Healing on the cloud: Secure cloud architecture for medical wireless sensor networks (Englisch)
- Neue Suche nach: Bouabdallah, Abdelmadjid
- Neue Suche nach: Bouabdallah, Abdelmadjid
- Neue Suche nach: Challal, Yacine
- Neue Suche nach: Lounis, Ahmed
- Neue Suche nach: Hadjidj, Abdelkrim
In:
Future generation computer systems
;
55
; 266-277
;
2016
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
-
Beteiligte:
-
Erschienen in:Future generation computer systems ; 55 ; 266-277
-
Verlag:
- Neue Suche nach: Elsevier [u.a.]
-
Erscheinungsort:Amsterdam
-
Erscheinungsdatum:2016
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 53.00 / 54.00
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 55
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Reliability-driven scheduling of time/cost-constrained grid workflowsKianpisheh, Somayeh / Charkari, Nasrolah Moghadam / Kargahi, Mehdi et al. | 2015
- 17
-
Auditable versioned data storage outsourcingEsiner, Ertem / Datta, Anwitaman et al. | 2015
- 29
-
Low-time complexity budget–deadline constrained workflow scheduling on heterogeneous resourcesArabnejad, Hamid / Barbosa, Jorge G. / Prodan, Radu et al. | 2015
- 41
-
Impact of user patience on auto-scaling resource capacity for cloud servicesde Assunção, Marcos Dias / Cardonha, Carlos H. / Netto, Marco A.S. / Cunha, Renato L.F. et al. | 2015
- 51
-
Static scheduling of multiple workflows with soft deadlines in non-dedicated heterogeneous environmentsBochenina, Klavdiya / Butakov, Nikolay / Boukhanovsky, Alexander et al. | 2015
- 62
-
Service level agreement based adaptive Grid superschedulingHasanzadeh Mofrad, Mohammad / Jalilian, Omid / Rezvanian, Alireza / Meybodi, Mohammad Reza et al. | 2015
- 74
-
A new technique for efficient live migration of multiple virtual machinesSun, Gang / Liao, Dan / Anand, Vishal / Zhao, Dongcheng / Yu, Hongfang et al. | 2015
- 87
-
Toward integrity assurance of outsourced computing — a game theoretic perspectiveWang, Yongzhi / Wei, Jinpeng / Ren, Shaolei / Shen, Yulong et al. | 2015
- 101
-
dragon: Multidimensional range queries on distributed aggregation treesCarlini, Emanuele / Lulli, Alessandro / Ricci, Laura et al. | 2015
- 116
-
Multi-provider cloud computing network infrastructure optimizationBanditwattanawong, Thepparit / Masdisornchote, Masawee / Uthayopas, Putchong et al. | 2015
- 129
-
Digital library interoperability at high level of abstractionAgosti, Maristella / Ferro, Nicola / Silvello, Gianmaria et al. | 2015
- 147
-
HyperFlow: A model of computation, programming approach and enactment engine for complex distributed workflowsBalis, Bartosz et al. | 2015
- 163
-
New Horizons of Cloud ComputingHelfert, Markus et al. | 2015
- 165
-
A secure dynamic collaboration environment in a cloud contextPiechotta, Chris / Olsen, Martin Grooss / Jensen, Adam Enø / Coleman, Joey W. / Larsen, Peter Gorm et al. | 2015
- 176
-
Matchmaking semantic security policies in heterogeneous cloudsDi Modica, Giuseppe / Tomarchio, Orazio et al. | 2015
- 186
-
Capacity-driven utility model for service level agreement negotiation of cloud servicesRanaldo, Nadia / Zimeo, Eugenio et al. | 2015
- 200
-
Automated configuration support for infrastructure migration to the cloudGarcía-Galán, Jesús / Trinidad, Pablo / Rana, Omer F. / Ruiz-Cortés, Antonio et al. | 2015
- 213
-
Analyzing Hadoop power consumption and impact on application QoSConejero, Javier / Rana, Omer / Burnap, Peter / Morgan, Jeffrey / Caminero, Blanca / Carrión, Carmen et al. | 2015
- 224
-
Trust, Security and Privacy in Emerging Distributed SystemsAbawajy, Jemal / Wang, Guojun / Yang, Laurence T. / Javadi, Bahman et al. | 2015
- 227
-
The mediator authorization-security model for heterogeneous semantic knowledge basesAlamri, Abdullah / Bertok, Peter / Thom, James A. / Fahad, Adil et al. | 2015
- 238
-
TIRIAC: A trust-driven risk-aware access control framework for Grid environmentsDorri Nogoorani, Sadegh / Jalili, Rasool et al. | 2015
- 255
-
Modeling BitTorrent choking algorithm using game theoryAzzedin, Farag / Yahaya, Mohammed et al. | 2015
- 266
-
Healing on the cloud: Secure cloud architecture for medical wireless sensor networksLounis, Ahmed / Hadjidj, Abdelkrim / Bouabdallah, Abdelmadjid / Challal, Yacine et al. | 2015
- 278
-
A survey of anomaly detection techniques in financial domainAhmed, Mohiuddin / Mahmood, Abdun Naser / Islam, Md. Rafiqul et al. | 2015
- 289
-
ADAMAS: Interweaving unicode and color to enhance CAPTCHA securityRoshanbin, Narges / Miller, James et al. | 2014
- 311
-
An algorithm for efficient privacy-preserving item-based collaborative filteringLi, Dongsheng / Chen, Chao / Lv, Qin / Shang, Li / Zhao, Yingying / Lu, Tun / Gu, Ning et al. | 2014
- 321
-
Dynamic counter-measures for risk-based access control systems: An evolutive approachDíaz-López, Daniel / Dólera-Tormo, Ginés / Gómez-Mármol, Félix / Martínez-Pérez, Gregorio et al. | 2014
- 336
-
Role mining using answer set programmingYe, Wei / Li, Ruixuan / Gu, Xiwu / Li, Yuhua / Wen, Kunmei et al. | 2014
- 344
-
Secure privacy vault design for distributed multimedia surveillance systemRahman, Sk. Md. Mizanur / Hossain, M. Anwar / Hassan, Mohammad Mehedi / Alamri, Atif / Alghamdi, Abdullah / Pathan, Mukaddim et al. | 2014
- 353
-
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertextsWang, Wei / Xu, Peng / Li, Hui / Yang, Laurence Tianruo et al. | 2014
- 362
-
Fast authentication in wireless sensor networksBenzaid, Chafika / Lounis, Karim / Al-Nemrat, Ameer / Badache, Nadjib / Alazab, Mamoun et al. | 2014
- 376
-
Hybrids of support vector machine wrapper and filter based framework for malware detectionHuda, Shamsul / Abawajy, Jemal / Alazab, Mamoun / Abdollalihian, Mali / Islam, Rafiqul / Yearwood, John et al. | 2014
- 391
-
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graphChen, Shuhong / Wang, Guojun / Jia, Weijia et al. | 2014
- 401
-
Economics of computing servicesBañares, José Ángel / Altmann, Jörn / Vanmechelen, Kurt et al. | 2015
- 403
-
Delivering cloud services with QoS requirements: Business opportunities, architectural solutions and energy-saving aspectsQuarati, Alfonso / Clematis, Andrea / D’Agostino, Daniele et al. | 2015
- 428
-
Multi-criteria and satisfaction oriented scheduling for hybrid distributed computing infrastructuresMoca, Mircea / Litan, Cristian / Silaghi, Gheorghe Cosmin / Fedak, Gilles et al. | 2015
- 444
-
Resource management for bursty streams on multi-tenancy cloud environmentsTolosana-Calasanz, Rafael / Bañares, José Ángel / Pham, Congduc / Rana, Omer F. et al. | 2015
- 460
-
Analysis of a trust model for SLA negotiation and enforcement in cloud marketsMacías, Mario / Guitart, Jordi et al. | 2015
- 473
-
Optimising resource costs of cloud computing for educationKoch, Fernando / Assunção, Marcos D. / Cardonha, Carlos / Netto, Marco A.S. et al. | 2015
- 480
-
Estimation and forecasting of ecological efficiency of virtual machinesKatsaros, Gregory / Stichler, Pascal / Subirats, Josep / Guitart, Jordi et al. | 2015
- 495
-
Value creation in software service platformsHaile, Netsanet / Altmann, Jörn et al. | 2015
- 510
-
A novel virtual node approach for interactive visual analytics of big datasets in parallel coordinatesHuang, Mao Lin / Huang, Tze-Haw / Zhang, Xuyun et al. | 2015
- 524
-
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflowsWang, Mingzhong / Zhu, Liehuang / Zhang, Zijian et al. | 2014
- 534
-
Top- followee recommendation over microblogging systems by exploiting diverse information sourcesChen, Hanhua / Cui, Xiaolong / Jin, Hai et al. | 2014
- IFC
-
Editorial Board| 2015
- iii
-
Contents| 2015