Search results
Create the page "Cloud security" on this wiki! See also the search results found.
- + Security and information assurance + Cloud computing as a service7 KB (907 words) - 21:51, 14 October 2008
- • Content in the Cloud • Ethical, Social, Privacy, Security and moral Issues in an e-societ5 KB (530 words) - 10:27, 24 June 2011
- * Privacy and Security in Databases. * Cloud data and services.2 KB (308 words) - 23:08, 14 October 2008
- * Network Security * Cloud and Utility computing4 KB (465 words) - 23:11, 14 October 2008
- * Cloud computing * Security, privacy, and trust6 KB (869 words) - 23:14, 14 October 2008
- * Cloud computing and data center networks * Architectural support for improving security or availability4 KB (577 words) - 23:31, 14 October 2008
- Security in distributed systems Cloud computing5 KB (702 words) - 23:31, 14 October 2008
- ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.5 KB (580 words) - 10:32, 12 May 2020
- ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.4 KB (577 words) - 09:28, 12 May 2020
- * Cloud, datacenter, cluster/distributed systems * Security3 KB (327 words) - 13:11, 11 May 2020
- *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing4 KB (514 words) - 12:03, 6 April 2020
- ...acebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others will have a * Gateways to cloud computing services;3 KB (378 words) - 23:34, 14 October 2008
- ...nues to move at astonishing speed. In the past few years alone, we've seen cloud computing and software as a service, containerized computing, multicore/man ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions6 KB (781 words) - 23:39, 14 October 2008
- ...ance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran7 KB (883 words) - 17:35, 7 January 2021
- Green Computing, and Cloud Computing. * Security and privacy for RTSOAA based CPS7 KB (922 words) - 00:58, 9 January 2009
- ...e = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next5 KB (624 words) - 13:00, 18 January 2009
- + Scalable System and Cloud Computing + Security3 KB (410 words) - 13:01, 18 January 2009
- * Web service, grid, cloud and transparent computing * Privacy, security, ethics, culture, and anonymity issues6 KB (767 words) - 13:01, 18 January 2009
- * security in distributed computing, cryptographic protocols cloud computing will be held on the days before and after DISC (September 22 and7 KB (890 words) - 15:05, 27 December 2015
- distributed computing and has led to the emergence of the cloud opportunities created by IaaS/cloud computing and virtualization5 KB (576 words) - 16:34, 27 February 2009
- ...topics that link adaptability of Web services to the paradigm of SaaS and cloud computing. In additional to the topics covered in the previous workshops, w * Capacity planning of services running on the cloud6 KB (855 words) - 17:06, 27 February 2009
- ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy7 KB (941 words) - 17:07, 27 February 2009
- * Network Security * Cloud and Utility computing7 KB (1,054 words) - 16:43, 27 December 2015
- dependability, security, accuracy, customer service, trust, etc.). The * Security and trust aspects in SLAs.8 KB (1,033 words) - 11:35, 2 August 2009
- | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)9 KB (1,261 words) - 11:35, 2 August 2009
- ...benchmarking, review, inspection and walkthrough, reliability, safety and security pervasive computing, service oriented computing, grid software, cloud computing, intelligent systems4 KB (583 words) - 12:17, 25 November 2009
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.3 KB (338 words) - 16:53, 27 December 2015
- W2: 1st International Workshop on Cloud Computing Interoperability and Services W5: Workshop on Security and High Performance Computing Systems (SHPCS 2010)4 KB (510 words) - 20:56, 7 February 2010
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- |Title=International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: International Conference on Cloud Computing and Services Science (CLOSER)4 KB (405 words) - 20:45, 3 November 2010
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- ...orkshop we are interested to get papers on Internet, Ubiquitous computing, Cloud computing, and distributed computing/networking so that the researchers cou - Cloud Computing & Communications5 KB (667 words) - 12:08, 19 May 2010
- 5. WEB SECURITY * › Web Security and Privacy5 KB (627 words) - 12:33, 16 June 2010
- * Cloud storage * Storage security5 KB (599 words) - 13:41, 26 February 2020
- **Cloud storage **Storage security5 KB (597 words) - 13:44, 26 February 2020
- **Cloud storage **Storage security4 KB (553 words) - 13:45, 26 February 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- * Cloud- and edge-based IS engineering * Privacy, security, trust, and safety management3 KB (395 words) - 15:14, 24 September 2020
- * Massively-parallel, high-performance, cloud and grid computing * Security in distributed computing, cryptographic protocols3 KB (344 words) - 11:30, 21 April 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev3 KB (462 words) - 11:51, 22 March 2020
- * Network Security * Cloud Computing: Optimizing the Cloud (path, communication, application, etc.)3 KB (322 words) - 05:59, 8 March 2011
- ...th International Congress on Computer Science Research (CIICC'11) will be "Cloud Computing and Virtualization". This year CIICC'11 will provide a forum for − Information Security and Applied Cryptography.3 KB (367 words) - 16:37, 27 December 2015
- ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others);2 KB (306 words) - 14:54, 12 November 2020
- * Privacy, Safety and Security * Cloud Computing4 KB (439 words) - 17:54, 29 June 2011
- |Title=2nd International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012)5 KB (677 words) - 11:59, 1 July 2011
- "Cloud Computing" [http://www.iasted.org/conferences/chair2-757.html] *Cloud Computing13 KB (1,774 words) - 18:35, 31 August 2011
- - Security related issues of satellite communications Special Session on Satellite Technologies for Cloud-based Services9 KB (1,218 words) - 16:06, 1 October 2020
- • Security-related performance issues in high-performance computing environments such • Peer-to-peer systems for high-performance grid and cloud environments4 KB (485 words) - 12:22, 22 November 2011
- ...concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest i Trust, Security and Privacy in embedded systems4 KB (451 words) - 12:27, 30 November 2011
- Communications modeling; Communications security; Computer (everything, things, people, etc.); Internet, Virtualization and Cloud;6 KB (725 words) - 19:58, 22 November 2020
- ...and practitioners from multiple disciplines to focus on service-oriented, cloud-based innovative for the 21st century enterprises. The conference will feat ...t impact on the field of service-oriented computing and also in particular cloud services.6 KB (745 words) - 15:27, 1 November 2016
- Energy-efficient grid, cloud, and data center technology Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability10 KB (1,297 words) - 17:49, 24 February 2012
- |Title=European Conference on Service-Oriented and Cloud Computing 2012 The European Conference on Service-Oriented and Cloud Computing (ESOCC)4 KB (504 words) - 18:21, 5 March 2012
- ...tion; Man-in-the-middle attacks; Bundle streaming service; Self-organizing cloud cells; Soft-coded and hard-coded relaying ...hnologies and networking; Mobile network expansion solutions (small cells, Cloud-RAN, etc.); 5G radio-access networks (RAN); D2D communications in cellular13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- *Cloud data management *Security, privacy, and trust4 KB (535 words) - 21:32, 11 February 2020
- *Cloud data management Recommendation systems *Security, privacy, and trust4 KB (500 words) - 17:29, 6 January 2021
- *Cyber Security and Privacy *Semantic Web, Cloud Computing, and Web Information Systems5 KB (663 words) - 11:49, 18 February 2020
- ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cloud computing || Fault localization || Software process || Software product lin6 KB (738 words) - 11:21, 6 July 2020
- ...ecture, distributed search, metasearch, peer-to-peer search, search in the cloud). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).8 KB (1,024 words) - 09:57, 13 May 2020
- • Information and data governance, information assurance, security, compliance • Semantic cloud computing, edge computing, fog computing6 KB (872 words) - 23:11, 24 February 2020
- *Cloud computing and data centers *Security and privacy, cryptographic protocols2 KB (299 words) - 11:51, 8 April 2020
- ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and3 KB (434 words) - 22:46, 30 May 2012
- |Title=3rd International Conference on Cloud Computing and Services Science ...D COMPUTING FUNDAMENTALS, SERVICES SCIENCE FOUNDATION FOR CLOUD COMPUTING, CLOUD COMPUTING PLATFORMS AND APPLICATIONS, LOUD COMPUTING ENABLING TECHNOLOGY5 KB (662 words) - 18:50, 20 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- - Cloud Computing<br /> - Security and Access Control<br />3 KB (466 words) - 13:00, 16 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Cloud-enabled large-scale simulation6 KB (728 words) - 01:01, 25 August 2012
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- Information Security Cloud Computing and Green Computing2 KB (224 words) - 08:27, 26 October 2012
- |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology3 KB (351 words) - 09:52, 28 October 2012
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cloud-based IS engineering3 KB (375 words) - 15:06, 24 September 2020
- ...ge of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols. ● Trust, Security and Privacy in embedded systems5 KB (677 words) - 15:19, 19 December 2012
- * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing5 KB (584 words) - 14:44, 14 January 2013
- ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust - Implications for Security, Privacy, International Law and the Cloud5 KB (702 words) - 10:02, 5 March 2013
- ...e emerged; besides, other novel techniques, such as virtualization and the cloud paradigm, have taken roots. All in all, these bring about new requirements - Security solutions for managed and infrastructureless networks9 KB (1,145 words) - 16:57, 11 April 2013
- • Privacy, safety and security • Cloud Computing4 KB (438 words) - 14:04, 8 May 2013
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- *Cloud Computing *Cyber Security3 KB (308 words) - 17:30, 26 May 2016
- *Information Security and Cryptography *Network and Cyber Security2 KB (227 words) - 11:30, 21 June 2016
- ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- *Cloud Services and Networking *Security, Privacy and Content Protection1 KB (129 words) - 09:41, 4 September 2023
- Information Security Cloud Computing, Computing Models3 KB (359 words) - 22:34, 30 September 2016
- * Cloud Computing * Web Security and Trust Management2 KB (230 words) - 00:37, 28 May 2016
- * Cloud Computing * Information Assurance and Security9 KB (1,131 words) - 23:18, 24 February 2020
- * Information and data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing6 KB (877 words) - 23:06, 24 February 2020
- |Title=MEDES 2016 : Special Track: Secure Cloud Computing |Field=cloud computing, security, watermarking, risk management430 bytes (50 words) - 16:17, 8 July 2016
- |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing329 bytes (35 words) - 17:36, 8 July 2016
- - Cloud Computing and Big Data Analytics - Security and Privacy12 KB (1,565 words) - 04:15, 5 August 2023
- |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- ...r Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing) |Field=cloud forensics, cloud security, cybercrime investigation, digital forensics454 bytes (52 words) - 17:01, 10 February 2021
- * Cloud Computing Services * Security and Privacy Issues925 bytes (116 words) - 11:05, 24 August 2016
- |Field=networks, computing, cloud computing, network security443 bytes (50 words) - 09:31, 19 July 2019
- |Field=cloud computing, multimedia, network security, networking416 bytes (48 words) - 10:48, 11 September 2016
- ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques10 KB (1,305 words) - 00:29, 12 December 2020
- * Cloud Computing Services * Security and Privacy of Information and IS3 KB (434 words) - 10:28, 26 July 2016
- ...uages and integration, interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se * cloud computing5 KB (580 words) - 20:22, 28 January 2017
- ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (282 words) - 10:48, 8 February 2020
- ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (270 words) - 10:49, 8 February 2020