云安全研究进展综述
俞能海, 郝卓, 徐甲甲, 张卫明, 张驰 - 电子学报, 2013 - ejournal.org.cn
随着云计算在学术界和工业界的兴起, 云计算也不可避免的带来了一些安全问题.
本文对云计算的安全需求进行了总结, 指出云计算不仅在机密性, 数据完整性 …
本文对云计算的安全需求进行了总结, 指出云计算不仅在机密性, 数据完整性 …
Cloud computing adoption model for universities to increase ICT proficiency
Universities around the world especially those in develo** countries are faced with the
problem of delivering the level of information and communications technology (ICT) needed …
problem of delivering the level of information and communications technology (ICT) needed …
Towards the augmented pathologist: Challenges of explainable-ai in digital pathology
Digital pathology is not only one of the most promising fields of diagnostic medicine, but at
the same time a hot topic for fundamental research. Digital pathology is not just the transfer …
the same time a hot topic for fundamental research. Digital pathology is not just the transfer …
Application of data fragmentation and replication methods in the cloud: a review
F Castro-Medina, L Rodríguez-Mazahua… - 2019 international …, 2019 - ieeexplore.ieee.org
Data fragmentation and replication are an essential issue in cloud databases, since
information demands are huge and improving performance through distributed database …
information demands are huge and improving performance through distributed database …
Improving database security in cloud computing by fragmentation of data
Cloud computing is a technology that facilitates numerous configurable resources in which
the data is stored and managed in a decentralized manner. However, since the data is out of …
the data is stored and managed in a decentralized manner. However, since the data is out of …
Novel heuristic scheme to enforce safety and confidentiality using feature-based encryption in multi-cloud environment (MCE)
Safety is the main concern and also it acts as a major hurdle in maintaining cloud-based
services. To overcome the difficulties, there exists a wide range of activities to be performed …
services. To overcome the difficulties, there exists a wide range of activities to be performed …
Secure data outsourcing in presence of the inference problem: A graph-based approach
In light of the emergence of Database-as-a-Service paradigm, secure data outsourcing has
become one of the crucial challenges which strongly imposes itself. In such a scenario …
become one of the crucial challenges which strongly imposes itself. In such a scenario …
Правовое регулирование облачных технологий (вычислений)
ЯО Кучина - 2018 - elibrary.ru
Данная монография впервые в российской юридической науке раскрывает понятие
облачных технологий и их нормативное регулирование, которые на данный момент …
облачных технологий и их нормативное регулирование, которые на данный момент …
Multi-cloud applications: data and code fragmentation for improved security
R Lovrenčić, D Škvorc - International Journal of Information Security, 2023 - Springer
When deciding against outsourcing their data to the cloud, organizations often point to
security as the primary reason. If cloud is not used as a passive storage only, but rather both …
security as the primary reason. If cloud is not used as a passive storage only, but rather both …
Data protection by means of fragmentation in distributed storage systems
This paper analyzes different dispersed storage systems that use data fragmentation as a
way of protection. Existing solutions have been organized into two categories: those …
way of protection. Existing solutions have been organized into two categories: those …