Results 41 to 50 of about 2,849,694 (325)
Secure Secret Sharing in the Cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An
Chang, Ching-Chun, Li, Chang-Tsun
openaire +2 more sources
AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age
As organizations increasingly rely on cloud computing for storage, processing, and deployment of sensitive data, ensuring robust security measures becomes paramount. This paper explores the intersection of artificial intelligence (AI) and cloud security,
Hassan Rehan
semanticscholar +1 more source
Practice on edge cloud security of telecom operators
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj +2 more sources
Moving towards Cloud Security [PDF]
Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security.
Rajnai, Zoltán, Rubóczki, Edit
openaire +3 more sources
Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-
T. Hewa+3 more
semanticscholar +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
This study introduces a scalable and colored low‐emissivity (low‐e) paint achieved by spraying an ultrathin n‐doped poly(benzodifurandione) (n‐PBDF) coating onto various colored substrates. The low‐e paint enhances thermal regulation by reducing mid‐infrared thermal emissivity to 0.19, thereby stabilizing indoor temperatures across diverse climates ...
Xiaojie Liu+13 more
wiley +1 more source
A Security-Driven Approach for Energy-Aware Cloud Resource Pricing and Allocation
Auctions are often recommended as effective cloud resource pricing and allocation mechanism. If adequately set, auctions provide incentives for cloud users’ truthful bidding and support cloud provider’s revenue maximization.
MIKAVICA, B., KOSTIC-LJUBISAVLJEVIC, A.
doaj +1 more source
Secure Data Processing in the Cloud [PDF]
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám+7 more
openaire +3 more sources
The current period of medicine using digital technology for patient care presents a new level of integration of monitoring devices with the cloud computing environment that enables the collection, storage and access to data in ways that were never ...
Omolola Akinola+5 more
semanticscholar +1 more source