Sciweavers

582 search results - page 16 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 10 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
14 years 14 days ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
CCS
2009
ACM
14 years 3 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea
ATAL
2010
Springer
13 years 10 months ago
Automated negotiation with decommitment for dynamic resource allocation in cloud computing
We consider the problem of allocating networked resources in dynamic environment, such as cloud computing platforms, where providers strategically price resources to maximize thei...
Bo An, Victor R. Lesser, David Irwin, Michael Zink
PERCOM
2005
ACM
14 years 8 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...