Results 181 to 190 of about 28,164 (210)
Some of the next articles are maybe not open access.
Verifiable Delegation for Secure Outsourcing in Cloud computing
2018In distributed environment, to accomplish access privileges and maintain information as secret, the data proprietors could receive attribute-based encryption to encode the put-away information. Users with constrained-figuring power are, however, more prone to appoint the veil of the decryption task to the cloud servers to decrease the computing cost ...
Nalini Sri Mallela, Nagaraju Devarakonda
openaire +1 more source
Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing
2019This paper presents a novel, secure and dynamic mechanism to train machine learning models that achieve membership privacy. Our protocol falls in the two-server-aided model and allows one server to perform most of computations and allows another server to provide auxiliary computation.
Ping Li, Jin Li
openaire +1 more source
Rezension „IT-Outsourcing und Cloud Computing“
HMD Praxis der Wirtschaftsinformatik, 2020openaire +1 more source
Outsourcing Computing Resources through Cloud Computing
2014Mohammad Nabil Almunawar +1 more
openaire +1 more source
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing
IEEE Transactions on Services Computing, 2021Yinghui Zhang, Robert H Deng, Ximeng Liu
exaly
Bericht des Fachausschuss Cloud Computing, Outsourcing, IT-Projekte
2023Thomas Stögmüller +2 more
openaire +1 more source
Distributed Artificial Intelligence Empowered by End-Edge-Cloud Computing: A Survey
IEEE Communications Surveys and Tutorials, 2023Sijing Duan, Dan Wang, Ju Ren
exaly
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT
IEEE Transactions on Industrial Informatics, 2023Youliang Tian, Jinbo Xiong, M Bhuiyan
exaly
Security and Privacy in Cloud Computing
IEEE Communications Surveys and Tutorials, 2013Zhifeng Xiao, Yang Xiao
exaly

