نتایج جستجو برای: cloud server

تعداد نتایج: 135509  

Journal: :IJACI 2011
Sean Carlin Kevin Curran

In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently present within the cloud computing industry. ...

Journal: :CoRR 2012
Ala'a Atallah Al-Mughrabi Hussein Owaied

This paper presents a proposed model for database replication model in private cloud availability regions, which is an enhancement of the SQL Server AlwaysOn Layers of Protection Model presents by Microsoft in 2012. The enhancement concentrates in the database replication for private cloud availability regions through the use of primary and secondary servers. The processes of proposed model dur...

2013
M. Divya B. Saranya

The Cloud computing technology has been widely applied in e-business, e-education. Cloud computing platform is a set of Scalable large-scale data server clusters, it provides computing and storage services to customers. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Our research shows that the architecture of c...

Journal: :JIPS 2010
Sung-Jin Baek Sun-Mi Park Su-Hyun Yang Eun-Ha Song Young-Sik Jeong

The core services in cloud computing environment are SaaS (Software as a Service), Paas (Platform as a Service) and IaaS (Infrastructure as a Service). Among these three core services server virtualization belongs to IaaS and is a service technology to reduce the server maintenance expenses. Normally, the primary purpose of sever virtualization is building and maintaining a new well functioning...

2014
Sarah Abughazalah Konstantinos Markantonakis Keith Mayes

Although Radio Frequency IDentification (RFID) systems promise a fruitful future, security and privacy concerns have affected the adoption of the RFID technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s d...

Journal: :Symmetry 2017
Dae-Young Kim Young-Sik Jeong Seokhoon Kim

In the Internet of Things (IoT) networking, numerous objects are connected to a network. They sense events and deliver the sensed information to the cloud. A lot of data is generated in the IoT network, and servers in the cloud gather the sensed data from the objects. Then, the servers analyze the collected data and provide proper intelligent services to users through the results of the analysi...

2010
Arun Kumar

Now a days, the cloud platform plays a very important roles in development environment to implement various applications over servers. The developer should to know the latency to select appropriate server which in turn takes less time and perform the task very quickly. The main objective of this paper is to help the developers to check the latency of Amazon web services (AWS). By knowing the la...

2012
Sanjeet Kumar Nayak Subasish Mohapatra Banshidhar Majhi

In this paper, wehave propose a user authentication scheme for cloud computing. The proposed framework providesmutual authentication and session key agreement in cloud computing environment. The scheme executesin three phases such as server initialization phase, registration phase, authentication phase. Detailed security analyses have been made to validate the efficiency of the scheme. Further,...

Journal: :IJGHPC 2013
Yu-Shiang Lin Chun-Yuan Lin Hsiao-Chieh Chi Yeh-Ching Chung

Multiple sequence alignments with constraints are of priority concern in computational biology. Constrained sequence alignment incorporates the domain knowledge of biologists into sequence alignments such that the user-specified residues/segments are aligned together according to the alignment results. A series of constrained multiple sequence alignment tools have been developed in relevant lit...

Journal: :CoRR 2012
Justin Thaler Mike Roberts Michael Mitzenmacher Hanspeter Pfister

As the cloud computing paradigm has gained prominence, the need for verifiable computation has grown increasingly urgent. Protocols for verifiable computation enable a weak client to outsource difficult computations to a powerful, but untrusted server, in a way that provides the client with a guarantee that the server performed the requested computations correctly. By design, these protocols im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید