Privacy-preserving trust management for unwanted traffic control (Englisch)
- Neue Suche nach: Zhang, Lifang
- Neue Suche nach: Yan, Zheng
- Neue Suche nach: Kantola, Raimo
- Neue Suche nach: Zhang, Lifang
- Neue Suche nach: Yan, Zheng
- Neue Suche nach: Kantola, Raimo
In:
Future Generation Computer Systems
;
72
;
305-318
;
2016
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Privacy-preserving trust management for unwanted traffic control
-
Beteiligte:
-
Erschienen in:Future Generation Computer Systems ; 72 ; 305-318
-
Verlag:
- Neue Suche nach: Elsevier B.V.
-
Erscheinungsdatum:29.06.2016
-
Format / Umfang:14 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 72
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A scalable parallel algorithm for atmospheric general circulation models on a multi-core clusterWang, Yuzhu / Jiang, Jinrong / Zhang, He / Dong, Xiao / Wang, Lizhe / Ranjan, Rajiv / Zomaya, Albert Y. et al. | 2017
- 11
-
Why good data analysts need to be critical synthesists. Determining the role of semantics in data analysisScheider, Simon / Ostermann, Frank O. / Adams, Benjamin et al. | 2017
- 23
-
CORE framework for evaluating the reliability of SaaS productsVidhyalakshmi, R. / Kumar, Vikas et al. | 2017
- 37
-
A hybrid knowledge-based recommender system for e-learning based on ontology and sequential pattern miningTarus, John K. / Niu, Zhendong / Yousif, Abdallah et al. | 2017
- 49
-
Output-oriented power saving mode for mobile devicesJoe, Hyunwoo / Kim, Jungseok / Lee, Jemin / Kim, Hyungshin et al. | 2016
- 65
-
A runtime estimation framework for ALICEPumma, Sarunya / Feng, Wu-chun / Phunchongharn, Phond / Chapeland, Sylvain / Achalakul, Tiranee et al. | 2017
- 78
-
Leading-edge research in cluster, cloud, and grid computing: Best papers from the IEEE/ACM CCGrid 2015 conferenceKatz, Daniel S. / Zhou, Xiaobo et al. | 2016
- 81
-
Reprint of “Robust partial-load experiments with Showstopper”Podzimek, Andrej / Bulej, Lubomír / Chen, Lydia Y. / Binder, Walter / Tůma, Petr et al. | 2016
- 105
-
Lark: An effective approach for software-defined networking in high throughput computing clustersZhang, Zhe / Bockelman, Brian / Carder, Dale W. / Tannenbaum, Todd et al. | 2016
- 118
-
Traffic-sensitive Live Migration of Virtual MachinesDeshpande, Umesh / Keahey, Kate et al. | 2016
- 129
-
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized EnvironmentsBassem, Christine / Bestavros, Azer et al. | 2016
- 145
-
Efficient network isolation and load balancing in multi-tenant HPC clustersZahid, Feroz / Gran, Ernst Gunnar / Bogdański, Bartosz / Johnsen, Bjørn Dag / Skeie, Tor et al. | 2016
- 163
-
Topics in cloud incident managementFortiş, Teodor-Florin / Munteanu, Victor Ion et al. | 2016
- 165
-
Self-managing cloud-native applications: Design, implementation, and experienceToffetti, Giovanni / Brunner, Sandro / Blöchlinger, Martin / Spillner, Josef / Bohnert, Thomas Michael et al. | 2016
- 180
-
Predicting provisioning and booting times in a Metal-as-a-service systemSîrbu, Alexandru / Pop, Cristian / Şerbănescu, Cristina / Pop, Florin et al. | 2016
- 193
-
A novel approach to manage cloud security SLA incidentsTrapero, Ruben / Modic, Jolanda / Stopar, Miha / Taha, Ahmed / Suri, Neeraj et al. | 2016
- 206
-
Preface: Security and privacy in big data cloudsLiu, Qin / Srinivasan, Avinash / Hu, Jiankun / Wang, Guojun et al. | 2017
- 208
-
A multi-user searchable encryption scheme with keyword authorization in a cloud storageDeng, Zuojie / Li, Kenli / Li, Keqin / Zhou, Jingli et al. | 2016
- 219
-
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity codeHu, Guangwu / Chen, Wenlong / Li, Qi / Jiang, Yong / Xu, Ke et al. | 2016
- 227
-
Anonymizing popularity in online social networks with full utilityZhang, Shiwen / Liu, Qin / Lin, Yaping et al. | 2016
- 239
-
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computingHuang, Qinlong / Yang, Yixian / Shen, Mansuo et al. | 2016
- 250
-
Aggregating privatized medical data for secure querying applicationsSingh, Kalpana / Batten, Lynn et al. | 2016
- 264
-
A hybrid index for temporal big dataWang, Mei / Xiao, Meng / Peng, Sancheng / Liu, Guohua et al. | 2016
- 273
-
Attribute-based data access control in mobile cloud computing: Taxonomy and open issuesSookhak, Mehdi / Yu, F. Richard / Khan, Muhammad Khurram / Xiang, Yang / Buyya, Rajkumar et al. | 2016
- 288
-
Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streamsSoltani Panah, Arezou / van Schyndel, Ron / Sellis, Timos et al. | 2016
- 305
-
Privacy-preserving trust management for unwanted traffic controlZhang, Lifang / Yan, Zheng / Kantola, Raimo et al. | 2016
- 319
-
Investigating the deceptive information in Twitter spamChen, Chao / Wen, Sheng / Zhang, Jun / Xiang, Yang / Oliver, Jonathan / Alelaiwi, Abdulhameed / Hassan, Mohammad Mehedi et al. | 2016
- 327
-
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptographyMai, Vu / Khalil, Ibrahim et al. | 2016
- 339
-
A privacy preserving framework for RFID based healthcare systemsRahman, Farzana / Bhuiyan, Md Zakirul Alam / Ahamed, Sheikh Iqbal et al. | 2016
- IFC
-
Editorial Board| 2017
- iii
-
Contents| 2017