Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
181
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Published 2014-01-01“…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
Get full text
Article -
182
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01“…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
Get full text
Article -
183
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01Subjects: “…cloud storage…”
Get full text
Article -
184
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01Subjects: Get full text
Article -
185
Privacy-preserving digital rights management scheme in cloud computing
Published 2014-02-01Subjects: Get full text
Article -
186
Robot Simulation on Agri-Field Point Cloud With Centimeter Resolution
Published 2025-01-01Subjects: Get full text
Article -
187
Cloud Based Metalearning System for Predictive Modeling of Biomedical Data
Published 2014-01-01“…This problem is addressed by proposing a cloud based system that integrates metalearning framework for ranking and selection of best predictive algorithms for data at hand and open source big data technologies for analysis of biomedical data.…”
Get full text
Article -
188
The Circle Pure Rolling Method for Point Cloud Boundary Extraction
Published 2024-12-01Subjects: “…point cloud…”
Get full text
Article -
189
Research progress of trusted sensor-cloud based on fog computing
Published 2019-03-01Subjects: “…sensor-cloud…”
Get full text
Article -
190
Research and implementation of the IBN for cloud-network convergence service of operators
Published 2021-08-01Subjects: Get full text
Article -
191
Research of Carrier's Cloud Management System Based on Open Architecture
Published 2013-10-01Subjects: “…cloud computing…”
Get full text
Article -
192
Hadoop cloud platform user dynamic access control model
Published 2017-09-01Subjects: “…cloud platform…”
Get full text
Article -
193
Cloud microphysical response to entrainment of dry air containing aerosols
Published 2025-01-01“…Aerosol particles entrained at cloud top and edge can affect cloud microphysical and macrophysical properties, but the process is still poorly understood. …”
Get full text
Article -
194
Cloud removal from satellite imagery based on SUSAN algorithm
Published 2006-01-01Subjects: “…cloud removal…”
Get full text
Article -
195
Characterizing the role of vehicular cloud computing in road traffic management
Published 2017-05-01“…Vehicular cloud computing is envisioned to deliver services that provide traffic safety and efficiency to vehicles. …”
Get full text
Article -
196
Research and practice of SRv6 for integrated carrying of video cloud
Published 2019-12-01Subjects: Get full text
Article -
197
NETWORK VIRTUALIZATION PERFORMANCE ANALYSIS ON OPENSTACK CLOUD COMPUTING INFRASTRUCTURES
Published 2016-06-01“…Cloud computing has become popular in IT technology because of its advantages that focus on flexible, scaling, resources and services which help customers easy to build their own on-demand IT system easily. …”
Get full text
Article -
198
A quantifiable cloud computing platform security evaluation model
Published 2020-07-01Subjects: “…cloud computing…”
Get full text
Article -
199
Cloud data anonymous assured deletion approach based on blockchain
Published 2021-03-01“…The previous assured deletion schemes ignored that the privacy is threated by the relevance between data and user identity, exposing user behavior to the cloud service provider or attackers.Aiming at the above problems, an assured deletion approach based on blockchain was proposed.The improved linkable ring signature scheme was adopted to make user achieve anonymous assured deletion by setting specific link symbol in the signature.Moreover, the blockchain technology was leveraged to guarantee the nonrepudiation of assured deletion.Theoretical analysis and experimental results show that the proposed approach can meet the assured deletion requirements of user data in cloud storage, and its anonymity can effectively prevent attackers from tracking and analyzing user behavior.…”
Get full text
Article -
200
Application Research on Telecommunication Network Cloud Computing and Virtual Desktop
Published 2013-05-01Subjects: “…cloud computing…”
Get full text
Article