Search
Now showing items 61-70 of 95
A hierarchical, autonomous, and forecasting cloud IDS
(
IEEE
, 2013 , Conference Paper)
Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ...
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
(
IEEE
, 2013 , Conference Paper)
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ...
A distributed control approach for autonomic performance management in cloud computing environment
(
IEEE Computer Society
, 2013 , Conference Paper)
In this paper, a distributed control based performance management approach is developed for a general class of web services deployed in a cloud computing environment. This approach is developed using interaction balance ...
Preference-based semantic matching of web service security policies
(
IEEE
, 2013 , Conference Paper)
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
Addressing security compatibility for multi-tenant cloud services
(
Inderscience Publishers
, 2013 , Article)
This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ...
A model-based approach to self-protection in computing system
(
Association for Computing Machinery, Inc
, 2013 , Conference Paper)
This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
Towards model-based management of database fragmentation
(
USENIX Association
, 2013 , Conference Paper)
The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ...
Bringing Relevance to Computing Courses through History
(
Springer Berlin Heidelberg
, 2013 , Book chapter)
This paper shows ways in which computing history can make the delivery of teaching computing courses relevant. The authors’ approach involves using computing history as a recurring theme throughout courses by adapting ...
A FCM and SURF based algorithm for segmentation of multispectral face images
(
IEEE
, 2013 , Conference Paper)
In this paper, we propose a novel clustering algorithm based on Fuzzy C-Means (FCM) and Speeded-Up Robust Feature (SURF) for multispectral image segmentation. In the experiments, color images and multispectral images from ...