Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review
FAM Ibrahim, EE Hemayed - Computers & Security, 2019 - Elsevier
Cloud computing is no longer the future but the present. Security and trust are critical in
cloud computing, but how can cloud service tenants trust cloud service providers to store all …
cloud computing, but how can cloud service tenants trust cloud service providers to store all …
A quantitative analysis of current security concerns and solutions for cloud computing
Abstract The development of cloud computing services is speeding up the rate in which the
organizations outsource their computational services or sell their idle computational …
organizations outsource their computational services or sell their idle computational …
A cloud design for user-controlled storage and processing of sensor data
Ubiquitous sensing environments such as sensor networks collect large amounts of data.
This data volume is destined to grow even further with the vision of the Internet of Things …
This data volume is destined to grow even further with the vision of the Internet of Things …
Virtual TPM for a secure cloud: fallacy or reality?
J Cucurull, S Guasch - 2014 - rua.ua.es
The cloud technology has dramatically increased the virtualisation usage during the last
years. Nevertheless, the virtualisation has also imposed some challenges on the security of …
years. Nevertheless, the virtualisation has also imposed some challenges on the security of …
Improving distribution network model accuracy using impedance estimation from micro-synchrophasor data
CM Roberts, CM Shand, KW Brady… - 2016 IEEE Power …, 2016 - ieeexplore.ieee.org
An accurate network model is essential for performing detailed analysis of a power system.
The quality of many distribution network models is very diverse, especially for low voltage …
The quality of many distribution network models is very diverse, especially for low voltage …
Fuzzy logic approach to modelling trust in cloud computing<? show [AQ ID= Q1]?>
Despite the growing deployment of mission critical applications on computing systems, trust
and security continues to hinder its full adoption and deployment on cloud computing …
and security continues to hinder its full adoption and deployment on cloud computing …
Trust evaluation in cloud based on friends and third party's recommendations
S Singh, D Chand - 2014 Recent Advances in Engineering and …, 2014 - ieeexplore.ieee.org
Establishing trust among service providers and service consumers is very essential and
important factor for the widespread use and popularity of any distributed environment which …
important factor for the widespread use and popularity of any distributed environment which …
Maintaining user control while storing and processing sensor data in the cloud
Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing
large amounts of data. Eventually, sensor networks will automatically collect such data. A …
large amounts of data. Eventually, sensor networks will automatically collect such data. A …
[BOEK][B] SensorCloud: Towards the interdisciplinary development of a trustworthy platform for globally interconnected sensors and actuators
M Eggert, R Häußling, M Henze, L Hermerschmidt… - 2014 - Springer
Abstract Although Cloud Computing promises to lower IT costs and increase users'
productivity in everyday life, the unattractive aspect of this new technology is that the user no …
productivity in everyday life, the unattractive aspect of this new technology is that the user no …
A trust point-based security architecture for sensor data in the cloud
The SensorCloud project aims at enabling the use of elastic, on-demand resources of
today's Cloud offers for the storage and processing of sensed information about the physical …
today's Cloud offers for the storage and processing of sensed information about the physical …