• Nenhum resultado encontrado

[PDF] Top 20 An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System

Has 10000 "An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System" found on our website. Below are the top 20 most common "An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System".

An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System

An Enhanced Secure and Authorized Deduplication Model in Cloud Storage System

... 7RPDNHGDWDPDQDJHPHQWVFDODEOHLQFORXGFRPSXWLQJGHGXSOLFDWLRQ>@KDVEHHQDZHOONQRZQWHFKQLTXHDQGKDV DWWUDFWHG PRUH DQG PRUH DWWHQWLRQ UHFHQWO\ 'DWD GHGXSOLFDWLRQ LV D VSHFLDOL]HG GDWD FRPSUHV[r] ... See full document

4

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

... the cloud and the several problems that arise from doing so is an area of active ...[30] and TSky [31] are proposals particularly related to the main dissertation ...availability and ... See full document

112

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

... Sub-document deduplication distinguishes excess information inside and crosswise over records instead of discovering indistinguishable documents as in SIS ...sub-record deduplication, excess ... See full document

13

CONGESTION MANAGEMENT IN DEREGULATED POWER SYSTEMS USING REAL CODED GENETIC ALGORITHM

CONGESTION MANAGEMENT IN DEREGULATED POWER SYSTEMS USING REAL CODED GENETIC ALGORITHM

... paper an attempt is made to explore the use of real coded genetic algorithm to find the optimal generation rescheduling for congestion management in deregulated ...occur in power system due to ... See full document

10

Model-Driven Software Evolution: The Multiple Views

Model-Driven Software Evolution: The Multiple Views

... a model-based system involves a team of stakeholders within the ...tasks and objective of the team differs from each ...growth and other development characteristics of the evolving ... See full document

6

Bernardo Luís da Silva Ferreira

Bernardo Luís da Silva Ferreira

... a cloud-of-clouds architecture, with email mes- sages replicated on diverse untrusted storage clouds that can fail or may be at- tacked ...arbitrarily. In the TMS system, security mechanisms ... See full document

203

Cloud Data Storage for Group Collaborations

Cloud Data Storage for Group Collaborations

... been an important development trend in information ...data and application software from traditional local hosts to network servers, cloud computing provides more flexible and ... See full document

2

Secure authentication mechanisms for the management interface in cloud computing environments

Secure authentication mechanisms for the management interface in cloud computing environments

... (PaaS), and Software-as-a-Service ...applications in a consistent man- ner via the cloud platforms to run remotely, while SaaS enables enjoying pre-built software with little control over the ... See full document

125

An Analysis Of The Difference In Gender Level Of Cassava Production And Access To Land In Abia State Nigeria

An Analysis Of The Difference In Gender Level Of Cassava Production And Access To Land In Abia State Nigeria

... inheritance and the resultant effect of this is the fragmentation of land during the acquisition and sharing of either family or community ...male and female farmers of which majority of both sexes ... See full document

5

Guaranteeing Data Storage Security in Cloud Computing

Guaranteeing Data Storage Security in Cloud Computing

... of Cloud Computing, which is an Internet-based advancement and utilization of PC ...expensive and all the more capable processors, together with the product as an administration (SaaS) ... See full document

4

Effective Ways of Secure Private and Trusted Cloud Computing

Effective Ways of Secure Private and Trusted Cloud Computing

... for Cloud computing is under continuous change and will still continue to evolve over the coming ...provisioning and Terms & Conditions are key components to seal trust, privacy and ... See full document

10

A Fuzzy Mathematical Model for Peformance Testing in Cloud Computing Using User Defined Parameters

A Fuzzy Mathematical Model for Peformance Testing in Cloud Computing Using User Defined Parameters

... as an integral ...infrastructure and resources that are expensive and only used sporadically. In the growing complexity of business applications it is harder to build in-house testing ... See full document

13

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

... people and businesses have nowadays and if businesses al- ready depend both on structured and unstructured data made available, relying on sophisticated Information Technology (IT) infrastructures, ... See full document

110

Cloud security risk and readiness

Cloud security risk and readiness

... the cloud service provisioning lifecycle - both at the time of implementation as well as when the service is in ...assessed and guaranteed environmental impact using hardware resources provided by ... See full document

86

Cloud Auditing With Zero Knowledge Privacy

Cloud Auditing With Zero Knowledge Privacy

... performance and increase the computation cost of managing all keys at Cloud Server and at the ...achieve storage correctness without Trusted Third Party ... See full document

6

Carbon sequestration of modern Quercus suber L. silvoarable agroforestry systems in Portugal: a YeldSAFE-based estimation

Carbon sequestration of modern Quercus suber L. silvoarable agroforestry systems in Portugal: a YeldSAFE-based estimation

... aligned in rows and adapted to operating farming machinery, have been suggested for ...agroforestry in Portugal and estimates the potential carbon ...modeling and Portuguese datasets ... See full document

11

An Extensible and Secure Framework for Distributed Applications

An Extensible and Secure Framework for Distributed Applications

... look in the same manner as shown through the ...together and a secondary window is also provided on the main ...provided in order to have the view of the designs made by other ...windows and ... See full document

9

Development and evaluation of an Earth-system model – HadGEM2

Development and evaluation of an Earth-system model – HadGEM2

... Holland, E. A., Houghton, R. A., House, J. I., Ishida, A., Jain, A. K., Janssens, I. A., Joos, F., Kaminski, T., Keeling, C. D., Keeling, R. F., Kicklighter, D. W., Kohfeld, K. D., Knorr, W., Law, R., Lenton, T., ... See full document

66

PUBLIC LINEAR PROGRAMMING SOLUTION FOR  THE DESIGN OF SECURE AND EFFICIENT  COMPUTING IN CLOUD

PUBLIC LINEAR PROGRAMMING SOLUTION FOR THE DESIGN OF SECURE AND EFFICIENT COMPUTING IN CLOUD

... assurance in the cloud and ...techniques in essence prevent cloud from performing any meaningful operation of the underlying plaintext data, making the computation over encrypted data a ... See full document

12

A Survey on Cloud Storage Systems and Encryption Schemes

A Survey on Cloud Storage Systems and Encryption Schemes

... share in the fine grained level. This system involves cipher-texts and private ...attackers and a hierarchy. Hierarchy acts as a mediator and decrypts the data for the third party or ... See full document

5

Show all 10000 documents...