Showing 881 - 900 results of 1,622 for search '"cloud computing"', query time: 0.09s Refine Results
  1. 881
  2. 882

    Virtual Networking Performance in OpenStack Platform for Network Function Virtualization by Franco Callegati, Walter Cerroni, Chiara Contoli

    Published 2016-01-01
    “…To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. …”
    Get full text
    Article
  3. 883
  4. 884

    Prediction Based Proactive Thermal Virtual Machine Scheduling in Green Clouds by Supriya Kinger, Rajesh Kumar, Anju Sharma

    Published 2014-01-01
    “…Cloud computing has rapidly emerged as a widely accepted computing paradigm, but the research on Cloud computing is still at an early stage. …”
    Get full text
    Article
  5. 885

    A cost- and performance-effective approach for task scheduling based on collaboration between cloud and fog computing by Xuan-Qui Pham, Nguyen Doan Man, Nguyen Dao Tan Tri, Ngo Quang Thai, Eui-Nam Huh

    Published 2017-11-01
    “…The rapid development of Internet of Things applications, along with the limitations of cloud computing due mainly to the far distance between Internet of Thing devices and cloud-based platform, has promoted a newly distributed computing platform based on collaboration between cloud computing and fog computing. …”
    Get full text
    Article
  6. 886
  7. 887

    A Comparative Evaluation of Machine Learning-Based Intrusion Detection Systems for Securing Cloud Environments by Mohammad Shadi Alhakeem, Khawla Bin Ajlan

    Published 2024-12-01
    “…Cloud computing has advanced significantly alongside the growth of communication technology and data exchange. …”
    Get full text
    Article
  8. 888

    A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment by Mustafa Azeez AL Mayyahi, Seyed Amin Hosseini Seno

    Published 2022-12-01
    “… Today, the role of cloud computing in our day-to-day lives is very prominent. …”
    Get full text
    Article
  9. 889

    A Geospatial Information Grid Framework for Geological Survey. by Liang Wu, Lei Xue, Chaoling Li, Xia Lv, Zhanlong Chen, Mingqiang Guo, Zhong Xie

    Published 2015-01-01
    “…The purpose of this paper is to develop a geological cloud-computing platform for integrating and sharing geological information based on a cloud architecture. …”
    Get full text
    Article
  10. 890

    ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES by V. A. Vishniakov, М. М. Gongas Sas, М. G. Mosdurani Shiras

    Published 2014-12-01
    “…As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.…”
    Get full text
    Article
  11. 891

    Security risk analysis and evaluation techniques in power information system cloud by Liang SHEN, Dong WANG, Jiaxing XUAN

    Published 2018-02-01
    “…Combining the power industry with cloud computing technology,a systematic study on safety analysis and evaluation methods of the power cloud was carried out.A comprehensive combing on functional entities and business processes of the power information system under the cloud environment was conducted.Through the combination of static STRIDE threat modeling and dynamic attack chain algorithm,the main risks of cloud platform were classified and quantified.A security protection architecture of power cloud system was put forward to promote the popularization and application of cloud computing in the power industry,and to provide a strong support for the safety and control of power information system.…”
    Get full text
    Article
  12. 892

    PPPoE internet access for government-enterprise customer in LSN environment by Yongming YAN, Kechuang YE, Bin XU, Haifeng XU, Liang ZUO, Kaiyuan HONG

    Published 2017-09-01
    “…With the blowout development of cloud-computing market,start-up enterprises gradually increase the demand for cloud business.For the cost-sensitive customers,using the traditional government-enterprise PPPoE in the LSN environment could reduce the wastage of public IPv4 addresses.Meanwhile,ICT services based on cloud-computing was provided for customers.Several solutions which mixed the traditional government-enterprise gateway solution and the latest LSN scene were presented.Through the analysis of advantages and disadvantages of each scheme,reference for government-enterprise customers dialing-up to access internet in LSN environment was presented.…”
    Get full text
    Article
  13. 893

    Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme by DUAN Jie, GU Wei, ZHANG Shujuan, GONG Xin

    Published 2025-05-01
    “…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. However, cloud computing is no longer able to meet the current data processing requirements. …”
    Get full text
    Article
  14. 894
  15. 895

    An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment by K. V. Pradeep, V. Vijayakumar, V. Subramaniyaswamy

    Published 2019-01-01
    “…Cloud computing is a platform to share the data and resources used among various organizations, but the survey shows that there is always a security threat. …”
    Get full text
    Article
  16. 896

    Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO

    Published 2016-08-01
    “…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
    Get full text
    Article
  17. 897

    Overview of research on trusted attestation technology of cloud virtualization platform by Bibo TU, Jie CHENG, Haojun XIA, Kun ZHANG, Ruina SUN

    Published 2021-12-01
    “…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
    Get full text
    Article
  18. 898

    Processing Information in the Clouds by Mark Burgin, Eugene Eberbach, Rao Mikkilineni

    Published 2020-05-01
    “…Cloud computing makes the necessary resources available to the appropriate computation to improve scaling, resiliency, and the efficiency of computations. …”
    Get full text
    Article
  19. 899

    IOT AND THE CLOUD: THE FUTURE OF A DIGITAL SOCIETY by Logica BANICA, Magdalena RADULESCU, Cristian STEFAN

    Published 2018-12-01
    “…The integration of Cloud Computing into Internet-of-Things (IoT) could solving heterogeneity problems with its devices, protocols and technologies. …”
    Get full text
    Article
  20. 900

    Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO

    Published 2016-08-01
    “…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
    Get full text
    Article