Results 31 to 40 of about 468,074 (268)

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

Integrating Multi-Cloud to Establish Cloud Security for Secured Cloud Transaction

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
Nowadays every possible transaction is occurring online so for all these transactions required security must be provided. It is not easy to produce such security since there will be a huge amount of data involved here as well as stored data must be kept confidential so to achieve these things we need to perform transactions through the cloud.
null Dr. Samydurai A   +3 more
openaire   +1 more source

Unlocking Photodetection Mode Switching from a Simple Lateral Design

open access: yesAdvanced Functional Materials, EarlyView.
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong   +10 more
wiley   +1 more source

A Security-Driven Approach for Energy-Aware Cloud Resource Pricing and Allocation

open access: yesAdvances in Electrical and Computer Engineering, 2021
Auctions are often recommended as effective cloud resource pricing and allocation mechanism. If adequately set, auctions provide incentives for cloud users’ truthful bidding and support cloud provider’s revenue maximization.
MIKAVICA, B., KOSTIC-LJUBISAVLJEVIC, A.
doaj   +1 more source

Managing the outsourcing of information security processes: the 'cloud' solution [PDF]

open access: yes, 2013
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core   +1 more source

Entangled cloud storage [PDF]

open access: yes, 2016
Entangled cloud storage (Aspnes et al., ESORICS 2004) enables a set of clients to “entangle” their files into a single clew to be stored by a (potentially malicious) cloud provider.
Ateniese, Giuseppe   +3 more
core   +1 more source

Smart Face Masks as Wearable Respiratory Sensors: A Review of Sensor Technologies, Materials, and Future Directions

open access: yesAdvanced Healthcare Materials, EarlyView.
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi   +7 more
wiley   +1 more source

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]

open access: yes, 2011
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core   +2 more sources

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

open access: yes, 2017
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy