Search results

Jump to: navigation, search
  • * concurrency and recovery, distributed and parallel databases, cloud computing * data privacy and security
    4 KB (557 words) - 10:14, 15 May 2019
  • |Title=IJCCSA 2016 : International Journal on Cloud Computing: Services and Architecture |Field=cloud computing, cloud, networking, security
    379 bytes (45 words) - 13:45, 25 September 2016
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • * cloud computing * security and privacy
    9 KB (1,190 words) - 10:12, 5 June 2019
  • Communication Security, Trust, Protocols and Applications Communication Network Security
    5 KB (588 words) - 18:00, 21 January 2017
  • cloud computing, big data, and mobile cloud services, to build innovative smart - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • * Distributed data platforms, including Cloud data systems, key-value stores, and Big Data systems * Data, information, and information systems security
    3 KB (421 words) - 20:37, 11 February 2021
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • Security and Access Control Information Content Security
    4 KB (528 words) - 18:46, 29 August 2017
  • *cloud computing *security and privacy
    10 KB (1,309 words) - 10:29, 5 June 2019
  • the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.
    7 KB (887 words) - 15:22, 15 July 2017
  • * Information/data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing
    6 KB (798 words) - 23:16, 24 February 2020
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...CC II 2017 : 3rd International Symposium on Real-time Data Processing for Cloud Computing of the important applications in Cloud Computing. The academia, the industry and
    4 KB (532 words) - 13:28, 28 July 2017
  • |Title=CLOSER 2018 : 8th International Conference on Cloud Computing and Services Science 8th International Conference on Cloud Computing and Services Science CLOSER
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Cloud Computing Techniques for Big Data Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • |Title=SmartCloud 2017 : The 2nd IEEE International Conference on Smart Cloud 2017 |Homepage=http://www.cloud-conf.net/smartcloud/2017/
    3 KB (464 words) - 09:30, 3 September 2017
  • Big data and Cloud Computing Network and Data Security
    5 KB (673 words) - 09:53, 3 September 2017
  • - High-performance, cluster, cloud and grid computing - Security and privacy, cryptographic protocols
    7 KB (1,009 words) - 15:54, 3 September 2019
  • Security, Computer Vision. Following the past successful symposium SoICT 2016, 2. Network Communication and Security: Future Internet, Optical Networks, Mobile
    4 KB (559 words) - 11:58, 8 August 2017
  • * Cloud and grid computing for big data * Security and privacy for big data
    3 KB (436 words) - 10:46, 27 May 2020
  • Big Data: models for data in the Cloud, programming languages for big data, Security in Information and Knowledge Systems: identity theft, privacy,
    9 KB (1,118 words) - 13:41, 3 September 2017
  • ...The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • - Networking for Cloud Computing - Mobile Cloud Computing and Mobile Edge Computing
    6 KB (873 words) - 13:30, 28 July 2017
  • Cloud computing Cryptography and network security
    4 KB (524 words) - 13:30, 28 July 2017
  • aspects, gamification, cloud services and resources, universal design, - Security and accreditation models.
    3 KB (407 words) - 11:52, 8 August 2017
  • * Computer Security * Internet & Cloud Computing
    4 KB (523 words) - 13:30, 28 July 2017
  • - Cloud Computing - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • Cloud computing Network management & security
    4 KB (497 words) - 11:58, 8 August 2017
  • Integration of IoT with cloud computing (cloud of things) Security and privacy in heterogeneous IoT
    4 KB (483 words) - 10:00, 21 August 2017
  • |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV
    4 KB (515 words) - 11:28, 6 November 2020
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • Watching streaming videos, uploading pictures and using cloud-based services and network security.
    4 KB (442 words) - 10:00, 21 August 2017
  • performance, energy, virtualization, portability, security, or reliability throughput or latency, security, reliability, or functional debugging
    3 KB (391 words) - 12:32, 11 April 2020
  • Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;
    4 KB (495 words) - 13:34, 28 July 2017
  • - Security - Mobile security / RFID
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and • Cloud computing infrastructures, cellular networks and M2M technologies in
    5 KB (696 words) - 11:36, 8 August 2017
  • - Cloud Computing Area 5: Security and Privacy in Sensor Networks
    5 KB (632 words) - 12:30, 3 September 2017
  • Conference on Utility and Cloud Computing (UCC 2017) in Austin, Texas, USA, - Scientific Application Case Studies on Cloud Infrastructure
    4 KB (583 words) - 10:01, 3 September 2017
  • * microservices for cloud-native architectures; * privacy and security for microservices;
    2 KB (245 words) - 13:34, 28 July 2017
  • - Security and Privacy + Software for the Cloud (including topics related to)
    8 KB (1,150 words) - 10:11, 7 August 2019
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • protocols, architectures and modeling of Wireless Networks, Cloud Computing, - Security
    4 KB (475 words) - 12:34, 8 August 2017
  • Cloud Computing CC Computer Security SEC
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security. Advanced Machine Learning Technologies for Cloud Computing
    3 KB (355 words) - 12:33, 3 September 2017
  • - Cloud-assisted multimedia systems - Multimedia system for traffic and public security
    5 KB (623 words) - 11:57, 8 August 2017
  • vehicles, smart communities, biomedical instruments, security surveillance. * Distributed Multimedia Systems and Cloud Computing
    5 KB (654 words) - 09:58, 21 August 2017
  • as Cloud computing, Internet-of-Things (IoT), Machine-to-Machine (M2M) user-centric, cloud-based service-oriented architecture applications and systems
    4 KB (494 words) - 13:20, 28 July 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile technologies; M2M Communications; Sensing and IoT architectures; Cloud computing
    4 KB (508 words) - 13:23, 28 July 2017
  • Homeland Security Systems Safety and Security
    3 KB (324 words) - 13:34, 5 December 2017
  • - Security - Mobile security / RFID
    3 KB (346 words) - 19:16, 26 November 2020
  • - Databases in the Cloud - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • |Homepage=http://www.cloud-conf.net/smartcom/2017/ Website: http://www.cloud-conf.net/smartcom/2017/index.html
    3 KB (412 words) - 11:51, 3 September 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security
    3 KB (380 words) - 12:30, 3 September 2017
  • |Title=IJCCSA 2017 : International Journal on Cloud Computing: Services and Architecture |Field=security
    6 KB (799 words) - 13:28, 28 July 2017
  • |Field=security real-time transmission, and cloud-based service provision. As the key building
    4 KB (500 words) - 09:56, 21 August 2017
  • like Web-based systems, data centers and cloud infrastructures, social scalability, elasticity, availability, reliability, and security.
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • Information Security & Computer Forensics Cloud Computing and Big Data
    2 KB (246 words) - 12:11, 3 September 2017
  • *security, access control, and licensing issues of Linked Data ...There are a variety of examples in the wild. See the Linked Open Research Cloud for further details on how to make your article discoverable.
    6 KB (926 words) - 17:55, 9 January 2018
  • and intelligent data processing, as well as enhanced data security and privacy Cloud Computing Techniques for Big Data
    6 KB (876 words) - 09:59, 21 August 2017
  • |Title=CCISA 2018 : 6th CLOUD COMPUTING ON INFRASTRUCTURE AS A SERVICE AND ITS APPLICATIONS (CCISA) |Field=cloud computing
    6 KB (880 words) - 10:00, 21 August 2017
  • ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties
    7 KB (910 words) - 10:36, 26 November 2017
  • |Field=, service-orientation,cloud computing,business process management,microservices ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing, RESTful services, and microservices.
    4 KB (565 words) - 18:34, 4 July 2020
  • for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties
    7 KB (1,046 words) - 10:36, 26 November 2017
  • ...of data and services), interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se ...obile computing, search engine, question answering, robotics, web service, security and privacy
    12 KB (1,578 words) - 14:54, 24 September 2020
  • * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service
    4 KB (548 words) - 08:05, 13 September 2019
  • Privacy and Security in Data Management. Distributed Database Systems, Cloud Data Management, NoSQL, Scalable Analytics, Distributed Transactions, Consi
    6 KB (826 words) - 09:45, 19 February 2021
  • ...data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) * Infrastructures (e.g., cloud computing, data intensive computing, database systems, indexing and compres
    4 KB (546 words) - 14:37, 3 August 2023
  • ...mmediate issues that are significantly influencing all aspects of cluster, cloud, grid and edge computing. ...tures; multicores; power and cooling; power-efficient ("green") computing; security and reliability; high availability solutions; high performance GPU applicat
    1 KB (173 words) - 23:51, 24 February 2020
  • * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service
    4 KB (510 words) - 09:37, 21 April 2020
  • * privacy and security issues * media grid computing, cloud and virtualization
    4 KB (436 words) - 11:49, 21 April 2020
  • *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing
    2 KB (290 words) - 11:16, 6 April 2020
  • *Existing and emerging platforms at all scales, from embedded to cloud *Internet services, cloud computing, and datacenters
    4 KB (547 words) - 12:27, 30 September 2019
  • *A Maturity Model for IT-related Security Incident Management *Energy Efficient Cloud Data Center Using Dynamic Virtual Machine Consolidation Algorithm
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=17th International Symposium on Cluster, Cloud and Grid Computing ...research results and technological developments in the fields of Cluster, Cloud and Grid computing. The CCGrid symposium, which is sponsored by the IEEE Co
    2 KB (288 words) - 09:18, 6 June 2019
  • * cloud computing * security and privacy
    2 KB (238 words) - 18:42, 7 March 2020
  • Big data and cloud computing Security
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • ...tion infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulation. ...on-making, visual analytics, intelligent support in M&S, and simulation in cloud computing environments.
    3 KB (457 words) - 08:25, 17 April 2020
  • * Data Privacy and Security ** Cloud Data Management
    3 KB (396 words) - 09:53, 19 February 2021
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to busines
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • Track 2: Cloud Services and Networking Track 7: Security, Privacy and Content Protection
    6 KB (769 words) - 09:37, 4 September 2023
  • * Wireless Network Security * Emerging Technologies: Cloud Computing
    2 KB (192 words) - 14:37, 11 December 2023
  • *Big data platforms with applications to network management, security, measurements *Networking aspects of data-centers and cloud computing
    2 KB (238 words) - 11:18, 6 April 2020
  • * cloud, edge and fog computing, * security and practical applications of cryptography,
    2 KB (210 words) - 12:33, 22 December 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; ...tion, reconfiguration, networked computing, parallel, high-performance and cloud computing;
    2 KB (264 words) - 18:00, 18 February 2021
  • ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F
    5 KB (556 words) - 15:23, 14 January 2021
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 10:19, 9 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • * Software & System Security * Software and system security and privacy
    5 KB (608 words) - 13:03, 15 April 2020
  • *cloud, edge and fog computing, *security and practical applications of cryptography,
    3 KB (303 words) - 08:58, 16 April 2020
  • * cloud computing, * security and practical applications of cryptography,
    2 KB (222 words) - 11:23, 16 April 2020

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)