Search results
Create the page "Cloud security" on this wiki! See also the search results found.
- * concurrency and recovery, distributed and parallel databases, cloud computing * data privacy and security4 KB (557 words) - 10:14, 15 May 2019
- |Title=IJCCSA 2016 : International Journal on Cloud Computing: Services and Architecture |Field=cloud computing, cloud, networking, security379 bytes (45 words) - 13:45, 25 September 2016
- * Software & System Security ** Software and system security and privacy18 KB (2,288 words) - 12:48, 27 October 2016
- * cloud computing * security and privacy9 KB (1,190 words) - 10:12, 5 June 2019
- Communication Security, Trust, Protocols and Applications Communication Network Security5 KB (588 words) - 18:00, 21 January 2017
- cloud computing, big data, and mobile cloud services, to build innovative smart - Smart city system security and privacy4 KB (565 words) - 09:46, 7 February 2017
- * Distributed data platforms, including Cloud data systems, key-value stores, and Big Data systems * Data, information, and information systems security3 KB (421 words) - 20:37, 11 February 2021
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –5 KB (631 words) - 15:09, 10 April 2017
- Security and Access Control Information Content Security4 KB (528 words) - 18:46, 29 August 2017
- *cloud computing *security and privacy10 KB (1,309 words) - 10:29, 5 June 2019
- the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.7 KB (887 words) - 15:22, 15 July 2017
- * Information/data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing6 KB (798 words) - 23:16, 24 February 2020
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- ...CC II 2017 : 3rd International Symposium on Real-time Data Processing for Cloud Computing of the important applications in Cloud Computing. The academia, the industry and4 KB (532 words) - 13:28, 28 July 2017
- |Title=CLOSER 2018 : 8th International Conference on Cloud Computing and Services Science 8th International Conference on Cloud Computing and Services Science CLOSER7 KB (1,009 words) - 13:39, 3 September 2017
- Cloud Computing Techniques for Big Data Security Applications of Big Data3 KB (461 words) - 13:22, 3 September 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- |Title=SmartCloud 2017 : The 2nd IEEE International Conference on Smart Cloud 2017 |Homepage=http://www.cloud-conf.net/smartcloud/2017/3 KB (464 words) - 09:30, 3 September 2017
- Big data and Cloud Computing Network and Data Security5 KB (673 words) - 09:53, 3 September 2017
- - High-performance, cluster, cloud and grid computing - Security and privacy, cryptographic protocols7 KB (1,009 words) - 15:54, 3 September 2019
- Security, Computer Vision. Following the past successful symposium SoICT 2016, 2. Network Communication and Security: Future Internet, Optical Networks, Mobile4 KB (559 words) - 11:58, 8 August 2017
- * Cloud and grid computing for big data * Security and privacy for big data3 KB (436 words) - 10:46, 27 May 2020
- Big Data: models for data in the Cloud, programming languages for big data, Security in Information and Knowledge Systems: identity theft, privacy,9 KB (1,118 words) - 13:41, 3 September 2017
- ...The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security4 KB (536 words) - 09:59, 21 August 2017
- - Networking for Cloud Computing - Mobile Cloud Computing and Mobile Edge Computing6 KB (873 words) - 13:30, 28 July 2017
- Cloud computing Cryptography and network security4 KB (524 words) - 13:30, 28 July 2017
- aspects, gamification, cloud services and resources, universal design, - Security and accreditation models.3 KB (407 words) - 11:52, 8 August 2017
- * Computer Security * Internet & Cloud Computing4 KB (523 words) - 13:30, 28 July 2017
- - Cloud Computing - IT Architecture and Security1 KB (136 words) - 11:52, 8 August 2017
- Cloud computing Network management & security4 KB (497 words) - 11:58, 8 August 2017
- Integration of IoT with cloud computing (cloud of things) Security and privacy in heterogeneous IoT4 KB (483 words) - 10:00, 21 August 2017
- |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV4 KB (515 words) - 11:28, 6 November 2020
- |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security5 KB (626 words) - 12:02, 3 September 2017
- |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities5 KB (722 words) - 10:00, 21 August 2017
- Watching streaming videos, uploading pictures and using cloud-based services and network security.4 KB (442 words) - 10:00, 21 August 2017
- performance, energy, virtualization, portability, security, or reliability throughput or latency, security, reliability, or functional debugging3 KB (391 words) - 12:32, 11 April 2020
- Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;4 KB (495 words) - 13:34, 28 July 2017
- - Security - Mobile security / RFID4 KB (580 words) - 20:58, 12 November 2020
- wellness, safety and security, energy and environment, communication and • Cloud computing infrastructures, cellular networks and M2M technologies in5 KB (696 words) - 11:36, 8 August 2017
- - Cloud Computing Area 5: Security and Privacy in Sensor Networks5 KB (632 words) - 12:30, 3 September 2017
- Conference on Utility and Cloud Computing (UCC 2017) in Austin, Texas, USA, - Scientific Application Case Studies on Cloud Infrastructure4 KB (583 words) - 10:01, 3 September 2017
- * microservices for cloud-native architectures; * privacy and security for microservices;2 KB (245 words) - 13:34, 28 July 2017
- - Security and Privacy + Software for the Cloud (including topics related to)8 KB (1,150 words) - 10:11, 7 August 2019
- |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)5 KB (640 words) - 13:34, 28 July 2017
- protocols, architectures and modeling of Wireless Networks, Cloud Computing, - Security4 KB (475 words) - 12:34, 8 August 2017
- Cloud Computing CC Computer Security SEC5 KB (660 words) - 13:50, 8 April 2020
- Advanced Machine Learning Technologies for Network Security. Advanced Machine Learning Technologies for Cloud Computing3 KB (355 words) - 12:33, 3 September 2017
- - Cloud-assisted multimedia systems - Multimedia system for traffic and public security5 KB (623 words) - 11:57, 8 August 2017
- vehicles, smart communities, biomedical instruments, security surveillance. * Distributed Multimedia Systems and Cloud Computing5 KB (654 words) - 09:58, 21 August 2017
- as Cloud computing, Internet-of-Things (IoT), Machine-to-Machine (M2M) user-centric, cloud-based service-oriented architecture applications and systems4 KB (494 words) - 13:20, 28 July 2017
- Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile technologies; M2M Communications; Sensing and IoT architectures; Cloud computing4 KB (508 words) - 13:23, 28 July 2017
- Homeland Security Systems Safety and Security3 KB (324 words) - 13:34, 5 December 2017
- - Security - Mobile security / RFID3 KB (346 words) - 19:16, 26 November 2020
- - Databases in the Cloud - Security6 KB (818 words) - 13:40, 3 September 2017
- |Homepage=http://www.cloud-conf.net/smartcom/2017/ Website: http://www.cloud-conf.net/smartcom/2017/index.html3 KB (412 words) - 11:51, 3 September 2017
- |Field=security Communications Systems, Embedded Systems and Information Security , to attract a6 KB (743 words) - 11:45, 8 August 2017
- |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security3 KB (380 words) - 12:30, 3 September 2017
- |Title=IJCCSA 2017 : International Journal on Cloud Computing: Services and Architecture |Field=security6 KB (799 words) - 13:28, 28 July 2017
- |Field=security real-time transmission, and cloud-based service provision. As the key building4 KB (500 words) - 09:56, 21 August 2017
- like Web-based systems, data centers and cloud infrastructures, social scalability, elasticity, availability, reliability, and security.11 KB (1,364 words) - 13:23, 3 September 2017
- ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security8 KB (1,170 words) - 13:40, 3 September 2017
- ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data4 KB (484 words) - 10:00, 21 August 2017
- Information Security & Computer Forensics Cloud Computing and Big Data2 KB (246 words) - 12:11, 3 September 2017
- *security, access control, and licensing issues of Linked Data ...There are a variety of examples in the wild. See the Linked Open Research Cloud for further details on how to make your article discoverable.6 KB (926 words) - 17:55, 9 January 2018
- and intelligent data processing, as well as enhanced data security and privacy Cloud Computing Techniques for Big Data6 KB (876 words) - 09:59, 21 August 2017
- |Title=CCISA 2018 : 6th CLOUD COMPUTING ON INFRASTRUCTURE AS A SERVICE AND ITS APPLICATIONS (CCISA) |Field=cloud computing6 KB (880 words) - 10:00, 21 August 2017
- ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties7 KB (910 words) - 10:36, 26 November 2017
- |Field=, service-orientation,cloud computing,business process management,microservices ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing, RESTful services, and microservices.4 KB (565 words) - 18:34, 4 July 2020
- for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties7 KB (1,046 words) - 10:36, 26 November 2017
- ...of data and services), interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se ...obile computing, search engine, question answering, robotics, web service, security and privacy12 KB (1,578 words) - 14:54, 24 September 2020
- * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service4 KB (548 words) - 08:05, 13 September 2019
- Privacy and Security in Data Management. Distributed Database Systems, Cloud Data Management, NoSQL, Scalable Analytics, Distributed Transactions, Consi6 KB (826 words) - 09:45, 19 February 2021
- ...data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) * Infrastructures (e.g., cloud computing, data intensive computing, database systems, indexing and compres4 KB (546 words) - 14:37, 3 August 2023
- ...mmediate issues that are significantly influencing all aspects of cluster, cloud, grid and edge computing. ...tures; multicores; power and cooling; power-efficient ("green") computing; security and reliability; high availability solutions; high performance GPU applicat1 KB (173 words) - 23:51, 24 February 2020
- * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service4 KB (510 words) - 09:37, 21 April 2020
- * privacy and security issues * media grid computing, cloud and virtualization4 KB (436 words) - 11:49, 21 April 2020
- *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing2 KB (290 words) - 11:16, 6 April 2020
- *Existing and emerging platforms at all scales, from embedded to cloud *Internet services, cloud computing, and datacenters4 KB (547 words) - 12:27, 30 September 2019
- *A Maturity Model for IT-related Security Incident Management *Energy Efficient Cloud Data Center Using Dynamic Virtual Machine Consolidation Algorithm7 KB (917 words) - 18:07, 17 March 2020
- |Title=17th International Symposium on Cluster, Cloud and Grid Computing ...research results and technological developments in the fields of Cluster, Cloud and Grid computing. The CCGrid symposium, which is sponsored by the IEEE Co2 KB (288 words) - 09:18, 6 June 2019
- * cloud computing * security and privacy2 KB (238 words) - 18:42, 7 March 2020
- Big data and cloud computing Security4 KB (401 words) - 07:52, 29 July 2020
- |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:11 KB (1,549 words) - 11:34, 17 April 2020
- |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (152 words) - 10:13, 17 April 2020
- === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.3 KB (314 words) - 11:52, 27 March 2020
- ...tion infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulation. ...on-making, visual analytics, intelligent support in M&S, and simulation in cloud computing environments.3 KB (457 words) - 08:25, 17 April 2020
- * Data Privacy and Security ** Cloud Data Management3 KB (396 words) - 09:53, 19 February 2021
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to busines5 KB (690 words) - 12:02, 26 March 2020
- |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks2 KB (299 words) - 13:10, 30 March 2020
- Track 2: Cloud Services and Networking Track 7: Security, Privacy and Content Protection6 KB (769 words) - 09:37, 4 September 2023
- * Wireless Network Security * Emerging Technologies: Cloud Computing2 KB (192 words) - 14:37, 11 December 2023
- *Big data platforms with applications to network management, security, measurements *Networking aspects of data-centers and cloud computing2 KB (238 words) - 11:18, 6 April 2020
- * cloud, edge and fog computing, * security and practical applications of cryptography,2 KB (210 words) - 12:33, 22 December 2020
- ...ion of functional and non-functional properties, including performance and security aspects; ...tion, reconfiguration, networked computing, parallel, high-performance and cloud computing;2 KB (264 words) - 18:00, 18 February 2021
- ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F5 KB (556 words) - 15:23, 14 January 2021
- |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:2 KB (208 words) - 10:19, 9 April 2020
- |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions2 KB (195 words) - 11:08, 9 April 2020
- * Software & System Security * Software and system security and privacy5 KB (608 words) - 13:03, 15 April 2020
- *cloud, edge and fog computing, *security and practical applications of cryptography,3 KB (303 words) - 08:58, 16 April 2020
- * cloud computing, * security and practical applications of cryptography,2 KB (222 words) - 11:23, 16 April 2020