Sciweavers

392 search results - page 6 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 10 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
CIDR
2011
274views Algorithms» more  CIDR 2011»
13 years 1 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
13 years 10 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
CCGRID
2010
IEEE
13 years 11 months ago
An Effective Architecture for Automated Appliance Management System Applying Ontology-Based Cloud Discovery
Cloud computing is a computing paradigm which allows access of computing elements and storages on-demand over the Internet. Virtual Appliances, pre-configured, readyto-run applicat...
Amir Vahid Dastjerdi, Sayed Gholam Hassan Tabataba...
FAST
2011
13 years 1 months ago
The SCADS Director: Scaling a Distributed Storage System Under Stringent Performance Requirements
Elasticity of cloud computing environments provides an economic incentive for automatic resource allocation of stateful systems running in the cloud. However, these systems have t...
Beth Trushkowsky, Peter Bodík, Armando Fox,...