Sciweavers

6195 search results - page 8 / 1239
» Cloud Computing Security
Sort
View
CACM
2010
87views more  CACM 2010»
14 years 9 months ago
Security in the cloud
Gary Anthes
IEEECIT
2010
IEEE
14 years 10 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
104
Voted
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 7 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
CLOUD
2010
ACM
15 years 5 months ago
Characterizing cloud computing hardware reliability
Kashi Venkatesh Vishwanath, Nachiappan Nagappan
INFOCOM
2010
IEEE
14 years 10 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...