Sciweavers

242 search results - page 16 / 49
» Cryptographic Cloud Storage
Sort
View
SERVICEWAVE
2010
13 years 5 months ago
Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning
Abstract. With the emergence of Cloud Computing resources of physical machines have to be allocated to virtual machines (VMs) in an ondemand way. However, the efficient allocation ...
Michael Maurer, Ivona Brandic, Rizos Sakellariou
PDP
2007
IEEE
14 years 1 months ago
Parallel-External Computation of the Cycle Structure of Invertible Cryptographic Functions
We present an algorithm to compute the cycle structure of large directed graphs where each node has exactly one outgoing edge. Such graphs appear as state diagrams of finite stat...
Andreas Beckmann, Jorg Keller
CCS
2004
ACM
14 years 24 days ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
EUROMICRO
2009
IEEE
13 years 11 months ago
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike Grid computing, Cloud...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...
INFOCOM
2012
IEEE
11 years 9 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...