Distributed Transactions in Cloud Computing: A Review Reliability and Consistency

B Ferzo, SRM Zeebaree - The Indonesian Journal of Computer Science, 2024 - ijcs.net
The challenges of managing distributed transactions in cloud computing are discussed in
this paper. The paper places an emphasis on the critical balance that must be maintained …

Examining the impact of link failures and network performance on a 6to4, 6rd, CHANC and D4across6 tunneling-based networks using various routing protocols

A Hamarsheh - International Journal of Information Technology, 2024 - Springer
The article discusses the importance of failure recovery in communication networks to
ensure smooth and dependable service. It states that the performance of real-time …

Smart IoT System Construction of Security Mechanisms Based on Quantum Walks and Chaotic Systems

A Alanezi - 2024 - search.proquest.com
The integration of Internet of Things (IoT) into daily life, particularly in the context of fifth-
generation (5G) networks, demands robust security mechanisms to protect sensitive …

Security And Privacy Enhancement In Mobile-Cloud Computing Through Cloud Broker Trust Management Implementation Using CITE Frame Work

P Murugesan - Cuestiones de Fisioterapia, 2025 - cuestionesdefisioterapia.com
This study proposes a holistic cloud broker trust management system for mobile-cloud that
addresses many significant issues in privacy and security. The research adopts the CITE …

[PDF][PDF] Security And Privacy Enhancement In Mobile-Cloud Computing Through Cloud Broker Trust Management Implementation Using CITE Frame Work

DKSR Parthasarathi Murugesan - Cuestiones de …, 2025 - cuestionesdefisioterapia.com
This study proposes a holistic cloud broker trust management system for mobile-cloud that
addresses manysignificant issues in privacy and security. The research adopts the CITE …

Efficient Complex Event Processing Over Concurrent Event Streams

Y Yan, Y Zhang, G Deng, Y Sun… - 2024 Sixth International …, 2024 - ieeexplore.ieee.org
We study the problem of Complex Event Processing from the event streams. Existing
methods solve this problem based on the assumption that the events in the stream do not …