Sciweavers

242 search results - page 20 / 49
» Cryptographic Cloud Storage
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
WETICE
2009
IEEE
14 years 4 months ago
Cloud Computing and the Lessons from the Past
— The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively sca...
Rao Mikkilineni, Vijay Sarathy
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
CLOUDCOM
2010
Springer
13 years 7 months ago
Rapid Processing of Synthetic Seismograms Using Windows Azure Cloud
Currently, numerically simulated synthetic seismograms are widely used by seismologists for seismological inferences. The generation of these synthetic seismograms requires large ...
Vedaprakash Subramanian, Liqiang Wang, En-Jui Lee,...
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 4 months ago
Maximizing Cloud Providers Revenues via Energy Aware Allocation Policies
—Cloud providers, like Amazon, offer their data centers’ computational and storage capacities for lease to paying customers. High electricity consumption, associated with runni...
Michele Mazzucco, Dmytro Dyachuk, Ralph Deters