Sciweavers

6195 search results - page 111 / 1239
» Cloud Computing Security
Sort
View
EUROPAR
2009
Springer
15 years 7 months ago
Dynamic Virtual Cluster Reconfiguration for Efficient IaaS Provisioning
Abstract. Cloud computing is an emerging paradigm to provide Infrastructure as a Service (IaaS). In this paper we present NEPTUNE-IaaS, a software system able to support the whole ...
Vittorio Manetti, Pasquale Di Gennaro, Roberto Bif...
112
Voted
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 10 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
SIGCOMM
2012
ACM
13 years 6 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
DAGSTUHL
2010
15 years 5 months ago
Visual Simulation of Flow
We have adopted a numerical method from computational fluid dynamics, the Lattice Boltzmann Method (LBM), for real-time simulation and visualization of flow and amorphous phenomen...
Arie E. Kaufman, Ye Zhao