[PDF][PDF] Quantitative Assessment of Cloud Security Level Agreements

J Luna, H Ghani, T Vateva, N Suri - 2012 - scitepress.org
The users of Cloud Service Providers (CSP) often motivate their choice of providers based
on criteria such as the offered service level agreements (SLA) and costs, and also recently …

[PDF][PDF] A NOVEL APPROACH FOR SECURE DATA STORAGE IN DESKTOP DATA GRID

DRG VASANTH, D VISHWANATH… - The Technology World … - researchgate.net
Volunteer Computing is becoming a new paradigm because of the enormous storage
potential that may be achieved at a low cost. However, the Data Grid” depends on a set of …

Modelling social networks as authorised domains with decay

N Sheppard, R Safavi-Naini - 2008 - ro.uow.edu.au
Sharing multimedia among friends and acquaintances is a common practice that, in
appropriate settings, need not be detrimental to the interests of copyright owners. In this …

[引用][C] An architectural model for trusted domains in web services

V Casola, L Coppolino, M Rak - Journal of Information …, 2006 - iris.unicampania.it
An Architectural model for Trusted Domains in Web Services IRIS IRIS Home Sfoglia
Macrotipologie & tipologie Autore Titolo Riviste Serie IT Italiano Italiano English English …

[引用][C] Pervasive computing oriented interval-valued fuzzy access control

W Xiaoming+ - Journal of Frontiers of Computer Science & Technology, 2010

[引用][C] A policy-based methodology for the analysis, modelling and designing of security infrastructures

V Casola - 2004 - Ph. D. Thesis, University of Napels …