Search

Your search keyword '"Cloud user"' showing total 86 results

Search Constraints

Start Over You searched for: Descriptor "Cloud user" Remove constraint Descriptor: "Cloud user"
86 results on '"Cloud user"'

Search Results

1. Secure Deep Learning Framework for Cloud to Protect the Virtual Machine from Malicious Events.

2. A framework for prioritizing cloud services in neutrosophic environment

3. A framework for prioritizing cloud services in neutrosophic environment.

6. G-TOPSIS: a cloud service selection framework using Gaussian TOPSIS for rank reversal problem.

7. Current cloud challenges in Germany: the perspective of cloud service providers

8. Secure Data Uploading and Accessing Sensitive Data Using Time Level Locked Encryption to Provide an Efficient Cloud Framework.

11. Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation

16. EPiC: Efficient Privacy-Preserving Counting for MapReduce

17. Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting

18. Provably Secure Identity Based Provable Data Possession

19. Heterogeneous Resource Selection for Arbitrary HPC Applications in the Cloud

20. LiveCloudInspector: Towards Integrated IaaS Forensics in the Cloud

22. Privacy preserving model: a new scheme for auditing cloud stakeholders

27. Mutual Profit Increment for Cloud User and Resource Providers Efficient Resource Utilization Auction Method in Cloud Computing.

28. Introduction

32. An SLA Support System for Cloud Computing

34. Performance Measurement of a Private Cloud in the OpenCirrusTM Testbed

38. Hybrid Approach for Data Classification in E-Health Cloud.

39. Privacy preserving model: a new scheme for auditing cloud stakeholders.

40. Foreword: Towards Trusted Cloud Ecosystems

42. Adaptive SLA mechanism based on fuzzy system for dynamic cloud environment

44. Performance Study of Multi-tenant Cloud FPGAs

46. Cloud Computing Security Issues: a Stakeholder’s Perspective

47. Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent

48. Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers

49. A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images

50. Current cloud challenges in Germany: the perspective of cloud service providers

Catalog

Books, media, physical & digital resources