• Nenhum resultado encontrado

[PDF] Top 20 Cloud Data Storage for Group Collaborations

Has 10000 "Cloud Data Storage for Group Collaborations" found on our website. Below are the top 20 most common "Cloud Data Storage for Group Collaborations".

Cloud Data Storage for Group Collaborations

Cloud Data Storage for Group Collaborations

... moving data and application software from traditional local hosts to network servers, cloud computing provides more flexible and convenient access to data and services, with cheaper software ... See full document

2

Protecting user privacy in the Cloud: an analysis of terms of service

Protecting user privacy in the Cloud: an analysis of terms of service

... of cloud services, while at the same time recognizing the different types of services and the potentially different assessment required for each ...a cloud service is based on "a model for enabling ... See full document

12

Integration of browser-to-browser architectures with third party legacy cloud storage

Integration of browser-to-browser architectures with third party legacy cloud storage

... In the next evaluation scenario, we will measure the scalability of propagating data between two separate Legion groups that can only share information via Antidote. In order to do so, the first evaluation setup ... See full document

66

Failure Analysis of Storage Data Magnetic Systems

Failure Analysis of Storage Data Magnetic Systems

... This paper shows the conclu sions about the corro sion mecha nics in storage data magnetic systems (hard disk). It was done from the inspec tion of 198 units that were in service in nine diffe rent climatic ... See full document

13

Retrieval methods of effective cloud cover from the GOME instrument: an intercomparison

Retrieval methods of effective cloud cover from the GOME instrument: an intercomparison

... a cloud often causes it to shield the “sight” of the air below, thus making it impossible to retrieve information from that part of the atmo- ...a cloud makes the cal- culation of the path length through ... See full document

19

Using Neo4J geospatial data storage and integration

Using Neo4J geospatial data storage and integration

... of data) presented in a ...Other data, such as business schedules and reviews are also included in the database as custom attributes; however, it is not shown on the webpage to avoid ...inserting ... See full document

83

Dependable data storage with state machine replication

Dependable data storage with state machine replication

... The first thing to notice when comparing the times to execute the different types of transaction is that configurations with clients in TC invoking queries directly to the database servers hosted in the public clouds has ... See full document

81

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

... their data files, they can also perform transaction on their encrypted ...their data but this technique does not have capability of processing the encrypted ...client’s data, we overcame this issue ... See full document

14

Enabling and Sharing Storage Space Under a Federated Cloud Environment

Enabling and Sharing Storage Space Under a Federated Cloud Environment

... mento, Storage Area Networks (SAN), assentes em infraestruturas Fibre Channel (FC) interligando servidores a disk arrays, sendo que estes últimos disponibilizam volumes de dados aos servidores (que os formatam ... See full document

145

A new meta-data driven data-sharing storage model for SaaS

A new meta-data driven data-sharing storage model for SaaS

... In the experiments, we simulate a real multi-tenant scenario in “client/server” model by sending query and update requests from many tenants concurrently, and then evaluate the solutions by analysis the response time and ... See full document

6

A Survey on Cloud Storage Systems and Encryption Schemes

A Survey on Cloud Storage Systems and Encryption Schemes

... CP-ABE, an alternative to KP-ABE was suggested. The inverse of KP-ABE is CP-ABE. In KP-ABE, attributes denote the cipher-texts while access policies are built based on the user’s keys. However, the limitation in KP-ABE ... See full document

5

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

... a cloud computing security group. This group considers its role as promoting the effective and secure use of the technology within government and industry by providing technical guidance and ... See full document

5

Data storage system for wireless sensor networks

Data storage system for wireless sensor networks

... With CoAP/Observe, a client may store notifications in it and use a stored notification, as long as it is fresh, to serve other clients requesting it, without contacting the origin server. This means that the support for ... See full document

73

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

... indicate the first record (15). Block-level Deduplication is square level information deduplication works on the premise of sub-document level. As the name suggests, the record is broken into portions, squares or pieces ... See full document

13

An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System

An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System

... 7RPDNHGDWDPDQDJHPHQWVFDODEOHLQFORXGFRPSXWLQJGHGXSOLFDWLRQ>@KDVEHHQDZHOONQRZQWHFKQLTXHDQGKDV DWWUDFWHG PRUH DQG PRUH DWWHQWLRQ UHFHQWO\ 'DWD GHGXSOLFDWLRQ LV D VSHFLDOL]HG GDWD FRPSUHV[r] ... See full document

4

Enhancing Accountability for Distributed Data Sharing in the Cloud

Enhancing Accountability for Distributed Data Sharing in the Cloud

... behind cloud computing is here computing is done in remote ...[2]. Cloud computing gives new way of hosting andprocessing of data by providing scalable and often virtualised ...commercial ... See full document

5

Survey of Data Security Challenges in the Cloud

Survey of Data Security Challenges in the Cloud

... pollution data, analyzing data to identify pollution levels and initiating corrective ...for data collection and monitoring via various sensors. Similarly, Data analytics and machine learning ... See full document

6

Braz. J. Phys.  vol.30 número2

Braz. J. Phys. vol.30 número2

... detetor data from the front-end eletronis to the event. storage[r] ... See full document

14

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

... Subhasri P. et al. [16] proposed a Multi-level Encryption algorithm to secure the data in the cloud. The proposed algorithm uses rail fence and ceaser cipher algorithm. Initially, plaintext is encrypted ... See full document

9

Arquitetura de um sistema de análise de dados Big Data no modelo cloud computing

Arquitetura de um sistema de análise de dados Big Data no modelo cloud computing

... da cloud obriga a definir um conjunto de restrições e de políticas de permissões de acesso aos dados por parte dos utilizadores, para que os dados sejam acedidos por quem deles necessita sem que os mesmos percam a ... See full document

129

Show all 10000 documents...