• Nenhum resultado encontrado

[PDF] Top 20 Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

Has 10000 "Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds" found on our website. Below are the top 20 most common "Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds".

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

... databases and big data ...costly in terms of performance and bandwidth costs and it’s not always easy to predict which queries will be made in the ...provide privacy ... See full document

112

TSKY: A Dependable Middleware Solution for Data Privacy using Public Storage Clouds

TSKY: A Dependable Middleware Solution for Data Privacy using Public Storage Clouds

... tests and again, reduced laten- cies concerning over-cloud ...Unlike in the case of message send oper- ations, message retrieving operations exhibit a more significant overhead in core ... See full document

113

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

... This privacy-preserving image recovery service in TISR that we propose to explore is also akin to the literature of secure computation outsourcing [3]_[6], [18], [20], [21], which aims to protects ... See full document

5

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

... for privacy-preserving fine-grained billing within the differential privacy framework targeted to smart metering, but it may also be adopted for computation clouds (as suggested by the ...some, ... See full document

23

Availability and confidentiality in storage clouds

Availability and confidentiality in storage clouds

... security, cloud computing poses new and critical security ...strong privacy measures should be carefully implemented to protect cloud ...confidentiality and others, all elements ... See full document

114

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

... limitations of existing work and acquiring their ...process of efficient third party auditing process as suggested by (Ateniese et ...further enhanced their efficiency by implementing partial ... See full document

14

Dependable mapreduce in a cloud-of-clouds

Dependable mapreduce in a cloud-of-clouds

... execution of MapReduce com- putations across multiple clouds besides Amazon EC2 (Iordache et ...ferent clouds to a running job ...flow, and it can commission nodes in the cluster to ... See full document

170

Analysis of actinic flux profiles measured from an ozone sonde balloon

Analysis of actinic flux profiles measured from an ozone sonde balloon

... surface of sea ice (high ...ground and on an aircraft during the INSPECTRO campaign to study the effect of clouds on the spectral actinic flux in East Anglia England in ... See full document

33

Putting the clouds back in aerosol–cloud interactions

Putting the clouds back in aerosol–cloud interactions

... shown in Fig. 3 are three additional sets of experi- ments where the microphysics has been modified to limit the lifetime ...number of 100 cm −3 to (a) the autoconversion scheme (Au), and (b) ... See full document

15

Observations of high droplet number concentrations in Southern Ocean  boundary layer clouds

Observations of high droplet number concentrations in Southern Ocean boundary layer clouds

... Wofsy, S. C., Daube, B. C., Jimenez, R., Kort, E., Pittman, J. V., Park, S., Commane, R., Xiang, B., Santoni, G., Jacob, D., Fisher, J., Pickett-Heaps, C., Wang, H., Wecht, K., Wang, Q.-Q., Stephens, B. B., Shertz, S., ... See full document

17

Modeling and Analysis of Queuing Systems in Banks A case study of Ghana Commercial Bank Ltd. Kumasi Main Branch

Modeling and Analysis of Queuing Systems in Banks A case study of Ghana Commercial Bank Ltd. Kumasi Main Branch

... hall of Ghana Commercial Bank (GCB) ...observation and personal interview and questionnaire ...record of queuing system over a ...arrival and service rate per ...efficiency in ... See full document

4

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

... First of all, the Admin of the web portal would verify its users. The users who can access this web application from browser are Student, TPO, and HR. If the user is verified successfully the admin ... See full document

5

	Renal Metastasis of a Malignant Myopericytoma: A Case Report and Review of Literature

Renal Metastasis of a Malignant Myopericytoma: A Case Report and Review of Literature

... department of internal medicine by her family doctor with weight loss of 8 kg, persistent fatigue, and pain in the right hypochondriac ...tenderness in the right hypochondriac region, ... See full document

6

Cloud chamber experiments on the origin of ice crystal complexity in cirrus clouds

Cloud chamber experiments on the origin of ice crystal complexity in cirrus clouds

... direction). In order to increase the upper bound of the size parameter that can be modeled, we use the publicly available code ADDA (Yurkin and Hoekstra, 2012) to calculate itera- tively the inverse ... See full document

20

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

... INTRODUCTION In the period prior to 2003 Polytechnics in Zimbabwe had a mix of Information Communication Technologies (ICTs), varying from one institution to the ...invested in, so while some ... See full document

5

Photolysis rates in correlated overlapping cloud fields: Cloud-J 7.3c

Photolysis rates in correlated overlapping cloud fields: Cloud-J 7.3c

... Profile of the average bias in J value approximations rel- ative to the J value calculated from the weighted average of all ICAs using model ...angle of 13.6 ◦ and a surface albedo ... See full document

9

An Analysis Of The Difference In Gender Level Of Cassava Production And Access To Land In Abia State Nigeria

An Analysis Of The Difference In Gender Level Of Cassava Production And Access To Land In Abia State Nigeria

... most of the labour for harvesting and post-harvest activities (FAO, ...source of income for rural households (Davies et ...number of households in comparison with other ... See full document

5

Analysis of quality and cost of FeSiMg treatment master alloy vs. cored wire in production of ductile cast iron

Analysis of quality and cost of FeSiMg treatment master alloy vs. cored wire in production of ductile cast iron

... stage in the productions of high-quality ductile iron and vermiculwar cast iron are treatment with different vermin- nodularisers, ...achieved in this respect as regards the implementation ... See full document

4

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

... almost of a basic need people and businesses have nowadays and if businesses al- ready depend both on structured and unstructured data made available, relying on sophisticated Information ... See full document

110

Guaranteeing Data Storage Security in Cloud Computing

Guaranteeing Data Storage Security in Cloud Computing

... In cloud information stockpiling, we depend on this method to scatter the information document F needlessly over an arrangement of n = m+ k disseminated ...vectors in such a path, to the ... See full document

4

Show all 10000 documents...