搜索资源列表
-
0下载:
With the accelerate implementation of information and the rapid development of e-commerce and e-government, the network security is of great significance. Now people are more concerned about how to ensure working at a trusted network environment. In
-
-
0下载:
Security in computing的最新版,对学习data security的人很有帮助-The latest version of Security in computing, very helpful to the study of data security
-
-
0下载:
The sensor networks application domain continues to increase with the need for an
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security consi
-
-
0下载:
服务商解释说,对云计算过程里的数据安全问题,“完全不必担心”。-Service provider explained that the process of cloud computing in the data security problem, " do not have to worry about."
-
-
0下载:
semiars
The World Wide Web, which has started as a document
repository, is rapidly transforming to a full fledged virtual
environment that facilitates services, interaction, and com-
munication. Under this light, the Semantic Web and Web
2.
-
-
0下载:
Describes Cloud computing and its needs.
-
-
0下载:
Data security in cloud computing
-
-
0下载:
CLOUD COMPUTING
Towards Self-manageable Cloud Services
Cloud computing represents a promising computing paradigm, where computational power is provided as a utility. An important characteristic of Cloud computing, other than in similar paradigms
-
-
0下载:
Secure and Practical Outsourcing of Linear
Programming in Cloud Computing
Abstract—Cloud computing enables customers with limited
computational resources to outsource large-scale computational
tasks to the cloud, where massive computational p
-
-
0下载:
无线传感器网络中基于使用控制的安全访问方案。在我们的方案中所提出的身份验证协议有几大优势,其中最主要的是它在计算,存储和通信中的耗费都很低。此外,我们的方案还可以执行那些具有属性可变性和决策连续性的访问控制。-Wireless sensor networks based on the use of security access control solutions. In our scenario, the proposed authentication protocol has several
-
-
0下载:
:本文介绍了云计算应用的基本概况及云计算发展遇到的关键问题,基于Internet的云计算数据访问安全是云计算安全的中心。本文设计了基于MD5、SM2及SSF33算法和身份认证的PKI安全访问体系架构,基于此安全访问架构下的公开信道的数据访问安全得到了保证。-: This paper describes the application of cloud computing and cloud computing basic overview of the key issues encountere
-
-
0下载:
云计算安全研究 云计算是当前信息技术领域的热门话题之一,是产业界、学术界、政府等各界均十分关注的焦点-Cloud Computing Cloud computing security research is currently one of the hottest topics in the field of information technology is the focus of public industry, academia, and government are very conc
-
-
0下载:
分析了云计算对信息安全领域中技术、标准、监管等各方面带来的挑战 提出云计算安全参考框架及该框架下的主要研究内容。-Analyzes the challenges of cloud computing in all aspects of information security technologies, standards, regulatory brought proposed cloud security reference framework and main contents unde
-
-
0下载:
Define cloud and its characteristics firstly , and then give cloud
computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against
these security issues.-Define cloud an
-
-
0下载:
Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. As the use of cloud increa
-
-
0下载:
Cloud computing is an Internet-based computing, where shared
resources, software and information, are provided to computers
and devices on-demand. It provides people the way to share
distributed resources and services that belong to different
-
-
0下载:
A Signcryption Based Efficient Data Security in Cloud Computing
-
-
0下载:
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application sof
-
-
0下载:
Data Security in the World of Cloud Computing-Data Security in the World of Cloud Computing
-
-
0下载:
BIG DATA COMPUTING CONFERENCE PAPER
-