Results 271 to 280 of about 433,812 (307)
Modular Adaptive Processing Infrastructure (MAPI): a blueprint for interconnecting generic workflows with modern interfaces. [PDF]
Hafner A +3 more
europepmc +1 more source
Shamir's key basedconfidentialityon cloud data storage.
Kamalraj Durai
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cloud Storage File Recoverability
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two important practical problems have not yet been considered.
Gorke, Christian A. +3 more
openaire +2 more sources
Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, 2014
In an increasingly connected world, users access personal or shared data, stored "in the cloud" (e.g., Dropbox, Skydrive, iCloud) with multiple devices. Despite the popularity of cloud storage services, little work has focused on investigating cloud storage users' Quality of Experience (QoE), in particular on mobile devices.
Karel Vandenbroucke +4 more
openaire +1 more source
In an increasingly connected world, users access personal or shared data, stored "in the cloud" (e.g., Dropbox, Skydrive, iCloud) with multiple devices. Despite the popularity of cloud storage services, little work has focused on investigating cloud storage users' Quality of Experience (QoE), in particular on mobile devices.
Karel Vandenbroucke +4 more
openaire +1 more source
2020
This chapter introduces the data integrity verification technique for cloud storage systems. First, the basic paradigms and principles of the data integrity verification technique are presented. Then, a comprehensive survey on the data integrity verification technique is provided, where existing data integrity verification schemes are introduced, and ...
Yuan Zhang +2 more
openaire +1 more source
This chapter introduces the data integrity verification technique for cloud storage systems. First, the basic paradigms and principles of the data integrity verification technique are presented. Then, a comprehensive survey on the data integrity verification technique is provided, where existing data integrity verification schemes are introduced, and ...
Yuan Zhang +2 more
openaire +1 more source
2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2012
Designing storage architectures for emerging data-intensive applications presents several challenges and opportunities. Tackling these problems requires a combination of architectural optimizations to the storage devices and layers of the memory/storage hierarchy as well as hardware/software techniques to manage the flow of data between the cores and ...
Gurudatt Kulkarni +5 more
openaire +1 more source
Designing storage architectures for emerging data-intensive applications presents several challenges and opportunities. Tackling these problems requires a combination of architectural optimizations to the storage devices and layers of the memory/storage hierarchy as well as hardware/software techniques to manage the flow of data between the cores and ...
Gurudatt Kulkarni +5 more
openaire +1 more source
IEEE Cloud Computing, 2014
As with most popular consumer technologies, criminals can exploit vulnerabilities in mobile devices and operating systems or mobile apps to target mobile device and app users. Because of their capability to store vast amounts of user data, cloud storage apps are a potential and attractive target for criminals.
openaire +2 more sources
As with most popular consumer technologies, criminals can exploit vulnerabilities in mobile devices and operating systems or mobile apps to target mobile device and app users. Because of their capability to store vast amounts of user data, cloud storage apps are a potential and attractive target for criminals.
openaire +2 more sources
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014
Storage and file synchronisation is a common and important service provided by contemporary cloud providers and a new standard for file sharing and information storage among companies and individuals. However, choosing the right storage provider depends on many factors.
Xhemal Zenuni +3 more
openaire +1 more source
Storage and file synchronisation is a common and important service provided by contemporary cloud providers and a new standard for file sharing and information storage among companies and individuals. However, choosing the right storage provider depends on many factors.
Xhemal Zenuni +3 more
openaire +1 more source

