Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Neighborhood and community battery projects: A systematic analysis of their current state and future prospects
A Mohanty, AK Ramasamy, R Verayiah… - Journal of Energy …, 2024 - Elsevier
Neighborhood and community battery projects signify a fundamental change in the way
energy is controlled and distributed within local communities. These initiatives are …
energy is controlled and distributed within local communities. These initiatives are …
Cloud services in the guifi. net community network
Internet and communication technologies have lowered the costs to collaborate for
communities, leading to new services like user-generated content and social computing …
communities, leading to new services like user-generated content and social computing …
ARCHISTAR: towards secure and robust cloud based data sharing
T Loruenser, A Happe… - 2015 IEEE 7th International …, 2015 - ieeexplore.ieee.org
Cloud based collaboration gives rise to many new applications and business opportunities
in both the private and the business domain. However, building such systems in a secure …
in both the private and the business domain. However, building such systems in a secure …
Big Data Analytic Platforms
L Di, E Yu - Remote Sensing Big Data, 2023 - Springer
This chapter defines the basic concepts of big data analytic platforms. Big data analytic
platforms can be classified by different criteria. There are a variety of infrastructures for big …
platforms can be classified by different criteria. There are a variety of infrastructures for big …
Snarl: Entangled merkle trees for improved file availability and storage utilization
R Nygaard, V Estrada-Galiñanes… - Proceedings of the 22nd …, 2021 - dl.acm.org
In cryptographic decentralized storage systems, files are split into chunks and distributed
across a network of peers. These storage systems encode files using Merkle trees, a …
across a network of peers. These storage systems encode files using Merkle trees, a …
Beekup: A distributed and safe P2P storage framework for IoE applications
Cloud computing and, in particular, cloud storage, has successfully boosted a variety of
applications, in several domains; with proven acceptance and benefits by end users. While …
applications, in several domains; with proven acceptance and benefits by end users. While …
Leveraging low-power devices for cloud services in community networks
Community networks are IP networks constantly being improved that evolve into large-scale
computing platforms. This has resulted from the effort to adapt the cloud computing model …
computing platforms. This has resulted from the effort to adapt the cloud computing model …
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection
S Krenn, T Lorünser - 2023 - books.google.com
This book provides an introduction to secret sharing, a key technology for practical
applications and higher-level cryptographic protocols. This survey analyzes existing work …
applications and higher-level cryptographic protocols. This survey analyzes existing work …
Conception d'un système de partage de données adapté à un environnement de Fog Computing
B Confais - 2018 - hal.science
L'informatique utilitaire a évolué au fil des années pour aboutir à ce que nous appelons
aujourd'hui le Cloud Computing. Pourtant, ces infrastructures ne sont pas adaptées pour …
aujourd'hui le Cloud Computing. Pourtant, ces infrastructures ne sont pas adaptées pour …