找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cloud Computing and Big Data: Technologies, Applications and Security; Mostapha Zbakh,Mohammed Essaaidi,Chunming Rong Conference proceedin

[复制链接]
查看: 30701|回复: 63
发表于 2025-3-21 17:21:18 | 显示全部楼层 |阅读模式
书目名称Cloud Computing and Big Data: Technologies, Applications and Security
编辑Mostapha Zbakh,Mohammed Essaaidi,Chunming Rong
视频video
概述Gathers extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications – CloudTech’17, which was held in Rabat, Morocco on Octobe
丛书名称Lecture Notes in Networks and Systems
图书封面Titlebook: Cloud Computing and Big Data: Technologies, Applications and Security;  Mostapha Zbakh,Mohammed Essaaidi,Chunming Rong Conference proceedin
描述This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. . .Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation. ..In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy.  ..Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. Th
出版日期Conference proceedings 2019
关键词Cloud Computing; Load Balancing; Big Data; HPC; Virtualization; IoT; Mobile Cloud Computing; Energy Efficie
版次1
doihttps://doi.org/10.1007/978-3-319-97719-5
isbn_softcover978-3-319-97718-8
isbn_ebook978-3-319-97719-5Series ISSN 2367-3370 Series E-ISSN 2367-3389
issn_series 2367-3370
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

书目名称Cloud Computing and Big Data: Technologies, Applications and Security影响因子(影响力)




书目名称Cloud Computing and Big Data: Technologies, Applications and Security影响因子(影响力)学科排名




书目名称Cloud Computing and Big Data: Technologies, Applications and Security网络公开度




书目名称Cloud Computing and Big Data: Technologies, Applications and Security网络公开度学科排名




书目名称Cloud Computing and Big Data: Technologies, Applications and Security被引频次




书目名称Cloud Computing and Big Data: Technologies, Applications and Security被引频次学科排名




书目名称Cloud Computing and Big Data: Technologies, Applications and Security年度引用




书目名称Cloud Computing and Big Data: Technologies, Applications and Security年度引用学科排名




书目名称Cloud Computing and Big Data: Technologies, Applications and Security读者反馈




书目名称Cloud Computing and Big Data: Technologies, Applications and Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:45:40 | 显示全部楼层
发表于 2025-3-22 00:34:31 | 显示全部楼层
FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module,ak since its security relies entirely on the security of the key manager..In this chapter, we propose a new scheme that aims to improve the security of FADE by using the TPM (Trusted Platform Module). Implemented carefully in the hardware, the TPM is resistant to software attacks and hence it can al
发表于 2025-3-22 08:11:11 | 显示全部楼层
On the Security of Medical Image Processing in Cloud Environment,rmance and security. In the light of this fact, we use a simple method based on fragmentation to support a distributed image processing architecture, as well as data privacy. The proposed methods combine a clustering method, the Fuzzy C-Means (FCM) algorithm, and a Genetic Algorithm (GA) to satisfy
发表于 2025-3-22 09:14:54 | 显示全部楼层
发表于 2025-3-22 16:50:49 | 显示全部楼层
发表于 2025-3-22 19:37:01 | 显示全部楼层
发表于 2025-3-22 22:00:08 | 显示全部楼层
Optimizations in Fully Homomorphic Encryption,th different key sizes. Among the tools we are using in this work, a small laptop with characteristics: bi-cores Intel core i5 CPU running at 2.40 GHz, with 512 KB L2 cache and 4 GB of Random Access Memory. Our implementation takes about 18 min to evaluate an entire AES circuit using a key of 1024 b
发表于 2025-3-23 04:22:57 | 显示全部楼层
发表于 2025-3-23 09:33:28 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 20:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表