nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Aggregating privatized medical data for secure querying applications
|
Singh, Kalpana |
|
2017 |
72 |
C |
p. 250-263 |
artikel |
2 |
A hybrid index for temporal big data
|
Wang, Mei |
|
2017 |
72 |
C |
p. 264-272 |
artikel |
3 |
A hybrid knowledge-based recommender system for e-learning based on ontology and sequential pattern mining
|
Tarus, John K. |
|
2017 |
72 |
C |
p. 37-48 |
artikel |
4 |
A multi-user searchable encryption scheme with keyword authorization in a cloud storage
|
Deng, Zuojie |
|
2017 |
72 |
C |
p. 208-218 |
artikel |
5 |
Anonymizing popularity in online social networks with full utility
|
Zhang, Shiwen |
|
2017 |
72 |
C |
p. 227-238 |
artikel |
6 |
A novel approach to manage cloud security SLA incidents
|
Trapero, Ruben |
|
2017 |
72 |
C |
p. 193-205 |
artikel |
7 |
A privacy preserving framework for RFID based healthcare systems
|
Rahman, Farzana |
|
2017 |
72 |
C |
p. 339-352 |
artikel |
8 |
A runtime estimation framework for ALICE
|
Pumma, Sarunya |
|
2017 |
72 |
C |
p. 65-77 |
artikel |
9 |
A scalable parallel algorithm for atmospheric general circulation models on a multi-core cluster
|
Wang, Yuzhu |
|
2017 |
72 |
C |
p. 1-10 |
artikel |
10 |
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
|
Sookhak, Mehdi |
|
2017 |
72 |
C |
p. 273-287 |
artikel |
11 |
Contents
|
|
|
2017 |
72 |
C |
p. iii-iv |
artikel |
12 |
CORE framework for evaluating the reliability of SaaS products
|
Vidhyalakshmi, R. |
|
2017 |
72 |
C |
p. 23-36 |
artikel |
13 |
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography
|
Mai, Vu |
|
2017 |
72 |
C |
p. 327-338 |
artikel |
14 |
Editorial Board
|
|
|
2017 |
72 |
C |
p. IFC |
artikel |
15 |
Efficient network isolation and load balancing in multi-tenant HPC clusters
|
Zahid, Feroz |
|
2017 |
72 |
C |
p. 145-162 |
artikel |
16 |
Investigating the deceptive information in Twitter spam
|
Chen, Chao |
|
2017 |
72 |
C |
p. 319-326 |
artikel |
17 |
Lark: An effective approach for software-defined networking in high throughput computing clusters
|
Zhang, Zhe |
|
2017 |
72 |
C |
p. 105-117 |
artikel |
18 |
Leading-edge research in cluster, cloud, and grid computing: Best papers from the IEEE/ACM CCGrid 2015 conference
|
Katz, Daniel S. |
|
2017 |
72 |
C |
p. 78-80 |
artikel |
19 |
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments
|
Bassem, Christine |
|
2017 |
72 |
C |
p. 129-144 |
artikel |
20 |
Output-oriented power saving mode for mobile devices
|
Joe, Hyunwoo |
|
2017 |
72 |
C |
p. 49-64 |
artikel |
21 |
Predicting provisioning and booting times in a Metal-as-a-service system
|
Sîrbu, Alexandru |
|
2017 |
72 |
C |
p. 180-192 |
artikel |
22 |
Preface: Security and privacy in big data clouds
|
Liu, Qin |
|
2017 |
72 |
C |
p. 206-207 |
artikel |
23 |
Privacy-preserving trust management for unwanted traffic control
|
Zhang, Lifang |
|
2017 |
72 |
C |
p. 305-318 |
artikel |
24 |
Reprint of “Robust partial-load experiments with Showstopper”
|
Podzimek, Andrej |
|
2017 |
72 |
C |
p. 81-104 |
artikel |
25 |
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
|
Huang, Qinlong |
|
2017 |
72 |
C |
p. 239-249 |
artikel |
26 |
Self-managing cloud-native applications: Design, implementation, and experience
|
Toffetti, Giovanni |
|
2017 |
72 |
C |
p. 165-179 |
artikel |
27 |
Topics in cloud incident management
|
Fortiş, Teodor-Florin |
|
2017 |
72 |
C |
p. 163-164 |
artikel |
28 |
Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams
|
Soltani Panah, Arezou |
|
2017 |
72 |
C |
p. 288-304 |
artikel |
29 |
Traffic-sensitive Live Migration of Virtual Machines
|
Deshpande, Umesh |
|
2017 |
72 |
C |
p. 118-128 |
artikel |
30 |
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code
|
Hu, Guangwu |
|
2017 |
72 |
C |
p. 219-226 |
artikel |
31 |
Why good data analysts need to be critical synthesists. Determining the role of semantics in data analysis
|
Scheider, Simon |
|
2017 |
72 |
C |
p. 11-22 |
artikel |