Results 71 to 80 of about 4,735 (235)

An Overview of Data Storage in Cloud Computing [PDF]

open access: yes, 2017
Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be
Ahuja, Ravin   +3 more
core  

Secure Cloud Storage with Deduplication Technique

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology
Data de-duplication refers to providing cloud providers with a way to manage the uncontrollable data and the challenges of cloud storage. The success of IOT and social media led us to face big data challenges. Big data is interesting but also becomes a critical challenge for cloud service providers.
null Ms. Aishwarya S. Khutwad   +3 more
openaire   +1 more source

Deciphering nodal burden in thyroid carcinoma: A dedicated survey of age, lymph node ratio, log odds of positive nodes, and preoperative prediction models

open access: yesJournal of Intelligent Medicine, EarlyView.
Abstract Evidence regarding the prognosis of thyroid carcinoma is heterogeneous, ranging from age effects and nodal burden metrics, such as lymph node ratio (LNR) and log odds of positive nodes (LODDS), to preoperative imaging models comprising ultrasound, CEUS, and radiomics.
Mennatallah Sherif   +2 more
wiley   +1 more source

To Share or Not to Share in Client-Side Encrypted Clouds

open access: yes, 2014
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core   +1 more source

fCUT&Tag‐Seq: An optimized CUT&Tag‐based method for high‐resolution profiling of histone modifications and chromatin‐binding proteins in fungi

open access: yesmLife, EarlyView.
Abstract Histone modifications and chromatin‐binding proteins play crucial roles in regulating gene expression in eukaryotes, with significant implications for fungal pathogenicity and development. However, profiling these modifications or proteins across the genome in fungi remains challenging due to the technical limitations of the traditional ...
Haiting Wang   +11 more
wiley   +1 more source

Privacy-preserving record linkage in large databases using secure multiparty computation

open access: yesBMC Medical Genomics, 2018
Background Practical applications for data analysis may require combining multiple databases belonging to different owners, such as health centers. The analysis should be performed without violating privacy of neither the centers themselves, nor the ...
Peeter Laud, Alisa Pankova
doaj   +1 more source

Secure Data Deduplication in Cloud Storage Services [PDF]

open access: yes
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core  

BaseFs - Basically Acailable, Soft State, Eventually Consistent Filesystem for Cluster Management [PDF]

open access: yes, 2016
A peer-to-peer distributed filesystem for community cloud management.
Aymerich Gubern, Marc
core   +1 more source

A Configurable Transport Layer for CAF

open access: yes, 2018
The message-driven nature of actors lays a foundation for developing scalable and distributed software. While the actor itself has been thoroughly modeled, the message passing layer lacks a common definition. Properties and guarantees of message exchange
Adelstein F.   +6 more
core   +1 more source

Message-Locked Proofs of Retrievability with Secure Deduplication

open access: yesProceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
This paper addresses the problem of data retrievability in cloud computing systems performing deduplication to optimize their space savings: While there exist a number of proof of retrievability (PoR) solutions that guarantee storage correctness with cryptographic means, these solutions unfortunately come at odds with the deduplication technology.
Vasilopoulos, Dimitrios   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy