Search results
Create the page "Cloud security" on this wiki! See also the search results found.
- + Security and information assurance + Cloud computing as a service7 KB (907 words) - 21:51, 14 October 2008
- • Content in the Cloud • Ethical, Social, Privacy, Security and moral Issues in an e-societ5 KB (530 words) - 10:27, 24 June 2011
- * Privacy and Security in Databases. * Cloud data and services.2 KB (308 words) - 23:08, 14 October 2008
- * Network Security * Cloud and Utility computing4 KB (465 words) - 23:11, 14 October 2008
- * Cloud computing * Security, privacy, and trust6 KB (869 words) - 23:14, 14 October 2008
- * Cloud computing and data center networks * Architectural support for improving security or availability4 KB (577 words) - 23:31, 14 October 2008
- Security in distributed systems Cloud computing5 KB (702 words) - 23:31, 14 October 2008
- ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.5 KB (580 words) - 10:32, 12 May 2020
- ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.4 KB (577 words) - 09:28, 12 May 2020
- * Cloud, datacenter, cluster/distributed systems * Security3 KB (327 words) - 13:11, 11 May 2020
- *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing4 KB (514 words) - 12:03, 6 April 2020
- ...acebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others will have a * Gateways to cloud computing services;3 KB (378 words) - 23:34, 14 October 2008
- ...nues to move at astonishing speed. In the past few years alone, we've seen cloud computing and software as a service, containerized computing, multicore/man ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions6 KB (781 words) - 23:39, 14 October 2008
- ...ance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran7 KB (883 words) - 17:35, 7 January 2021
- Green Computing, and Cloud Computing. * Security and privacy for RTSOAA based CPS7 KB (922 words) - 00:58, 9 January 2009
- ...e = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next5 KB (624 words) - 13:00, 18 January 2009
- + Scalable System and Cloud Computing + Security3 KB (410 words) - 13:01, 18 January 2009
- * Web service, grid, cloud and transparent computing * Privacy, security, ethics, culture, and anonymity issues6 KB (767 words) - 13:01, 18 January 2009
- * security in distributed computing, cryptographic protocols cloud computing will be held on the days before and after DISC (September 22 and7 KB (890 words) - 15:05, 27 December 2015
- distributed computing and has led to the emergence of the cloud opportunities created by IaaS/cloud computing and virtualization5 KB (576 words) - 16:34, 27 February 2009
- ...topics that link adaptability of Web services to the paradigm of SaaS and cloud computing. In additional to the topics covered in the previous workshops, w * Capacity planning of services running on the cloud6 KB (855 words) - 17:06, 27 February 2009
- ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy7 KB (941 words) - 17:07, 27 February 2009
- * Network Security * Cloud and Utility computing7 KB (1,054 words) - 16:43, 27 December 2015
- dependability, security, accuracy, customer service, trust, etc.). The * Security and trust aspects in SLAs.8 KB (1,033 words) - 11:35, 2 August 2009
- | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)9 KB (1,261 words) - 11:35, 2 August 2009
- ...benchmarking, review, inspection and walkthrough, reliability, safety and security pervasive computing, service oriented computing, grid software, cloud computing, intelligent systems4 KB (583 words) - 12:17, 25 November 2009
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.3 KB (338 words) - 16:53, 27 December 2015
- W2: 1st International Workshop on Cloud Computing Interoperability and Services W5: Workshop on Security and High Performance Computing Systems (SHPCS 2010)4 KB (510 words) - 20:56, 7 February 2010
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- |Title=International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: International Conference on Cloud Computing and Services Science (CLOSER)4 KB (405 words) - 20:45, 3 November 2010
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- ...orkshop we are interested to get papers on Internet, Ubiquitous computing, Cloud computing, and distributed computing/networking so that the researchers cou - Cloud Computing & Communications5 KB (667 words) - 12:08, 19 May 2010
- 5. WEB SECURITY * › Web Security and Privacy5 KB (627 words) - 12:33, 16 June 2010
- * Cloud storage * Storage security5 KB (599 words) - 13:41, 26 February 2020
- **Cloud storage **Storage security5 KB (597 words) - 13:44, 26 February 2020
- **Cloud storage **Storage security4 KB (553 words) - 13:45, 26 February 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- * Cloud- and edge-based IS engineering * Privacy, security, trust, and safety management3 KB (395 words) - 15:14, 24 September 2020
- * Massively-parallel, high-performance, cloud and grid computing * Security in distributed computing, cryptographic protocols3 KB (344 words) - 11:30, 21 April 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev3 KB (462 words) - 11:51, 22 March 2020
- * Network Security * Cloud Computing: Optimizing the Cloud (path, communication, application, etc.)3 KB (322 words) - 05:59, 8 March 2011
- ...th International Congress on Computer Science Research (CIICC'11) will be "Cloud Computing and Virtualization". This year CIICC'11 will provide a forum for − Information Security and Applied Cryptography.3 KB (367 words) - 16:37, 27 December 2015
- ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others);2 KB (306 words) - 14:54, 12 November 2020
- * Privacy, Safety and Security * Cloud Computing4 KB (439 words) - 17:54, 29 June 2011
- |Title=2nd International Conference on Cloud Computing and Services Science (CLOSER) Conference Name: 2nd International Conference on Cloud Computing and Services Science (CLOSER 2012)5 KB (677 words) - 11:59, 1 July 2011
- "Cloud Computing" [http://www.iasted.org/conferences/chair2-757.html] *Cloud Computing13 KB (1,774 words) - 18:35, 31 August 2011
- - Security related issues of satellite communications Special Session on Satellite Technologies for Cloud-based Services9 KB (1,218 words) - 16:06, 1 October 2020
- • Security-related performance issues in high-performance computing environments such • Peer-to-peer systems for high-performance grid and cloud environments4 KB (485 words) - 12:22, 22 November 2011
- ...concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest i Trust, Security and Privacy in embedded systems4 KB (451 words) - 12:27, 30 November 2011
- Communications modeling; Communications security; Computer (everything, things, people, etc.); Internet, Virtualization and Cloud;6 KB (725 words) - 19:58, 22 November 2020
- ...and practitioners from multiple disciplines to focus on service-oriented, cloud-based innovative for the 21st century enterprises. The conference will feat ...t impact on the field of service-oriented computing and also in particular cloud services.6 KB (745 words) - 15:27, 1 November 2016
- Energy-efficient grid, cloud, and data center technology Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability10 KB (1,297 words) - 17:49, 24 February 2012
- |Title=European Conference on Service-Oriented and Cloud Computing 2012 The European Conference on Service-Oriented and Cloud Computing (ESOCC)4 KB (504 words) - 18:21, 5 March 2012
- ...tion; Man-in-the-middle attacks; Bundle streaming service; Self-organizing cloud cells; Soft-coded and hard-coded relaying ...hnologies and networking; Mobile network expansion solutions (small cells, Cloud-RAN, etc.); 5G radio-access networks (RAN); D2D communications in cellular13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- *Cloud data management *Security, privacy, and trust4 KB (535 words) - 21:32, 11 February 2020
- *Cloud data management Recommendation systems *Security, privacy, and trust4 KB (500 words) - 17:29, 6 January 2021
- *Cyber Security and Privacy *Semantic Web, Cloud Computing, and Web Information Systems5 KB (663 words) - 11:49, 18 February 2020
- ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cloud computing || Fault localization || Software process || Software product lin6 KB (738 words) - 11:21, 6 July 2020
- ...ecture, distributed search, metasearch, peer-to-peer search, search in the cloud). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).8 KB (1,024 words) - 09:57, 13 May 2020
- • Information and data governance, information assurance, security, compliance • Semantic cloud computing, edge computing, fog computing6 KB (872 words) - 23:11, 24 February 2020
- *Cloud computing and data centers *Security and privacy, cryptographic protocols2 KB (299 words) - 11:51, 8 April 2020
- ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and3 KB (434 words) - 22:46, 30 May 2012
- |Title=3rd International Conference on Cloud Computing and Services Science ...D COMPUTING FUNDAMENTALS, SERVICES SCIENCE FOUNDATION FOR CLOUD COMPUTING, CLOUD COMPUTING PLATFORMS AND APPLICATIONS, LOUD COMPUTING ENABLING TECHNOLOGY5 KB (662 words) - 18:50, 20 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- - Cloud Computing<br /> - Security and Access Control<br />3 KB (466 words) - 13:00, 16 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Cloud-enabled large-scale simulation6 KB (728 words) - 01:01, 25 August 2012
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- Information Security Cloud Computing and Green Computing2 KB (224 words) - 08:27, 26 October 2012
- |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology3 KB (351 words) - 09:52, 28 October 2012
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cloud-based IS engineering3 KB (375 words) - 15:06, 24 September 2020
- ...ge of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols. ● Trust, Security and Privacy in embedded systems5 KB (677 words) - 15:19, 19 December 2012
- * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing5 KB (584 words) - 14:44, 14 January 2013
- ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust - Implications for Security, Privacy, International Law and the Cloud5 KB (702 words) - 10:02, 5 March 2013
- ...e emerged; besides, other novel techniques, such as virtualization and the cloud paradigm, have taken roots. All in all, these bring about new requirements - Security solutions for managed and infrastructureless networks9 KB (1,145 words) - 16:57, 11 April 2013
- • Privacy, safety and security • Cloud Computing4 KB (438 words) - 14:04, 8 May 2013
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- *Cloud Computing *Cyber Security3 KB (308 words) - 17:30, 26 May 2016
- *Information Security and Cryptography *Network and Cyber Security2 KB (227 words) - 11:30, 21 June 2016
- ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- *Cloud Services and Networking *Security, Privacy and Content Protection1 KB (129 words) - 09:41, 4 September 2023
- Information Security Cloud Computing, Computing Models3 KB (359 words) - 22:34, 30 September 2016
- * Cloud Computing * Web Security and Trust Management2 KB (230 words) - 00:37, 28 May 2016
- * Cloud Computing * Information Assurance and Security9 KB (1,131 words) - 23:18, 24 February 2020
- * Information and data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing6 KB (877 words) - 23:06, 24 February 2020
- |Title=MEDES 2016 : Special Track: Secure Cloud Computing |Field=cloud computing, security, watermarking, risk management430 bytes (50 words) - 16:17, 8 July 2016
- |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing329 bytes (35 words) - 17:36, 8 July 2016
- - Cloud Computing and Big Data Analytics - Security and Privacy12 KB (1,565 words) - 04:15, 5 August 2023
- |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- ...r Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing) |Field=cloud forensics, cloud security, cybercrime investigation, digital forensics454 bytes (52 words) - 17:01, 10 February 2021
- * Cloud Computing Services * Security and Privacy Issues925 bytes (116 words) - 11:05, 24 August 2016
- |Field=networks, computing, cloud computing, network security443 bytes (50 words) - 09:31, 19 July 2019
- |Field=cloud computing, multimedia, network security, networking416 bytes (48 words) - 10:48, 11 September 2016
- ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques10 KB (1,305 words) - 00:29, 12 December 2020
- * Cloud Computing Services * Security and Privacy of Information and IS3 KB (434 words) - 10:28, 26 July 2016
- ...uages and integration, interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se * cloud computing5 KB (580 words) - 20:22, 28 January 2017
- ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (282 words) - 10:48, 8 February 2020
- ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (270 words) - 10:49, 8 February 2020
- * concurrency and recovery, distributed and parallel databases, cloud computing * data privacy and security4 KB (557 words) - 10:14, 15 May 2019
- |Title=IJCCSA 2016 : International Journal on Cloud Computing: Services and Architecture |Field=cloud computing, cloud, networking, security379 bytes (45 words) - 13:45, 25 September 2016
- * Software & System Security ** Software and system security and privacy18 KB (2,288 words) - 12:48, 27 October 2016
- * cloud computing * security and privacy9 KB (1,190 words) - 10:12, 5 June 2019
- Communication Security, Trust, Protocols and Applications Communication Network Security5 KB (588 words) - 18:00, 21 January 2017
- cloud computing, big data, and mobile cloud services, to build innovative smart - Smart city system security and privacy4 KB (565 words) - 09:46, 7 February 2017
- * Distributed data platforms, including Cloud data systems, key-value stores, and Big Data systems * Data, information, and information systems security3 KB (421 words) - 20:37, 11 February 2021
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –5 KB (631 words) - 15:09, 10 April 2017
- Security and Access Control Information Content Security4 KB (528 words) - 18:46, 29 August 2017
- *cloud computing *security and privacy10 KB (1,309 words) - 10:29, 5 June 2019
- the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.7 KB (887 words) - 15:22, 15 July 2017
- * Information/data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing6 KB (798 words) - 23:16, 24 February 2020
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- ...CC II 2017 : 3rd International Symposium on Real-time Data Processing for Cloud Computing of the important applications in Cloud Computing. The academia, the industry and4 KB (532 words) - 13:28, 28 July 2017
- |Title=CLOSER 2018 : 8th International Conference on Cloud Computing and Services Science 8th International Conference on Cloud Computing and Services Science CLOSER7 KB (1,009 words) - 13:39, 3 September 2017
- Cloud Computing Techniques for Big Data Security Applications of Big Data3 KB (461 words) - 13:22, 3 September 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- |Title=SmartCloud 2017 : The 2nd IEEE International Conference on Smart Cloud 2017 |Homepage=http://www.cloud-conf.net/smartcloud/2017/3 KB (464 words) - 09:30, 3 September 2017
- Big data and Cloud Computing Network and Data Security5 KB (673 words) - 09:53, 3 September 2017
- - High-performance, cluster, cloud and grid computing - Security and privacy, cryptographic protocols7 KB (1,009 words) - 15:54, 3 September 2019
- Security, Computer Vision. Following the past successful symposium SoICT 2016, 2. Network Communication and Security: Future Internet, Optical Networks, Mobile4 KB (559 words) - 11:58, 8 August 2017
- * Cloud and grid computing for big data * Security and privacy for big data3 KB (436 words) - 10:46, 27 May 2020
- Big Data: models for data in the Cloud, programming languages for big data, Security in Information and Knowledge Systems: identity theft, privacy,9 KB (1,118 words) - 13:41, 3 September 2017
- ...The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security4 KB (536 words) - 09:59, 21 August 2017
- - Networking for Cloud Computing - Mobile Cloud Computing and Mobile Edge Computing6 KB (873 words) - 13:30, 28 July 2017
- Cloud computing Cryptography and network security4 KB (524 words) - 13:30, 28 July 2017
- aspects, gamification, cloud services and resources, universal design, - Security and accreditation models.3 KB (407 words) - 11:52, 8 August 2017
- * Computer Security * Internet & Cloud Computing4 KB (523 words) - 13:30, 28 July 2017
- - Cloud Computing - IT Architecture and Security1 KB (136 words) - 11:52, 8 August 2017
- Cloud computing Network management & security4 KB (497 words) - 11:58, 8 August 2017
- Integration of IoT with cloud computing (cloud of things) Security and privacy in heterogeneous IoT4 KB (483 words) - 10:00, 21 August 2017
- |Acronym=COMNET SI SDN/NFV Security/Performance 2017 ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV4 KB (515 words) - 11:28, 6 November 2020
- |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security5 KB (626 words) - 12:02, 3 September 2017
- |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities5 KB (722 words) - 10:00, 21 August 2017
- Watching streaming videos, uploading pictures and using cloud-based services and network security.4 KB (442 words) - 10:00, 21 August 2017
- performance, energy, virtualization, portability, security, or reliability throughput or latency, security, reliability, or functional debugging3 KB (391 words) - 12:32, 11 April 2020
- Strategic Information System: Cloud Computing; Knowledge Management; System Embedded Systems and Communication: Computer Networks; Network and Security;4 KB (495 words) - 13:34, 28 July 2017
- - Security - Mobile security / RFID4 KB (580 words) - 20:58, 12 November 2020
- wellness, safety and security, energy and environment, communication and • Cloud computing infrastructures, cellular networks and M2M technologies in5 KB (696 words) - 11:36, 8 August 2017
- - Cloud Computing Area 5: Security and Privacy in Sensor Networks5 KB (632 words) - 12:30, 3 September 2017
- Conference on Utility and Cloud Computing (UCC 2017) in Austin, Texas, USA, - Scientific Application Case Studies on Cloud Infrastructure4 KB (583 words) - 10:01, 3 September 2017
- * microservices for cloud-native architectures; * privacy and security for microservices;2 KB (245 words) - 13:34, 28 July 2017
- - Security and Privacy + Software for the Cloud (including topics related to)8 KB (1,150 words) - 10:11, 7 August 2019
- |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)5 KB (640 words) - 13:34, 28 July 2017
- protocols, architectures and modeling of Wireless Networks, Cloud Computing, - Security4 KB (475 words) - 12:34, 8 August 2017
- Cloud Computing CC Computer Security SEC5 KB (660 words) - 13:50, 8 April 2020
- Advanced Machine Learning Technologies for Network Security. Advanced Machine Learning Technologies for Cloud Computing3 KB (355 words) - 12:33, 3 September 2017
- - Cloud-assisted multimedia systems - Multimedia system for traffic and public security5 KB (623 words) - 11:57, 8 August 2017
- vehicles, smart communities, biomedical instruments, security surveillance. * Distributed Multimedia Systems and Cloud Computing5 KB (654 words) - 09:58, 21 August 2017
- as Cloud computing, Internet-of-Things (IoT), Machine-to-Machine (M2M) user-centric, cloud-based service-oriented architecture applications and systems4 KB (494 words) - 13:20, 28 July 2017
- Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile technologies; M2M Communications; Sensing and IoT architectures; Cloud computing4 KB (508 words) - 13:23, 28 July 2017
- Homeland Security Systems Safety and Security3 KB (324 words) - 13:34, 5 December 2017
- - Security - Mobile security / RFID3 KB (346 words) - 19:16, 26 November 2020
- - Databases in the Cloud - Security6 KB (818 words) - 13:40, 3 September 2017
- |Homepage=http://www.cloud-conf.net/smartcom/2017/ Website: http://www.cloud-conf.net/smartcom/2017/index.html3 KB (412 words) - 11:51, 3 September 2017
- |Field=security Communications Systems, Embedded Systems and Information Security , to attract a6 KB (743 words) - 11:45, 8 August 2017
- |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security3 KB (380 words) - 12:30, 3 September 2017
- |Title=IJCCSA 2017 : International Journal on Cloud Computing: Services and Architecture |Field=security6 KB (799 words) - 13:28, 28 July 2017
- |Field=security real-time transmission, and cloud-based service provision. As the key building4 KB (500 words) - 09:56, 21 August 2017
- like Web-based systems, data centers and cloud infrastructures, social scalability, elasticity, availability, reliability, and security.11 KB (1,364 words) - 13:23, 3 September 2017
- ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security8 KB (1,170 words) - 13:40, 3 September 2017
- ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data4 KB (484 words) - 10:00, 21 August 2017
- Information Security & Computer Forensics Cloud Computing and Big Data2 KB (246 words) - 12:11, 3 September 2017
- *security, access control, and licensing issues of Linked Data ...There are a variety of examples in the wild. See the Linked Open Research Cloud for further details on how to make your article discoverable.6 KB (926 words) - 17:55, 9 January 2018
- and intelligent data processing, as well as enhanced data security and privacy Cloud Computing Techniques for Big Data6 KB (876 words) - 09:59, 21 August 2017
- |Title=CCISA 2018 : 6th CLOUD COMPUTING ON INFRASTRUCTURE AS A SERVICE AND ITS APPLICATIONS (CCISA) |Field=cloud computing6 KB (880 words) - 10:00, 21 August 2017
- ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties7 KB (910 words) - 10:36, 26 November 2017
- |Field=, service-orientation,cloud computing,business process management,microservices ...hnology adoption models. ZEUS also calls for contributions in the field of Cloud computing, RESTful services, and microservices.4 KB (565 words) - 18:34, 4 July 2020
- for contributions in the field of Cloud computing and RESTful services. - Security, compliance, and nonfunctional properties7 KB (1,046 words) - 10:36, 26 November 2017
- ...of data and services), interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se ...obile computing, search engine, question answering, robotics, web service, security and privacy12 KB (1,578 words) - 14:54, 24 September 2020
- * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service4 KB (548 words) - 08:05, 13 September 2019
- Privacy and Security in Data Management. Distributed Database Systems, Cloud Data Management, NoSQL, Scalable Analytics, Distributed Transactions, Consi6 KB (826 words) - 09:45, 19 February 2021
- ...data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) * Infrastructures (e.g., cloud computing, data intensive computing, database systems, indexing and compres4 KB (546 words) - 14:37, 3 August 2023
- ...mmediate issues that are significantly influencing all aspects of cluster, cloud, grid and edge computing. ...tures; multicores; power and cooling; power-efficient ("green") computing; security and reliability; high availability solutions; high performance GPU applicat1 KB (173 words) - 23:51, 24 February 2020
- * Authenticity, Privacy, Security, and Trust * Cloud Computing and Database-as-a-Service4 KB (510 words) - 09:37, 21 April 2020
- * privacy and security issues * media grid computing, cloud and virtualization4 KB (436 words) - 11:49, 21 April 2020
- *Big Data platforms with applications to network management, security, measurements *Networking aspects of datacenters and cloud computing2 KB (290 words) - 11:16, 6 April 2020
- *Existing and emerging platforms at all scales, from embedded to cloud *Internet services, cloud computing, and datacenters4 KB (547 words) - 12:27, 30 September 2019
- *A Maturity Model for IT-related Security Incident Management *Energy Efficient Cloud Data Center Using Dynamic Virtual Machine Consolidation Algorithm7 KB (917 words) - 18:07, 17 March 2020
- |Title=17th International Symposium on Cluster, Cloud and Grid Computing ...research results and technological developments in the fields of Cluster, Cloud and Grid computing. The CCGrid symposium, which is sponsored by the IEEE Co2 KB (288 words) - 09:18, 6 June 2019
- * cloud computing * security and privacy2 KB (238 words) - 18:42, 7 March 2020
- Big data and cloud computing Security4 KB (401 words) - 07:52, 29 July 2020
- |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:11 KB (1,549 words) - 11:34, 17 April 2020
- |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (152 words) - 10:13, 17 April 2020
- === Information Security === ...lysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies.3 KB (314 words) - 11:52, 27 March 2020
- ...tion infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulation. ...on-making, visual analytics, intelligent support in M&S, and simulation in cloud computing environments.3 KB (457 words) - 08:25, 17 April 2020
- * Data Privacy and Security ** Cloud Data Management3 KB (396 words) - 09:53, 19 February 2021
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to busines5 KB (690 words) - 12:02, 26 March 2020
- |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks2 KB (299 words) - 13:10, 30 March 2020
- Track 2: Cloud Services and Networking Track 7: Security, Privacy and Content Protection6 KB (769 words) - 09:37, 4 September 2023
- * Wireless Network Security * Emerging Technologies: Cloud Computing2 KB (192 words) - 14:37, 11 December 2023
- *Big data platforms with applications to network management, security, measurements *Networking aspects of data-centers and cloud computing2 KB (238 words) - 11:18, 6 April 2020
- * cloud, edge and fog computing, * security and practical applications of cryptography,2 KB (210 words) - 12:33, 22 December 2020
- ...ion of functional and non-functional properties, including performance and security aspects; ...tion, reconfiguration, networked computing, parallel, high-performance and cloud computing;2 KB (264 words) - 18:00, 18 February 2021
- ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F5 KB (556 words) - 15:23, 14 January 2021
- |Title=14th International Conference on Provable and Practical Security ...s are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:2 KB (208 words) - 10:19, 9 April 2020
- |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions2 KB (195 words) - 11:08, 9 April 2020
- * Software & System Security * Software and system security and privacy5 KB (608 words) - 13:03, 15 April 2020
- *cloud, edge and fog computing, *security and practical applications of cryptography,3 KB (303 words) - 08:58, 16 April 2020
- * cloud computing, * security and practical applications of cryptography,2 KB (222 words) - 11:23, 16 April 2020
- ...ion of functional and non-functional properties, including performance and security aspects; ...tion, reconfiguration, networked computing, parallel, high-performance and cloud computing;3 KB (355 words) - 08:53, 17 April 2020
- |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (155 words) - 10:20, 17 April 2020
- |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (153 words) - 10:27, 17 April 2020
- ...isioning; Energy-efficient networking; Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization); Energy-efficient methodologies for infrastr ...ced Metering Infrastructure); QoS, latency and reliability in Smart Grids; Security (including wireless, wire-line, broadband over power lines) in Smart Grids;10 KB (1,331 words) - 14:52, 19 April 2020
- ...s; QoS-aware body area networks; Robust sensing services; Cloud of things; Cloud and smart grid vulnerabilities; Polarization-agile antennas; Service percep ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;14 KB (1,770 words) - 14:56, 19 April 2020
- ...achine learning methods; Model training, inference, and serving; Trust and security for machine learning applications; Testing, debugging, and monitoring of ma ...ous systems; Monitoring and control in autonomous systems; Performance and security in autonomous systems; Management of autonomous systems; Testing autonomous16 KB (1,897 words) - 12:31, 18 May 2020
- ...owsers; Tabular Data on the Web; Web linguistic changes; Web-based systems security; Web preferences; Web pattern semantics; Modeling web user activities; Twit ...lications; Web Infrastructure: Datacenters, Content Delivery Networks, and Cloud Computing; Internet Economics and Monetization11 KB (1,390 words) - 12:35, 18 May 2020
- * Edge and fog computing: distributed computing models from sensor to cloud * Security and privacy issues2 KB (185 words) - 17:41, 22 January 2021
- safety and security for mobile MAS deployment security and trust in multi-agent systems8 KB (1,092 words) - 12:49, 22 April 2020
- * Software & System Security * Software and system security and privacy4 KB (490 words) - 09:38, 23 April 2020
- * - Cloud-based and High-Performance Simulation Environments Simulation in Advanced M * - Security in Computer and Telecommunication Systems5 KB (640 words) - 13:03, 5 May 2020
- ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of serv4 KB (457 words) - 10:25, 6 May 2020
- ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc. ...for emerging embedded platforms, including smartphones, automotive, server/cloud, etc.4 KB (431 words) - 10:40, 6 May 2020
- * Cloud Communications and Computing * Information Infrastructure and Security2 KB (175 words) - 10:44, 7 May 2020
- * Cloud Communications and Computing * Information Infrastructure and Security2 KB (174 words) - 10:43, 7 May 2020
- * Cloud Infrastructure for Big Data * Privacy and Security in Analytics2 KB (217 words) - 12:15, 7 May 2020
- ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...s; runtime systems; parallel and distributed systems; storage; networking; security and privacy; virtualization; software-hardware interactions; performance ev8 KB (1,078 words) - 09:27, 12 May 2020
- * HotCloud '18: 10th USENIX Workshop on Hot Topics in Cloud Computing (July 9, 2018) * Cloud and edge computing6 KB (729 words) - 09:28, 12 May 2020
- * Cloud/Grid/Stream Computing for Big Data * Programming Models and Environments for Cluster, Cloud, and Grid Computing to Support Big Data4 KB (563 words) - 15:55, 23 June 2020
- * Cloud/Grid/Stream Computing for Big Data * Programming Models and Environments for Cluster, Cloud, and Grid Computing to Support Big Data5 KB (543 words) - 21:14, 18 May 2020
- * Parallel, distributed, and cloud-based high-performance data mining * Security and intrusion detection2 KB (261 words) - 20:06, 20 May 2020
- ● Security and intrusion detection ● Parallel, distributed, and cloud-based high-performance data mining2 KB (268 words) - 20:28, 20 May 2020
- * Security and intrusion detection * Parallel, distributed, and cloud-based high-performance data mining2 KB (272 words) - 21:17, 20 May 2020
- * Distributed and parallel computing (cloud, map-reduce, etc.) * Privacy and security4 KB (515 words) - 16:39, 25 May 2020
- * Cloud computing and service data analysis. * Cloud architectures and cloud computing.3 KB (308 words) - 16:50, 16 December 2020
- |Field=big data, cloud computing, artificial intelligence, database * Cloud/Grid/Stream Computing for Big Data9 KB (1,187 words) - 14:18, 27 May 2020
- |Field=big data, cloud computing, artificial intelligence, database * Cloud and grid computing for big data3 KB (389 words) - 06:51, 9 June 2020
- * Fuzzy systems with big data and cloud computing, fuzzy analytics, and visualization * Computational intelligence in security2 KB (238 words) - 17:30, 6 May 2021
- ...rned-based vehicular networks; Geo-replicated data stores; Personal Cloud; Cloud interactive services; Energy harvesting and energy efficiency; Opportunisti ...s; Automatic computing for Web services; Web services challenges on trust, security, performance, scalability; Enterprise Web services; Web services discovery,14 KB (1,804 words) - 13:49, 5 June 2020
- ...ing; Mobile software systems; Context- and Location-aware services; Mobile Cloud services; Mobile social media; Mobile services and energy-aware application Security and privacy environments; Protection and safety of distributed mobile data;7 KB (918 words) - 13:51, 5 June 2020
- * Social and cloud-based multimedia * Multimedia security, privacy and forensics1 KB (140 words) - 17:50, 9 June 2020
- * Social and cloud-based multimedia * Multimedia security, privacy and forensics1 KB (140 words) - 18:05, 9 June 2020
- ...lthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyber ...ters; Risk control for shared-servers in data centers; Fraud prevention in Cloud networking; Discovering and monitoring Botnets in SDNs; 5G traffic measurem17 KB (2,088 words) - 12:49, 14 June 2020
- ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques11 KB (1,356 words) - 12:56, 14 June 2020
- * cloud computing * security and privacy4 KB (529 words) - 11:04, 17 June 2020
- |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security3 KB (353 words) - 12:35, 23 June 2020
- |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security3 KB (423 words) - 11:27, 23 June 2020
- |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security3 KB (407 words) - 11:20, 23 June 2020
- ...iented networking; Cellular cognitive networks; Future routing mechanisms; Cloud-based services; Online interactive services; Mobile services ...nt and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing13 KB (1,636 words) - 11:51, 10 July 2020
- * Cloud Computing and Big Data * Communications and Information Security3 KB (483 words) - 08:08, 21 August 2020
- * Cloud computing * Software security and trust; data privacy5 KB (557 words) - 07:07, 13 July 2020
- ...Adaptive video-streaming dissemination; Streaming content from a vehicular cloud; Wireless degrading communication sensing; Secure information transfer in V Security8 KB (915 words) - 19:45, 9 July 2020
- ...environments; Collaboration techniques in resource intensive environments; Security, privacy and trust in collaborative networks, systems, and applications8 KB (897 words) - 17:15, 22 March 2021
- ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...rnet of X (everything, things, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks;13 KB (1,550 words) - 02:20, 10 July 2020
- ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" ...management; Machine-to-machine (M2M) and Internet of Things (IoT); Mobile Cloud: WiFi signal-based human activity recognition; Dynamic spectrum access; Cog11 KB (1,335 words) - 02:28, 10 July 2020
- ...a systems","Networking and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deploym ...ivate organizations; Cybersecurity risks; Smart home security and privacy; Security awareness; Digital forensics; Large e-Commerce; Digital crowdfunding platfo18 KB (2,036 words) - 02:36, 10 July 2020
- ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development Software engineering for service computing (SOA and Cloud)13 KB (1,573 words) - 12:00, 10 July 2020
- ...; Methods and tools for system quality prediction; Reliability prediction; Security prediction; Risk prediction; Performance prediction; Uncertainty handling i Simulation in Virtualized systems; Simulation in Cloud environments; Simulations in GRID environments; Simulation in Cognitive sys12 KB (1,421 words) - 12:02, 10 July 2020
- ...resentation of human body data; Trusted information for personal wellness; Cloud outsourcing of medical image repositories; Web-base decision support system ...ical systems; Scalability evaluation; Mobile clouds in medical scenarios ; Security of medical systems; Privacy for wired and wireless medical devices8 KB (970 words) - 16:50, 14 July 2020
- * IoT, intelligent cloud and fog computing HAIS applications are welcome as well, such as in security, prediction, control, robotics, image and speech signal processing, food in2 KB (200 words) - 09:20, 24 July 2020