Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 10 Treffer
- virtual machine 7 Treffer
- virtualization 7 Treffer
- access control 5 Treffer
- data security 5 Treffer
-
45 weitere Werte:
- sla 5 Treffer
- rsa 4 Treffer
- saas 4 Treffer
- anomaly detection 3 Treffer
- authentication 3 Treffer
- auto-scaling 3 Treffer
- cryptography 3 Treffer
- ddos 3 Treffer
- encryption 3 Treffer
- homomorphic encryption 3 Treffer
- intrusion detection 3 Treffer
- load balancing 3 Treffer
- resource allocation 3 Treffer
- service composition 3 Treffer
- anonymity 2 Treffer
- availability 2 Treffer
- cloud service 2 Treffer
- cloud service provider 2 Treffer
- data storage auditing 2 Treffer
- flash crowd 2 Treffer
- hadoop 2 Treffer
- multi-tenancy 2 Treffer
- multi-tenant 2 Treffer
- ontology 2 Treffer
- privacy 2 Treffer
- provable data possession 2 Treffer
- proxy re-encryption 2 Treffer
- qos 2 Treffer
- searchable encryption 2 Treffer
- storage 2 Treffer
- task scheduling 2 Treffer
- trust 2 Treffer
- trust model 2 Treffer
- 클라우드 컴퓨팅 2 Treffer
- abe 1 Treffer
- aco 1 Treffer
- adoption 1 Treffer
- aes 1 Treffer
- ahp 1 Treffer
- ahp. 1 Treffer
- als 1 Treffer
- apis 1 Treffer
- architecture 1 Treffer
- attribute-based encryption 1 Treffer
- b+ tree 1 Treffer
Verlag
Publikation
- international journal of security and its applications 53 Treffer
- international journal of software engineering and its applications 26 Treffer
- international journal of hybrid information technology 25 Treffer
- international journal of grid and distributed computing 7 Treffer
- 정보화연구 6 Treffer
- 6 weitere Werte:
Inhaltsanbieter
128 Treffer
-
In: 한국차세대컴퓨팅학회 학술대회, 2022-10-06, S. 179-182academicJournalZugriff:
-
In: 정보화연구, Jg. 17 (2020-04-30), Heft 1, S. 1-14academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 173-186academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-03-30), Heft 3, S. 173-190academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-02-28), Heft 2, S. 17-22academicJournalZugriff:
-
In: International Journal of Future Generation Communication and Networking, Jg. 8 (2015-10-30), Heft 5, S. 177-188academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 8 (2015-08-30), Heft 4, S. 171-178academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 17-36academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-06-30), Heft 6, S. 145-152academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 8 (2015-04-30), Heft 2, S. 177-190academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-03-30), Heft 3, S. 177-184academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 7 (2014-08-30), Heft 4, S. 177-186academicJournalZugriff:
-
MultiGranular : An effective Service Composition Infrastructure for Multi-tenant Service CompositionIn: International Journal of Multimedia and Ubiquitous Engineering, Jg. 9 (2014-06-30), Heft 6, S. 171-182academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 7 (2014-06-30), Heft 3, S. 177-188academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 171-194academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 2 (2009-12-30), Heft 4, S. 17-26academicJournalZugriff:
-
In: 정보화연구, Jg. 16 (2019-06-30), Heft 2, S. 111-120academicJournalZugriff:
-
Study on the Continuance Use of Software-as-a-Service Cloud System : The Role of Technology MaturityIn: 정보화연구, Jg. 16 (2019-06-30), Heft 2, S. 121-135academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 14 (2017-06-30), Heft 3, S. 231-238academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 335-346academicJournalZugriff: