Results 81 to 90 of about 2,849,694 (325)

Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service

open access: yesIEEE Access, 2019
For a variety of cyber-attacks occurring in a power IoT-Cloud environment, conventional security intrusion incident detection and response technologies typically use pattern- and behavior-based statistical methods.
Chang Choi, Junho Choi
semanticscholar   +1 more source

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Photonic Nanomaterials for Wearable Health Solutions

open access: yesAdvanced Materials, EarlyView.
This review discusses the fundamentals and applications of photonic nanomaterials in wearable health technologies. It covers light‐matter interactions, synthesis, and functionalization strategies, device assembly, and sensing capabilities. Applications include skin patches and contact lenses for diagnostics and therapy. Future perspectives emphasize AI‐
Taewoong Park   +3 more
wiley   +1 more source

基于层次分析—模糊评价的云计算安全评估与对策

open access: yesTongxin xuebao, 2016
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG   +3 more
doaj   +2 more sources

eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology

open access: yesSensors, 2018
Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering.
Haonan Sun   +5 more
doaj   +1 more source

Advancements in Carbon‐Based Piezoelectric Materials: Mechanism, Classification, and Applications in Energy Science

open access: yesAdvanced Materials, EarlyView.
Carbon‐based piezoelectric materials are systematically categorized based on their structural and functional properties. The mechanisms of stress‐induced charge transfer are elucidated, and their applications are explored across three key domains: piezoelectric catalysis for energy conversion and environmental remediation, piezoelectric biomedical ...
Mude Zhu   +3 more
wiley   +1 more source

Data Security and Privacy Protection for Cloud Storage: A Survey

open access: yesIEEE Access, 2020
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar   +1 more source

Designing Physical Unclonable Functions From Optically Active Materials

open access: yesAdvanced Materials, EarlyView.
Assigning unforgeable “fingerprints” to manufactured goods is a key strategy to fight global counterfeiting. Optical physical unclonable functions (PUFs) are chemically generated random patterns of optically active materials serving as unique authenticators.
Maxime Klausen   +2 more
wiley   +1 more source

Security of Cloud Computing

open access: yesDianxin kexue, 2013
Cloud security has been widely considered as the key factor restricting its development since the cloud computing technology emerged.The insecure factors of cloud computing system and the secure factors which cloud computing brings were presented and ...
Qunying Sun, Zhiyuan Hu
doaj   +2 more sources

Home - About - Disclaimer - Privacy