Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
101
Analysis on Mobile Internet Application Security Issues Based on the Cloud Computing Mode
Published 2013-03-01Get full text
Article -
102
Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective
Published 2019-06-01Subjects: “…cloud computing…”
Get full text
Article -
103
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
104
Retracted: Optimization of the Marketing Management System Based on Cloud Computing and Big Data
Published 2024-01-01Get full text
Article -
105
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01Get full text
Article -
106
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Published 2014-09-01“…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
Get full text
Article -
107
Presenting an Optimal Algorithm for Resource Scheduling and Code Partition in Mobile Cloud Computing
Published 2022-03-01Subjects: Get full text
Article -
108
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Published 2015-01-01“…Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. …”
Get full text
Article -
109
Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network
Published 2015-06-01Subjects: Get full text
Article -
110
Automatic Scaling Mechanism of Intermodal EDI System under Green Cloud Computing
Published 2022-01-01“…Based on the resource scheduling characteristics of container cloud and considering the distribution and heterogeneity of intermodal cloud computing platform from the perspective of resource allocation, the automatic scaling mechanism of XEDI is established, the scaling model is established, and the automatic scaling algorithm is proposed. …”
Get full text
Article -
111
Research on the Resources Scheduling Method of Virtual Machines Under the Cloud Computing Environments
Published 2013-04-01Subjects: “…cloud computing…”
Get full text
Article -
112
System Design for Media Server Based on Cloud Computing Technology and the Application Analysis
Published 2013-06-01Subjects: “…cloud computing…”
Get full text
Article -
113
Resource Monitoring Model in Cloud Computing Based on Dynamic Period and Event-Driven
Published 2012-09-01Subjects: “…cloud computing…”
Get full text
Article -
114
Multiobjective Prioritized Workflow Scheduling in Cloud Computing Using Cuckoo Search Algorithm
Published 2023-01-01“…Effective workflow scheduling in cloud computing is still a challenging problem as incoming workflows to cloud console having variable task processing capacities and dependencies as they will arise from various heterogeneous resources. …”
Get full text
Article -
115
A Novel Approach for Optimal Multimedia Data Distribution in Mobile Cloud Computing
Published 2014-01-01“…With the integration of mobile computing and cloud computing, more diverse services can be provided to the users, supporting the mobility feature of mobile computing along with the power of cloud computing. …”
Get full text
Article -
116
CSP-based resource allocation model and algorithms for energy-efficient cloud computing
Published 2013-12-01Subjects: “…cloud computing…”
Get full text
Article -
117
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
118
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01Subjects: “…cloud computing…”
Get full text
Article -
119
An Efficient Policy-Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment
Published 2022-01-01“…Cloud computing has become the most challenging research field in the current information technology scenario. …”
Get full text
Article -
120
Retracted: Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2024-01-01Get full text
Article