Search results

Jump to: navigation, search
  • + Security and information assurance + Cloud computing as a service
    7 KB (907 words) - 21:51, 14 October 2008
  • • Content in the Cloud • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • * Privacy and Security in Databases. * Cloud data and services.
    2 KB (308 words) - 23:08, 14 October 2008
  • * Network Security * Cloud and Utility computing
    4 KB (465 words) - 23:11, 14 October 2008
  • * Cloud computing * Security, privacy, and trust
    6 KB (869 words) - 23:14, 14 October 2008
  • * Cloud computing and data center networks * Architectural support for improving security or availability
    4 KB (577 words) - 23:31, 14 October 2008
  • Security in distributed systems Cloud computing
    5 KB (702 words) - 23:31, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.
    4 KB (577 words) - 09:28, 12 May 2020
  • * Cloud, datacenter, cluster/distributed systems * Security
    3 KB (327 words) - 13:11, 11 May 2020
  • *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing
    4 KB (514 words) - 12:03, 6 April 2020
  • ...acebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others will have a * Gateways to cloud computing services;
    3 KB (378 words) - 23:34, 14 October 2008
  • ...nues to move at astonishing speed. In the past few years alone, we've seen cloud computing and software as a service, containerized computing, multicore/man ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions
    6 KB (781 words) - 23:39, 14 October 2008
  • ...ance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran
    7 KB (883 words) - 17:35, 7 January 2021
  • Green Computing, and Cloud Computing. * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • ...e = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next
    5 KB (624 words) - 13:00, 18 January 2009
  • + Scalable System and Cloud Computing + Security
    3 KB (410 words) - 13:01, 18 January 2009
  • * Web service, grid, cloud and transparent computing * Privacy, security, ethics, culture, and anonymity issues
    6 KB (767 words) - 13:01, 18 January 2009
  • * security in distributed computing, cryptographic protocols cloud computing will be held on the days before and after DISC (September 22 and
    7 KB (890 words) - 15:05, 27 December 2015
  • distributed computing and has led to the emergence of the cloud opportunities created by IaaS/cloud computing and virtualization
    5 KB (576 words) - 16:34, 27 February 2009
  • ...topics that link adaptability of Web services to the paradigm of SaaS and cloud computing. In additional to the topics covered in the previous workshops, w * Capacity planning of services running on the cloud
    6 KB (855 words) - 17:06, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • * Network Security * Cloud and Utility computing
    7 KB (1,054 words) - 16:43, 27 December 2015
  • dependability, security, accuracy, customer service, trust, etc.). The * Security and trust aspects in SLAs.
    8 KB (1,033 words) - 11:35, 2 August 2009
  • | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)
    9 KB (1,261 words) - 11:35, 2 August 2009
  • ...benchmarking, review, inspection and walkthrough, reliability, safety and security pervasive computing, service oriented computing, grid software, cloud computing, intelligent systems
    4 KB (583 words) - 12:17, 25 November 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.
    3 KB (338 words) - 16:53, 27 December 2015
  • W2: 1st International Workshop on Cloud Computing Interoperability and Services W5: Workshop on Security and High Performance Computing Systems (SHPCS 2010)
    4 KB (510 words) - 20:56, 7 February 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: International Conference on Cloud Computing and Services Science (CLOSER)
    4 KB (405 words) - 20:45, 3 November 2010
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • ...orkshop we are interested to get papers on Internet, Ubiquitous computing, Cloud computing, and distributed computing/networking so that the researchers cou - Cloud Computing & Communications
    5 KB (667 words) - 12:08, 19 May 2010
  • 5. WEB SECURITY * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • * Cloud storage * Storage security
    5 KB (599 words) - 13:41, 26 February 2020
  • **Cloud storage **Storage security
    5 KB (597 words) - 13:44, 26 February 2020
  • **Cloud storage **Storage security
    4 KB (553 words) - 13:45, 26 February 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • * Cloud- and edge-based IS engineering * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • * Massively-parallel, high-performance, cloud and grid computing * Security in distributed computing, cryptographic protocols
    3 KB (344 words) - 11:30, 21 April 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • * Network Security * Cloud Computing: Optimizing the Cloud (path, communication, application, etc.)
    3 KB (322 words) - 05:59, 8 March 2011
  • ...th International Congress on Computer Science Research (CIICC'11) will be "Cloud Computing and Virtualization". This year CIICC'11 will provide a forum for − Information Security and Applied Cryptography.
    3 KB (367 words) - 16:37, 27 December 2015
  • ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others);
    2 KB (306 words) - 14:54, 12 November 2020
  • * Privacy, Safety and Security * Cloud Computing
    4 KB (439 words) - 17:54, 29 June 2011
  • |Title=2nd International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012)
    5 KB (677 words) - 11:59, 1 July 2011
  • "Cloud Computing" [http://www.iasted.org/conferences/chair2-757.html] *Cloud Computing
    13 KB (1,774 words) - 18:35, 31 August 2011
  • - Security related issues of satellite communications Special Session on Satellite Technologies for Cloud-based Services
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Security-related performance issues in high-performance computing environments such • Peer-to-peer systems for high-performance grid and cloud environments
    4 KB (485 words) - 12:22, 22 November 2011
  • ...concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest i Trust, Security and Privacy in embedded systems
    4 KB (451 words) - 12:27, 30 November 2011
  • Communications modeling; Communications security; Computer (everything, things, people, etc.); Internet, Virtualization and Cloud;
    6 KB (725 words) - 19:58, 22 November 2020
  • ...and practitioners from multiple disciplines to focus on service-oriented, cloud-based innovative for the 21st century enterprises. The conference will feat ...t impact on the field of service-oriented computing and also in particular cloud services.
    6 KB (745 words) - 15:27, 1 November 2016
  • Energy-efficient grid, cloud, and data center technology Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012
  • |Title=European Conference on Service-Oriented and Cloud Computing 2012 The European Conference on Service-Oriented and Cloud Computing (ESOCC)
    4 KB (504 words) - 18:21, 5 March 2012
  • ...tion; Man-in-the-middle attacks; Bundle streaming service; Self-organizing cloud cells; Soft-coded and hard-coded relaying ...hnologies and networking; Mobile network expansion solutions (small cells, Cloud-RAN, etc.); 5G radio-access networks (RAN); D2D communications in cellular
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • *Cloud data management *Security, privacy, and trust
    4 KB (535 words) - 21:32, 11 February 2020
  • *Cloud data management Recommendation systems *Security, privacy, and trust
    4 KB (500 words) - 17:29, 6 January 2021
  • *Cyber Security and Privacy *Semantic Web, Cloud Computing, and Web Information Systems
    5 KB (663 words) - 11:49, 18 February 2020
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cloud computing || Fault localization || Software process || Software product lin
    6 KB (738 words) - 11:21, 6 July 2020
  • ...ecture, distributed search, metasearch, peer-to-peer search, search in the cloud). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).
    8 KB (1,024 words) - 09:57, 13 May 2020
  • • Information and data governance, information assurance, security, compliance • Semantic cloud computing, edge computing, fog computing
    6 KB (872 words) - 23:11, 24 February 2020
  • *Cloud computing and data centers *Security and privacy, cryptographic protocols
    2 KB (299 words) - 11:51, 8 April 2020
  • ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • |Title=3rd International Conference on Cloud Computing and Services Science ...D COMPUTING FUNDAMENTALS, SERVICES SCIENCE FOUNDATION FOR CLOUD COMPUTING, CLOUD COMPUTING PLATFORMS AND APPLICATIONS, LOUD COMPUTING ENABLING TECHNOLOGY
    5 KB (662 words) - 18:50, 20 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • - Cloud Computing<br /> - Security and Access Control<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Cloud-enabled large-scale simulation
    6 KB (728 words) - 01:01, 25 August 2012
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • Information Security Cloud Computing and Green Computing
    2 KB (224 words) - 08:27, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cloud-based IS engineering
    3 KB (375 words) - 15:06, 24 September 2020
  • ...ge of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols. ● Trust, Security and Privacy in embedded systems
    5 KB (677 words) - 15:19, 19 December 2012
  • * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing
    5 KB (584 words) - 14:44, 14 January 2013
  • ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust - Implications for Security, Privacy, International Law and the Cloud
    5 KB (702 words) - 10:02, 5 March 2013
  • ...e emerged; besides, other novel techniques, such as virtualization and the cloud paradigm, have taken roots. All in all, these bring about new requirements - Security solutions for managed and infrastructureless networks
    9 KB (1,145 words) - 16:57, 11 April 2013
  • • Privacy, safety and securityCloud Computing
    4 KB (438 words) - 14:04, 8 May 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cloud Computing *Cyber Security
    3 KB (308 words) - 17:30, 26 May 2016
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • *Cloud Services and Networking *Security, Privacy and Content Protection
    1 KB (129 words) - 09:41, 4 September 2023
  • Information Security Cloud Computing, Computing Models
    3 KB (359 words) - 22:34, 30 September 2016
  • * Cloud Computing * Web Security and Trust Management
    2 KB (230 words) - 00:37, 28 May 2016
  • * Cloud Computing * Information Assurance and Security
    9 KB (1,131 words) - 23:18, 24 February 2020
  • * Information and data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing
    6 KB (877 words) - 23:06, 24 February 2020
  • |Title=MEDES 2016 : Special Track: Secure Cloud Computing |Field=cloud computing, security, watermarking, risk management
    430 bytes (50 words) - 16:17, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • - Cloud Computing and Big Data Analytics - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • ...r Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing) |Field=cloud forensics, cloud security, cybercrime investigation, digital forensics
    454 bytes (52 words) - 17:01, 10 February 2021
  • * Cloud Computing Services * Security and Privacy Issues
    925 bytes (116 words) - 11:05, 24 August 2016
  • |Field=networks, computing, cloud computing, network security
    443 bytes (50 words) - 09:31, 19 July 2019
  • |Field=cloud computing, multimedia, network security, networking
    416 bytes (48 words) - 10:48, 11 September 2016
  • ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    10 KB (1,305 words) - 00:29, 12 December 2020
  • * Cloud Computing Services * Security and Privacy of Information and IS
    3 KB (434 words) - 10:28, 26 July 2016
  • ...uages and integration, interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se * cloud computing
    5 KB (580 words) - 20:22, 28 January 2017
  • ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • * concurrency and recovery, distributed and parallel databases, cloud computing * data privacy and security
    4 KB (557 words) - 10:14, 15 May 2019
  • |Title=IJCCSA 2016 : International Journal on Cloud Computing: Services and Architecture |Field=cloud computing, cloud, networking, security
    379 bytes (45 words) - 13:45, 25 September 2016
  • * Software & System Security ** Software and system security and privacy
    18 KB (2,288 words) - 12:48, 27 October 2016
  • * cloud computing * security and privacy
    9 KB (1,190 words) - 10:12, 5 June 2019
  • Communication Security, Trust, Protocols and Applications Communication Network Security
    5 KB (588 words) - 18:00, 21 January 2017
  • cloud computing, big data, and mobile cloud services, to build innovative smart - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • * Distributed data platforms, including Cloud data systems, key-value stores, and Big Data systems * Data, information, and information systems security
    3 KB (421 words) - 20:37, 11 February 2021
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • Security and Access Control Information Content Security
    4 KB (528 words) - 18:46, 29 August 2017
  • *cloud computing *security and privacy
    10 KB (1,309 words) - 10:29, 5 June 2019
  • the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.
    7 KB (887 words) - 15:22, 15 July 2017
  • * Information/data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing
    6 KB (798 words) - 23:16, 24 February 2020
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • ...CC II 2017 : 3rd International Symposium on Real-time Data Processing for Cloud Computing of the important applications in Cloud Computing. The academia, the industry and
    4 KB (532 words) - 13:28, 28 July 2017
  • |Title=CLOSER 2018 : 8th International Conference on Cloud Computing and Services Science 8th International Conference on Cloud Computing and Services Science CLOSER
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Cloud Computing Techniques for Big Data Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • |Title=SmartCloud 2017 : The 2nd IEEE International Conference on Smart Cloud 2017 |Homepage=http://www.cloud-conf.net/smartcloud/2017/
    3 KB (464 words) - 09:30, 3 September 2017
  • Big data and Cloud Computing Network and Data Security
    5 KB (673 words) - 09:53, 3 September 2017
  • - High-performance, cluster, cloud and grid computing - Security and privacy, cryptographic protocols
    7 KB (1,009 words) - 15:54, 3 September 2019
  • Security, Computer Vision. Following the past successful symposium SoICT 2016, 2. Network Communication and Security: Future Internet, Optical Networks, Mobile
    4 KB (559 words) - 11:58, 8 August 2017
  • * Cloud and grid computing for big data * Security and privacy for big data
    3 KB (436 words) - 10:46, 27 May 2020
  • Big Data: models for data in the Cloud, programming languages for big data, Security in Information and Knowledge Systems: identity theft, privacy,
    9 KB (1,118 words) - 13:41, 3 September 2017
  • ...The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • - Networking for Cloud Computing - Mobile Cloud Computing and Mobile Edge Computing
    6 KB (873 words) - 13:30, 28 July 2017
  • Cloud computing Cryptography and network security
    4 KB (524 words) - 13:30, 28 July 2017
  • aspects, gamification, cloud services and resources, universal design, - Security and accreditation models.
    3 KB (407 words) - 11:52, 8 August 2017
  • * Computer Security * Internet & Cloud Computing
    4 KB (523 words) - 13:30, 28 July 2017
  • - Cloud Computing - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • Cloud computing Network management & security
    4 KB (497 words) - 11:58, 8 August 2017
  • Integration of IoT with cloud computing (cloud of things) Security and privacy in heterogeneous IoT
    4 KB (483 words) - 10:00, 21 August 2017
  • |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV
    4 KB (515 words) - 11:28, 6 November 2020
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • Watching streaming videos, uploading pictures and using cloud-based services and network security.
    4 KB (442 words) - 10:00, 21 August 2017
  • performance, energy, virtualization, portability, security, or reliability throughput or latency, security, reliability, or functional debugging
    3 KB (391 words) - 12:32, 11 April 2020
  • Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;
    4 KB (495 words) - 13:34, 28 July 2017
  • - Security - Mobile security / RFID
    4 KB (580 words) - 20:58, 12 November 2020
  • wellness, safety and security, energy and environment, communication and • Cloud computing infrastructures, cellular networks and M2M technologies in
    5 KB (696 words) - 11:36, 8 August 2017
  • - Cloud Computing Area 5: Security and Privacy in Sensor Networks
    5 KB (632 words) - 12:30, 3 September 2017
  • Conference on Utility and Cloud Computing (UCC 2017) in Austin, Texas, USA, - Scientific Application Case Studies on Cloud Infrastructure
    4 KB (583 words) - 10:01, 3 September 2017
  • * microservices for cloud-native architectures; * privacy and security for microservices;
    2 KB (245 words) - 13:34, 28 July 2017
  • - Security and Privacy + Software for the Cloud (including topics related to)
    8 KB (1,150 words) - 10:11, 7 August 2019
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • protocols, architectures and modeling of Wireless Networks, Cloud Computing, - Security
    4 KB (475 words) - 12:34, 8 August 2017
  • Cloud Computing CC Computer Security SEC
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security. Advanced Machine Learning Technologies for Cloud Computing
    3 KB (355 words) - 12:33, 3 September 2017
  • - Cloud-assisted multimedia systems - Multimedia system for traffic and public security
    5 KB (623 words) - 11:57, 8 August 2017
  • vehicles, smart communities, biomedical instruments, security surveillance. * Distributed Multimedia Systems and Cloud Computing
    5 KB (654 words) - 09:58, 21 August 2017
  • as Cloud computing, Internet-of-Things (IoT), Machine-to-Machine (M2M) user-centric, cloud-based service-oriented architecture applications and systems
    4 KB (494 words) - 13:20, 28 July 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile technologies; M2M Communications; Sensing and IoT architectures; Cloud computing
    4 KB (508 words) - 13:23, 28 July 2017
  • Homeland Security Systems Safety and Security
    3 KB (324 words) - 13:34, 5 December 2017
  • - Security - Mobile security / RFID
    3 KB (346 words) - 19:16, 26 November 2020
  • - Databases in the Cloud - Security
    6 KB (818 words) - 13:40, 3 September 2017
  • |Homepage=http://www.cloud-conf.net/smartcom/2017/ Website: http://www.cloud-conf.net/smartcom/2017/index.html
    3 KB (412 words) - 11:51, 3 September 2017
  • |Field=security Communications Systems, Embedded Systems and Information Security , to attract a
    6 KB (743 words) - 11:45, 8 August 2017
  • |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security
    3 KB (380 words) - 12:30, 3 September 2017
  • |Title=IJCCSA 2017 : International Journal on Cloud Computing: Services and Architecture |Field=security
    6 KB (799 words) - 13:28, 28 July 2017
  • |Field=security real-time transmission, and cloud-based service provision. As the key building
    4 KB (500 words) - 09:56, 21 August 2017
  • like Web-based systems, data centers and cloud infrastructures, social scalability, elasticity, availability, reliability, and security.
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • Information Security & Computer Forensics Cloud Computing and Big Data
    2 KB (246 words) - 12:11, 3 September 2017
  • *security, access control, and licensing issues of Linked Data ...There are a variety of examples in the wild. See the Linked Open Research Cloud for further details on how to make your article discoverable.
    6 KB (926 words) - 17:55, 9 January 2018
  • and intelligent data processing, as well as enhanced data security and privacy Cloud Computing Techniques for Big Data
    6 KB (876 words) - 09:59, 21 August 2017
  • |Title=CCISA 2018 : 6th CLOUD COMPUTING ON INFRASTRUCTURE AS A SERVICE AND ITS APPLICATIONS (CCISA) |Field=cloud computing
    6 KB (880 words) - 10:00, 21 August 2017
  • ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties
    7 KB (910 words) - 10:36, 26 November 2017
  • |Field=, service-orientation,cloud computing,business process management,microservices ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing, RESTful services, and microservices.
    4 KB (565 words) - 18:34, 4 July 2020
  • for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties
    7 KB (1,046 words) - 10:36, 26 November 2017
  • ...of data and services), interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se ...obile computing, search engine, question answering, robotics, web service, security and privacy
    12 KB (1,578 words) - 14:54, 24 September 2020
  • * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service
    4 KB (548 words) - 08:05, 13 September 2019
  • Privacy and Security in Data Management. Distributed Database Systems, Cloud Data Management, NoSQL, Scalable Analytics, Distributed Transactions, Consi
    6 KB (826 words) - 09:45, 19 February 2021
  • ...data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) * Infrastructures (e.g., cloud computing, data intensive computing, database systems, indexing and compres
    4 KB (546 words) - 14:37, 3 August 2023
  • ...mmediate issues that are significantly influencing all aspects of cluster, cloud, grid and edge computing. ...tures; multicores; power and cooling; power-efficient ("green") computing; security and reliability; high availability solutions; high performance GPU applicat
    1 KB (173 words) - 23:51, 24 February 2020
  • * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service
    4 KB (510 words) - 09:37, 21 April 2020
  • * privacy and security issues * media grid computing, cloud and virtualization
    4 KB (436 words) - 11:49, 21 April 2020
  • *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing
    2 KB (290 words) - 11:16, 6 April 2020
  • *Existing and emerging platforms at all scales, from embedded to cloud *Internet services, cloud computing, and datacenters
    4 KB (547 words) - 12:27, 30 September 2019
  • *A Maturity Model for IT-related Security Incident Management *Energy Efficient Cloud Data Center Using Dynamic Virtual Machine Consolidation Algorithm
    7 KB (917 words) - 18:07, 17 March 2020
  • |Title=17th International Symposium on Cluster, Cloud and Grid Computing ...research results and technological developments in the fields of Cluster, Cloud and Grid computing. The CCGrid symposium, which is sponsored by the IEEE Co
    2 KB (288 words) - 09:18, 6 June 2019
  • * cloud computing * security and privacy
    2 KB (238 words) - 18:42, 7 March 2020
  • Big data and cloud computing Security
    4 KB (401 words) - 07:52, 29 July 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.
    3 KB (314 words) - 11:52, 27 March 2020
  • ...tion infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulation. ...on-making, visual analytics, intelligent support in M&S, and simulation in cloud computing environments.
    3 KB (457 words) - 08:25, 17 April 2020
  • * Data Privacy and Security ** Cloud Data Management
    3 KB (396 words) - 09:53, 19 February 2021
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to busines
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • Track 2: Cloud Services and Networking Track 7: Security, Privacy and Content Protection
    6 KB (769 words) - 09:37, 4 September 2023
  • * Wireless Network Security * Emerging Technologies: Cloud Computing
    2 KB (192 words) - 14:37, 11 December 2023
  • *Big data platforms with applications to network management, security, measurements *Networking aspects of data-centers and cloud computing
    2 KB (238 words) - 11:18, 6 April 2020
  • * cloud, edge and fog computing, * security and practical applications of cryptography,
    2 KB (210 words) - 12:33, 22 December 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; ...tion, reconfiguration, networked computing, parallel, high-performance and cloud computing;
    2 KB (264 words) - 18:00, 18 February 2021
  • ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F
    5 KB (556 words) - 15:23, 14 January 2021
  • |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
    2 KB (208 words) - 10:19, 9 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • * Software & System Security * Software and system security and privacy
    5 KB (608 words) - 13:03, 15 April 2020
  • *cloud, edge and fog computing, *security and practical applications of cryptography,
    3 KB (303 words) - 08:58, 16 April 2020
  • * cloud computing, * security and practical applications of cryptography,
    2 KB (222 words) - 11:23, 16 April 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; ...tion, reconfiguration, networked computing, parallel, high-performance and cloud computing;
    3 KB (355 words) - 08:53, 17 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • ...isioning; Energy-efficient networking; Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization); Energy-efficient methodologies for infrastr ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids;
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...s; QoS-aware body area networks; Robust sensing services; Cloud of things; Cloud and smart grid vulnerabilities; Polarization-agile antennas; Service percep ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...ous systems; Monitoring and control in autonomous systems; Performance and security in autonomous systems; Management of autonomous systems; Testing autonomous
    16 KB (1,897 words) - 12:31, 18 May 2020
  • ...owsers; Tabular Data on the Web; Web linguistic changes; Web-based systems security; Web preferences; Web pattern semantics; Modeling web user activities; Twit ...lications; Web Infrastructure: Datacenters, Content Delivery Networks, and Cloud Computing; Internet Economics and Monetization
    11 KB (1,390 words) - 12:35, 18 May 2020
  • * Edge and fog computing: distributed computing models from sensor to cloud * Security and privacy issues
    2 KB (185 words) - 17:41, 22 January 2021
  • safety and security for mobile MAS deployment security and trust in multi-agent systems
    8 KB (1,092 words) - 12:49, 22 April 2020
  • * Software & System Security * Software and system security and privacy
    4 KB (490 words) - 09:38, 23 April 2020
  • * - Cloud-based and High-Performance Simulation Environments Simulation in Advanced M * - Security in Computer and Telecommunication Systems
    5 KB (640 words) - 13:03, 5 May 2020
  • ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of serv
    4 KB (457 words) - 10:25, 6 May 2020
  • ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc. ...for emerging embedded platforms, including smartphones, automotive, server/cloud, etc.
    4 KB (431 words) - 10:40, 6 May 2020
  • * Cloud Communications and Computing * Information Infrastructure and Security
    2 KB (175 words) - 10:44, 7 May 2020
  • * Cloud Communications and Computing * Information Infrastructure and Security
    2 KB (174 words) - 10:43, 7 May 2020
  • * Cloud Infrastructure for Big Data * Privacy and Security in Analytics
    2 KB (217 words) - 12:15, 7 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...s; runtime systems; parallel and distributed systems; storage; networking; security and privacy; virtualization; software-hardware interactions; performance ev
    8 KB (1,078 words) - 09:27, 12 May 2020
  • * HotCloud '18: 10th USENIX Workshop on Hot Topics in Cloud Computing (July 9, 2018) * Cloud and edge computing
    6 KB (729 words) - 09:28, 12 May 2020
  • * Cloud/Grid/Stream Computing for Big Data * Programming Models and Environments for Cluster, Cloud, and Grid Computing to Support Big Data
    4 KB (563 words) - 15:55, 23 June 2020
  • * Cloud/Grid/Stream Computing for Big Data * Programming Models and Environments for Cluster, Cloud, and Grid Computing to Support Big Data
    5 KB (543 words) - 21:14, 18 May 2020
  • * Parallel, distributed, and cloud-based high-performance data mining * Security and intrusion detection
    2 KB (261 words) - 20:06, 20 May 2020
  • Security and intrusion detection ● Parallel, distributed, and cloud-based high-performance data mining
    2 KB (268 words) - 20:28, 20 May 2020
  • * Security and intrusion detection * Parallel, distributed, and cloud-based high-performance data mining
    2 KB (272 words) - 21:17, 20 May 2020
  • * Distributed and parallel computing (cloud, map-reduce, etc.) * Privacy and security
    4 KB (515 words) - 16:39, 25 May 2020
  • * Cloud computing and service data analysis. * Cloud architectures and cloud computing.
    3 KB (308 words) - 16:50, 16 December 2020
  • |Field=big data, cloud computing, artificial intelligence, database * Cloud/Grid/Stream Computing for Big Data
    9 KB (1,187 words) - 14:18, 27 May 2020
  • |Field=big data, cloud computing, artificial intelligence, database * Cloud and grid computing for big data
    3 KB (389 words) - 06:51, 9 June 2020
  • * Fuzzy systems with big data and cloud computing, fuzzy analytics, and visualization * Computational intelligence in security
    2 KB (238 words) - 17:30, 6 May 2021
  • ...rned-based vehicular networks; Geo-replicated data stores; Personal Cloud; Cloud interactive services; Energy harvesting and energy efficiency; Opportunisti ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...ing; Mobile software systems; Context- and Location-aware services; Mobile Cloud services; Mobile social media; Mobile services and energy-aware application Security and privacy environments; Protection and safety of distributed mobile data;
    7 KB (918 words) - 13:51, 5 June 2020
  • * Social and cloud-based multimedia * Multimedia security, privacy and forensics
    1 KB (140 words) - 17:50, 9 June 2020
  • * Social and cloud-based multimedia * Multimedia security, privacy and forensics
    1 KB (140 words) - 18:05, 9 June 2020
  • ...lthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyber ...ters; Risk control for shared-servers in data centers; Fraud prevention in Cloud networking; Discovering and monitoring Botnets in SDNs; 5G traffic measurem
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    11 KB (1,356 words) - 12:56, 14 June 2020
  • * cloud computing * security and privacy
    4 KB (529 words) - 11:04, 17 June 2020
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security
    3 KB (353 words) - 12:35, 23 June 2020
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security
    3 KB (423 words) - 11:27, 23 June 2020
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security
    3 KB (407 words) - 11:20, 23 June 2020
  • ...iented networking; Cellular cognitive networks; Future routing mechanisms; Cloud-based services; Online interactive services; Mobile services ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Cloud Computing and Big Data * Communications and Information Security
    3 KB (483 words) - 08:08, 21 August 2020
  • * Cloud computing * Software security and trust; data privacy
    5 KB (557 words) - 07:07, 13 July 2020
  • ...Adaptive video-streaming dissemination; Streaming content from a vehicular cloud; Wireless degrading communication sensing; Secure information transfer in V Security
    8 KB (915 words) - 19:45, 9 July 2020
  • ...environments; Collaboration techniques in resource intensive environments; Security, privacy and trust in collaborative networks, systems, and applications
    8 KB (897 words) - 17:15, 22 March 2021
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...rnet of X (everything, things, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks;
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" ...management; Machine-to-machine (M2M) and Internet of Things (IoT); Mobile Cloud: WiFi signal-based human activity recognition; Dynamic spectrum access; Cog
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development Software engineering for service computing (SOA and Cloud)
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i Simulation in Virtualized systems; Simulation in Cloud environments; Simulations in GRID environments; Simulation in Cognitive sys
    12 KB (1,421 words) - 12:02, 10 July 2020
  • ...resentation of human body data; Trusted information for personal wellness; Cloud outsourcing of medical image repositories; Web-base decision support system ...ical systems; Scalability evaluation; Mobile clouds in medical scenarios ; Security of medical systems; Privacy for wired and wireless medical devices
    8 KB (970 words) - 16:50, 14 July 2020
  • * IoT, intelligent cloud and fog computing HAIS applications are welcome as well, such as in security, prediction, control, robotics, image and speech signal processing, food in
    2 KB (200 words) - 09:20, 24 July 2020

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)