thumbnail

Springer Science and Business Media LLC

SCIE-ISI SCOPUS (1998,2005-2023)

  1386-7857

 

 

Cơ quản chủ quản:  SPRINGER , Kluwer Academic Publishers

Lĩnh vực:
Computer Networks and CommunicationsSoftware

Các bài báo tiêu biểu

Power capping: a prelude to power shifting
Tập 11 Số 2 - Trang 183-195 - 2008
Charles Lefurgy, Xiaorui Wang, Malcolm Ware
Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm
Tập 22 Số S2 - Trang 4745-4766 - 2019
Alaa Tharwat, Mohamed Elhoseny, Aboul Ella Hassanien, Thomas Gabel, Arun Kumar
Hand gesture recognition based on convolution neural network
- 2019
Gongfa Li, Tianhao Tang, Ying Sun, Jianyi Kong, Guozhang Jiang, Jiang Du, Bo Tao, Shuang Xu, Honghai Liu
Performance analysis of MPI collective operations
- 2007
Jelena Pješivac–Grbović, Thara Angskun, George Bosilca, Graham E. Fagg, Edgar Gabriel, Jack Dongarra
Multi-objective workflow scheduling in Amazon EC2
Tập 17 Số 2 - Trang 169-189 - 2014
Juan J. Durillo, Radu Prodan
DataSpaces: an interaction and coordination framework for coupled simulation workflows
Tập 15 Số 2 - Trang 163-181 - 2012
Ciprian Docan, Manish Parashar, Scott Klasky
Recent advancements in resource allocation techniques for cloud computing environment: a systematic review
Tập 20 Số 3 - Trang 2489-2533 - 2017
Syed Hamid Hussain Madni, Muhammad Shafie Abd Latiff, Yahaya Coulibaly, Shafií Muhammad Abdulhamid
Factors influencing the acceptance of telemedicine for diabetes management
Tập 18 Số 1 - Trang 321-331 - 2015
Mi Jung Rho, Hun-Sung Kim, Kyungyong Chung, In Young Choi
Survey of access control models and technologies for cloud computing
Tập 22 - Trang 6111-6122 - 2018
Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, Yi Yu
Access control is an important measure for the protection of information and system resources to prevent illegitimate users from getting access to protected objects and legitimate users from attempting to access the objects in ways that exceed what they are allowed. The restriction placed on access from a subject to an object is determined by the access policy. With the rapid development of cloud computing, cloud security has increasingly become a common concern and should be dealt with seriously. In this paper, we survey access control models and policies in different application scenarios, especially for cloud computing, by following the development of the internet as the main line and by examining different network environments and user requirements. Our focus in the survey is on the relationships among different models and technologies along with the application scenarios as well as the pros and cons of each model. Special attention will be placed on access control for cloud computing, which is reflected in the summaries of the access control models and methods. We also identify some emerging issues of access control and point out some future research directions for cloud computing.
A novel improved deep convolutional neural network model for medical image fusion
- 2019
Kaijian Xia, H. Yin, Wang Jiang-qiang