搜索结果: 1-11 共查到“军队指挥学 Cloud computing”相关记录11条 . 查询时间(0.14 秒)
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Verifiable Computing Smart Contract Game Theory
2018/5/28
Cloud computing has become an irreversible trend. Together comes the pressing need for verifiability, to assure the client the correctness of computation outsourced to the cloud. Existing verifiable c...
A Multi-Function Provable Data Possession Scheme in Cloud Computing
multi-function provable data possession cloud computing
2016/1/8
In order to satisfy the different requirements of provable data possession in cloud
computing, a multi-function provable data possession (MF-PDP) is proposed, which supports
public verification, dat...
Attribute-Based Encryption Optimized for Cloud Computing
storage in clouds access control attribute-based encryption
2016/1/8
In this work, we aim to make attribute-based encryption (ABE) more suitable
for access control to data stored in the cloud. For this purpose, we concentrate on giving
to the encryptor full control o...
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
cryptographic protocols / access control hierarchical key assignment
2013/4/18
Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while consider...
A New Security and Privacy Framework for RFID In Cloud Computing
Cloud Computing RFID Security Privacy
2013/4/18
RFID is a leading technology that has been rapidly deployed in several daily life applications such as payment, access control, ticketing, and e-passport, which requires strong security and privacy me...
Efficient and Secure Data Storage Operations for Mobile Cloud Computing
Mobile Cloud Computing Data Storage
2012/3/28
Cloud computing is a promising technology, which is transforming the traditional Internet computing paradigm and IT industry. With the development of wireless access technologies, cloud computing is e...
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
foundations fully homomorphic encryption cloud computing
2010/7/13
Cloud computing denotes an architectural shift toward thin clients and conveniently centralized provision of computing resources. Clients’ lack of direct resource control in the cloud prompts concern ...
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Efficient Fuzzy Keyword Search Encrypted Data Cloud Computing
2009/12/29
As Cloud Computing becomes prevalent, more and more sensitive information
are being centralized into the cloud. For the protection of data privacy, sensitive data usually
have to be encrypted before...
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
Privacy-Preserving Public Auditing Data Storage Security Cloud Computing
2009/12/29
Cloud Computing is the long dreamed vision of computing as a utility, where
users can remotely store their data into the cloud so as to enjoy the on-demand high quality
applications and services fro...
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Data Dynamics Storage Security Cloud Computing
2009/6/23
Cloud Computing has been envisioned as the next-generation architecture of IT
Enterprise. It moves the application software and databases to the centralized large data
centers, where the management ...
Cloud Computing has been envisioned as the nextgeneration
architecture of IT Enterprise. In contrast to traditional
solutions, where the IT services are under proper physical,
logical and personnel...