Results 41 to 50 of about 2,849,694 (325)

Secure Secret Sharing in the Cloud [PDF]

open access: yes2017 IEEE International Symposium on Multimedia (ISM), 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An
Chang, Ching-Chun, Li, Chang-Tsun
openaire   +2 more sources

AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
As organizations increasingly rely on cloud computing for storage, processing, and deployment of sensitive data, ensuring robust security measures becomes paramount. This paper explores the intersection of artificial intelligence (AI) and cloud security,
Hassan Rehan
semanticscholar   +1 more source

Practice on edge cloud security of telecom operators

open access: yesDianxin kexue, 2023
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj   +2 more sources

Moving towards Cloud Security [PDF]

open access: yesInterdisciplinary Description of Complex Systems, 2015
Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security.
Rajnai, Zoltán, Rubóczki, Edit
openaire   +3 more sources

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing

open access: yesIEEE Transactions on Industrial Informatics, 2022
Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-
T. Hewa   +3 more
semanticscholar   +1 more source

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

High‐Performance Low‐Emissivity Paints Enabled by N‐Doped Poly(benzodifurandione) (n‐PBDF) for Energy‐Efficient Buildings

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a scalable and colored low‐emissivity (low‐e) paint achieved by spraying an ultrathin n‐doped poly(benzodifurandione) (n‐PBDF) coating onto various colored substrates. The low‐e paint enhances thermal regulation by reducing mid‐infrared thermal emissivity to 0.19, thereby stabilizing indoor temperatures across diverse climates ...
Xiaojie Liu   +13 more
wiley   +1 more source

A Security-Driven Approach for Energy-Aware Cloud Resource Pricing and Allocation

open access: yesAdvances in Electrical and Computer Engineering, 2021
Auctions are often recommended as effective cloud resource pricing and allocation mechanism. If adequately set, auctions provide incentives for cloud users’ truthful bidding and support cloud provider’s revenue maximization.
MIKAVICA, B., KOSTIC-LJUBISAVLJEVIC, A.
doaj   +1 more source

Secure Data Processing in the Cloud [PDF]

open access: yes, 2018
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám   +7 more
openaire   +3 more sources

Blockchain-Enabled Security Solutions for Medical Device Integrity and Provenance in Cloud Environments

open access: yesInternational Journal of Innovative Science and Research Technology
The current period of medicine using digital technology for patient care presents a new level of integration of monitoring devices with the cloud computing environment that enables the collection, storage and access to data in ways that were never ...
Omolola Akinola   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy