Search results

Jump to: navigation, search
  • + Security and information assurance + Cloud computing as a service
    7 KB (907 words) - 21:51, 14 October 2008
  • • Content in the Cloud • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • * Privacy and Security in Databases. * Cloud data and services.
    2 KB (308 words) - 23:08, 14 October 2008
  • * Network Security * Cloud and Utility computing
    4 KB (465 words) - 23:11, 14 October 2008
  • * Cloud computing * Security, privacy, and trust
    6 KB (869 words) - 23:14, 14 October 2008
  • * Cloud computing and data center networks * Architectural support for improving security or availability
    4 KB (577 words) - 23:31, 14 October 2008
  • Security in distributed systems Cloud computing
    5 KB (702 words) - 23:31, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.
    4 KB (577 words) - 09:28, 12 May 2020
  • * Cloud, datacenter, cluster/distributed systems * Security
    3 KB (327 words) - 13:11, 11 May 2020
  • *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing
    4 KB (514 words) - 12:03, 6 April 2020
  • ...acebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others will have a * Gateways to cloud computing services;
    3 KB (378 words) - 23:34, 14 October 2008
  • ...nues to move at astonishing speed. In the past few years alone, we've seen cloud computing and software as a service, containerized computing, multicore/man ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions
    6 KB (781 words) - 23:39, 14 October 2008
  • ...ance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran
    7 KB (883 words) - 17:35, 7 January 2021
  • Green Computing, and Cloud Computing. * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • ...e = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next
    5 KB (624 words) - 13:00, 18 January 2009
  • + Scalable System and Cloud Computing + Security
    3 KB (410 words) - 13:01, 18 January 2009
  • * Web service, grid, cloud and transparent computing * Privacy, security, ethics, culture, and anonymity issues
    6 KB (767 words) - 13:01, 18 January 2009
  • * security in distributed computing, cryptographic protocols cloud computing will be held on the days before and after DISC (September 22 and
    7 KB (890 words) - 15:05, 27 December 2015
  • distributed computing and has led to the emergence of the cloud opportunities created by IaaS/cloud computing and virtualization
    5 KB (576 words) - 16:34, 27 February 2009
  • ...topics that link adaptability of Web services to the paradigm of SaaS and cloud computing. In additional to the topics covered in the previous workshops, w * Capacity planning of services running on the cloud
    6 KB (855 words) - 17:06, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • * Network Security * Cloud and Utility computing
    7 KB (1,054 words) - 16:43, 27 December 2015
  • dependability, security, accuracy, customer service, trust, etc.). The * Security and trust aspects in SLAs.
    8 KB (1,033 words) - 11:35, 2 August 2009
  • | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)
    9 KB (1,261 words) - 11:35, 2 August 2009
  • ...benchmarking, review, inspection and walkthrough, reliability, safety and security pervasive computing, service oriented computing, grid software, cloud computing, intelligent systems
    4 KB (583 words) - 12:17, 25 November 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.
    3 KB (338 words) - 16:53, 27 December 2015
  • W2: 1st International Workshop on Cloud Computing Interoperability and Services W5: Workshop on Security and High Performance Computing Systems (SHPCS 2010)
    4 KB (510 words) - 20:56, 7 February 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: International Conference on Cloud Computing and Services Science (CLOSER)
    4 KB (405 words) - 20:45, 3 November 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • ...orkshop we are interested to get papers on Internet, Ubiquitous computing, Cloud computing, and distributed computing/networking so that the researchers cou - Cloud Computing & Communications
    5 KB (667 words) - 12:08, 19 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • * Cloud storage * Storage security
    5 KB (599 words) - 13:41, 26 February 2020
  • **Cloud storage **Storage security
    5 KB (597 words) - 13:44, 26 February 2020
  • **Cloud storage **Storage security
    4 KB (553 words) - 13:45, 26 February 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • * Cloud- and edge-based IS engineering * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • * Massively-parallel, high-performance, cloud and grid computing * Security in distributed computing, cryptographic protocols
    3 KB (344 words) - 11:30, 21 April 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • * Network Security * Cloud Computing: Optimizing the Cloud (path, communication, application, etc.)
    3 KB (322 words) - 05:59, 8 March 2011
  • ...th International Congress on Computer Science Research (CIICC'11) will be "Cloud Computing and Virtualization". This year CIICC'11 will provide a forum for − Information Security and Applied Cryptography.
    3 KB (367 words) - 16:37, 27 December 2015
  • ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others);
    2 KB (306 words) - 14:54, 12 November 2020
  • * Privacy, Safety and Security * Cloud Computing
    4 KB (439 words) - 17:54, 29 June 2011
  • |Title=2nd International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012)
    5 KB (677 words) - 11:59, 1 July 2011
  • "Cloud Computing" [http://www.iasted.org/conferences/chair2-757.html] *Cloud Computing
    13 KB (1,774 words) - 18:35, 31 August 2011
  • - Security related issues of satellite communications Special Session on Satellite Technologies for Cloud-based Services
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Security-related performance issues in high-performance computing environments such • Peer-to-peer systems for high-performance grid and cloud environments
    4 KB (485 words) - 12:22, 22 November 2011
  • ...concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest i Trust, Security and Privacy in embedded systems
    4 KB (451 words) - 12:27, 30 November 2011
  • Communications modeling; Communications security; Computer (everything, things, people, etc.); Internet, Virtualization and Cloud;
    6 KB (725 words) - 19:58, 22 November 2020
  • ...and practitioners from multiple disciplines to focus on service-oriented, cloud-based innovative for the 21st century enterprises. The conference will feat ...t impact on the field of service-oriented computing and also in particular cloud services.
    6 KB (745 words) - 15:27, 1 November 2016
  • Energy-efficient grid, cloud, and data center technology Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012
  • |Title=European Conference on Service-Oriented and Cloud Computing 2012 The European Conference on Service-Oriented and Cloud Computing (ESOCC)
    4 KB (504 words) - 18:21, 5 March 2012
  • ...tion; Man-in-the-middle attacks; Bundle streaming service; Self-organizing cloud cells; Soft-coded and hard-coded relaying ...hnologies and networking; Mobile network expansion solutions (small cells, Cloud-RAN, etc.); 5G radio-access networks (RAN); D2D communications in cellular
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • *Cloud data management *Security, privacy, and trust
    4 KB (535 words) - 21:32, 11 February 2020
  • *Cloud data management Recommendation systems *Security, privacy, and trust
    4 KB (500 words) - 17:29, 6 January 2021
  • *Cyber Security and Privacy *Semantic Web, Cloud Computing, and Web Information Systems
    5 KB (663 words) - 11:49, 18 February 2020
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cloud computing || Fault localization || Software process || Software product lin
    6 KB (738 words) - 11:21, 6 July 2020
  • ...ecture, distributed search, metasearch, peer-to-peer search, search in the cloud). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).
    8 KB (1,024 words) - 09:57, 13 May 2020
  • • Information and data governance, information assurance, security, compliance • Semantic cloud computing, edge computing, fog computing
    6 KB (872 words) - 23:11, 24 February 2020
  • *Cloud computing and data centers *Security and privacy, cryptographic protocols
    2 KB (299 words) - 11:51, 8 April 2020
  • ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • |Title=3rd International Conference on Cloud Computing and Services Science ...D COMPUTING FUNDAMENTALS, SERVICES SCIENCE FOUNDATION FOR CLOUD COMPUTING, CLOUD COMPUTING PLATFORMS AND APPLICATIONS, LOUD COMPUTING ENABLING TECHNOLOGY
    5 KB (662 words) - 18:50, 20 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • - Cloud Computing<br /> - Security and Access Control<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Cloud-enabled large-scale simulation
    6 KB (728 words) - 01:01, 25 August 2012
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • Information Security Cloud Computing and Green Computing
    2 KB (224 words) - 08:27, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cloud-based IS engineering
    3 KB (375 words) - 15:06, 24 September 2020
  • ...ge of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols. ● Trust, Security and Privacy in embedded systems
    5 KB (677 words) - 15:19, 19 December 2012
  • * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing
    5 KB (584 words) - 14:44, 14 January 2013
  • ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust - Implications for Security, Privacy, International Law and the Cloud
    5 KB (702 words) - 10:02, 5 March 2013
  • ...e emerged; besides, other novel techniques, such as virtualization and the cloud paradigm, have taken roots. All in all, these bring about new requirements - Security solutions for managed and infrastructureless networks
    9 KB (1,145 words) - 16:57, 11 April 2013
  • • Privacy, safety and securityCloud Computing
    4 KB (438 words) - 14:04, 8 May 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cloud Computing *Cyber Security
    3 KB (308 words) - 17:30, 26 May 2016
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • *Cloud Services and Networking *Security, Privacy and Content Protection
    1 KB (129 words) - 09:41, 4 September 2023
  • Information Security Cloud Computing, Computing Models
    3 KB (359 words) - 22:34, 30 September 2016
  • * Cloud Computing * Web Security and Trust Management
    2 KB (230 words) - 00:37, 28 May 2016
  • * Cloud Computing * Information Assurance and Security
    9 KB (1,131 words) - 23:18, 24 February 2020
  • * Information and data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing
    6 KB (877 words) - 23:06, 24 February 2020
  • |Title=MEDES 2016 : Special Track: Secure Cloud Computing |Field=cloud computing, security, watermarking, risk management
    430 bytes (50 words) - 16:17, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • - Cloud Computing and Big Data Analytics - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • ...r Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing) |Field=cloud forensics, cloud security, cybercrime investigation, digital forensics
    454 bytes (52 words) - 17:01, 10 February 2021
  • * Cloud Computing Services * Security and Privacy Issues
    925 bytes (116 words) - 11:05, 24 August 2016
  • |Field=networks, computing, cloud computing, network security
    443 bytes (50 words) - 09:31, 19 July 2019
  • |Field=cloud computing, multimedia, network security, networking
    416 bytes (48 words) - 10:48, 11 September 2016
  • ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    10 KB (1,305 words) - 00:29, 12 December 2020
  • * Cloud Computing Services * Security and Privacy of Information and IS
    3 KB (434 words) - 10:28, 26 July 2016
  • ...uages and integration, interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se * cloud computing
    5 KB (580 words) - 20:22, 28 January 2017
  • ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)