Search results
Create the page "Cloud security" on this wiki! See also the search results found.
- ...concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest i Trust, Security and Privacy in embedded systems4 KB (451 words) - 12:27, 30 November 2011
- Communications modeling; Communications security; Computer (everything, things, people, etc.); Internet, Virtualization and Cloud;6 KB (725 words) - 19:58, 22 November 2020
- ...and practitioners from multiple disciplines to focus on service-oriented, cloud-based innovative for the 21st century enterprises. The conference will feat ...t impact on the field of service-oriented computing and also in particular cloud services.6 KB (745 words) - 15:27, 1 November 2016
- Energy-efficient grid, cloud, and data center technology Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability10 KB (1,297 words) - 17:49, 24 February 2012
- |Title=European Conference on Service-Oriented and Cloud Computing 2012 The European Conference on Service-Oriented and Cloud Computing (ESOCC)4 KB (504 words) - 18:21, 5 March 2012
- ...tion; Man-in-the-middle attacks; Bundle streaming service; Self-organizing cloud cells; Soft-coded and hard-coded relaying ...hnologies and networking; Mobile network expansion solutions (small cells, Cloud-RAN, etc.); 5G radio-access networks (RAN); D2D communications in cellular13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- *Cloud data management *Security, privacy, and trust4 KB (535 words) - 21:32, 11 February 2020
- *Cloud data management Recommendation systems *Security, privacy, and trust4 KB (500 words) - 17:29, 6 January 2021
- *Cyber Security and Privacy *Semantic Web, Cloud Computing, and Web Information Systems5 KB (663 words) - 11:49, 18 February 2020
- ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cloud computing || Fault localization || Software process || Software product lin6 KB (738 words) - 11:21, 6 July 2020
- ...ecture, distributed search, metasearch, peer-to-peer search, search in the cloud). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).8 KB (1,024 words) - 09:57, 13 May 2020
- • Information and data governance, information assurance, security, compliance • Semantic cloud computing, edge computing, fog computing6 KB (872 words) - 23:11, 24 February 2020
- *Cloud computing and data centers *Security and privacy, cryptographic protocols2 KB (299 words) - 11:51, 8 April 2020
- ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and3 KB (434 words) - 22:46, 30 May 2012
- |Title=3rd International Conference on Cloud Computing and Services Science ...D COMPUTING FUNDAMENTALS, SERVICES SCIENCE FOUNDATION FOR CLOUD COMPUTING, CLOUD COMPUTING PLATFORMS AND APPLICATIONS, LOUD COMPUTING ENABLING TECHNOLOGY5 KB (662 words) - 18:50, 20 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- - Cloud Computing<br /> - Security and Access Control<br />3 KB (466 words) - 13:00, 16 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Cloud-enabled large-scale simulation6 KB (728 words) - 01:01, 25 August 2012
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- Information Security Cloud Computing and Green Computing2 KB (224 words) - 08:27, 26 October 2012
- |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology3 KB (351 words) - 09:52, 28 October 2012
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cloud-based IS engineering3 KB (375 words) - 15:06, 24 September 2020
- ...ge of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols. ● Trust, Security and Privacy in embedded systems5 KB (677 words) - 15:19, 19 December 2012
- * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing5 KB (584 words) - 14:44, 14 January 2013
- ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust - Implications for Security, Privacy, International Law and the Cloud5 KB (702 words) - 10:02, 5 March 2013
- ...e emerged; besides, other novel techniques, such as virtualization and the cloud paradigm, have taken roots. All in all, these bring about new requirements - Security solutions for managed and infrastructureless networks9 KB (1,145 words) - 16:57, 11 April 2013
- • Privacy, safety and security • Cloud Computing4 KB (438 words) - 14:04, 8 May 2013
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- *Cloud Computing *Cyber Security3 KB (308 words) - 17:30, 26 May 2016
- *Information Security and Cryptography *Network and Cyber Security2 KB (227 words) - 11:30, 21 June 2016
- ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- *Cloud Services and Networking *Security, Privacy and Content Protection1 KB (129 words) - 09:41, 4 September 2023
- Information Security Cloud Computing, Computing Models3 KB (359 words) - 22:34, 30 September 2016
- * Cloud Computing * Web Security and Trust Management2 KB (230 words) - 00:37, 28 May 2016
- * Cloud Computing * Information Assurance and Security9 KB (1,131 words) - 23:18, 24 February 2020
- * Information and data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing6 KB (877 words) - 23:06, 24 February 2020
- |Title=MEDES 2016 : Special Track: Secure Cloud Computing |Field=cloud computing, security, watermarking, risk management430 bytes (50 words) - 16:17, 8 July 2016
- |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing329 bytes (35 words) - 17:36, 8 July 2016
- - Cloud Computing and Big Data Analytics - Security and Privacy12 KB (1,565 words) - 04:15, 5 August 2023
- |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- ...r Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing) |Field=cloud forensics, cloud security, cybercrime investigation, digital forensics454 bytes (52 words) - 17:01, 10 February 2021
- * Cloud Computing Services * Security and Privacy Issues925 bytes (116 words) - 11:05, 24 August 2016
- |Field=networks, computing, cloud computing, network security443 bytes (50 words) - 09:31, 19 July 2019
- |Field=cloud computing, multimedia, network security, networking416 bytes (48 words) - 10:48, 11 September 2016
- ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques10 KB (1,305 words) - 00:29, 12 December 2020
- * Cloud Computing Services * Security and Privacy of Information and IS3 KB (434 words) - 10:28, 26 July 2016
- ...uages and integration, interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se * cloud computing5 KB (580 words) - 20:22, 28 January 2017
- ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (282 words) - 10:48, 8 February 2020
- ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di2 KB (270 words) - 10:49, 8 February 2020