Mob. Comput..