Sciweavers

242 search results - page 13 / 49
» Cryptographic Cloud Storage
Sort
View
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
13 years 5 months ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
ICDE
2010
IEEE
244views Database» more  ICDE 2010»
14 years 7 months ago
Reliable Storage and Querying for Collaborative Data Sharing Systems
The sciences, business confederations, and medicine urgently need infrastructure for sharing data and updates among collaborators' constantly changing, heterogeneous databases...
Nicholas E. Taylor, Zachary G. Ives
CJ
2010
193views more  CJ 2010»
13 years 4 months ago
Energy-Efficient Cloud Computing
Energy efficiency is increasingly important for future information and communication technologies (ICT), because the increased usage of ICT, together with increasing energy costs a...
Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Gio...
IEEECIT
2010
IEEE
13 years 5 months ago
Developing a Cloud Computing Charging Model for High-Performance Computing Resources
Abstract—This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the comp...
Matthew Woitaszek, Henry M. Tufo
CIDR
2011
221views Algorithms» more  CIDR 2011»
12 years 11 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...