Sciweavers

392 search results - page 13 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
14 years 3 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 8 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
CCGRID
2010
IEEE
13 years 11 months ago
Elastic Site: Using Clouds to Elastically Extend Site Resources
Infrastructure-as-a-Service (IaaS) cloud computing offers new possibilities to scientific communities. One of the most significant is the ability to elastically provision and relin...
Paul Marshall, Kate Keahey, Timothy Freeman
UM
2009
Springer
14 years 5 months ago
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites
Abstract. Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, we proposed a dynamic privacy-enhancing user modeli...
Yang Wang 0005, Alfred Kobsa
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
12 years 24 days ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li