Tuesday, April 12, 2016

Research Readings in Cloud

DDoS attacks in Cloud Computing: Collateral Damage to Non-targets

G Somani, MS Gaur, D Sanghi, M Conti - Computer Networks, 2016
Effects of Distributed Denial of Service (DDoS) attacks in cloud computing are not very
similar to what they were in the traditional “fixed” on-premise infr.

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing

Y Wang, S Chandrasekhar, M Singhal, J Ma - Cluster Computing, 2016
... and published by a wide range of providers. In addition, these services can be
dynamically composed across organization boundaries to form complex business
processes and appli- cations that are hosted in the cloud. This ...

[HTML] Third Party Public Auditing Scheme for Cloud Storage

S More, S Chaudhari - Procedia Computer Science, 2016
Cloud storage is one of the service provided by Cloud computing in which data is maintained,
managed, backed up remotely and made available to users over a netw. ...

Modeling Availability Impact in Cloud Computing

PRM Maciel - Principles of Performance and Reliability Modeling and …, 2016

[HTML] Homomorphic Encryption for Security of Cloud Data

MM Potey, CA Dhote, DH Sharma - Procedia Computer Science, 2016
... References. [1]; Tebaa, M.; El Hajji, S.; El Ghazi, A., “Homomorphic encryption method applied
to Cloud Computing,” in Network Security and Systems (JNS2), 2012 National Days of, vol., no.,
pp.86-89, 20-21 April 2012. [2]; Mather, Tim, Subra Kumaraswamy, and Shahed Latif. ...

Reliability Analysis of a Cloud Computing System with Replication: Using Markov Renewal Processes

M Kimura, X Zhao, T Nakagawa - Principles of Performance and Reliability Modeling …, 2016

[PDF] Information Technology Service Management for Cloud Computing

S Khan - International Journal of Advanced Electronics and …, 2016
Page 1. INTERNATIONAL JOURNAL OF ADVANCED ELECTRONICS & COMMUNICATION
SYSTEMS Approved by CSIR-NISCAIR ISSN NO: 2277-7318 ISSUE 1 VOL 5, JAN-MAR, 2016
PAPER ID 12543 Information Technology Service Management for Cloud Computing ...

[HTML] Hybrid Wavelet Based CBIR System Using Software as a Service (SaaS) Model on Public Cloud

M Meena, VA Bharadi - Procedia Computer Science, 2016
... Feb. 2015. [9]; Zhuo YANG, Sei-ichiro KAMATA and Alireza AHRARY, “NIR: Content
Based Image Retrieval on Cloud Computing” in IEEE International Conference on
Intelligent Computing and Intelligent Systems, 2009. [10 ...

A simple model to exploit reliable algorithms in cloud federations

AJ Rubio-Montero, MA Rodríguez-Pascual… - Soft Computing, 2016
Page 1. Soft Comput DOI 10.1007/s00500-016-2143-9 FOCUS A simple model to exploit
reliable algorithms in cloud federations AJ Rubio-Montero1 · MA Rodríguez-Pascual1 ·
R. Mayo-García1 © Springer-Verlag Berlin Heidelberg 2016 ...

[PDF] Attestation Transparency: Building secure Internet services for legacy clients

J Beekman, J Manferdelli, D Wagner - 2016
Page 1. Attestation Transparency: Building secure Internet services for legacy clients
Jethro Beekman John Manferdelli David Wagner Electrical Engineering and Computer
Sciences University of California at Berkeley Technical Report No. ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online