Sciweavers

6195 search results - page 83 / 1239
» Cloud Computing Security
Sort
View
130
Voted
FGCS
2010
111views more  FGCS 2010»
15 years 2 months ago
Autonomic metered pricing for a utility computing service
An increasing number of providers are offering utility computing services which require users to pay only when they use. Most of these providers currently charge users for metere...
Chee Shin Yeo, Srikumar Venugopal, Xingchen Chu, R...
148
Voted
NSDI
2010
15 years 5 months ago
Volley: Automated Data Placement for Geo-Distributed Cloud Services
: As cloud services grow to span more and more globally distributed datacenters, there is an increasingly urgent need for automated mechanisms to place application data across thes...
Sharad Agarwal, John Dunagan, Navendu Jain, Stefan...
121
Voted
PDCAT
2005
Springer
15 years 9 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
119
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 10 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
123
Voted
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 9 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...