• Aucun résultat trouvé

18 résultats avec le mot-clé: 'trust based defensive system model for cloud computing'

A Trust-Based Defensive System Model for Cloud Computing

The system flow can be divided into the following steps: 1) When a user login to the cloud, the cloud’s certification and authorization module queries Trust Management center to

Protected

N/A

13
0
0
2021
One form per New Event / USM SPECIFY THE TYPE OF NOTIFICATION:

1123-46 of the French Public Health Code: Any new data that may lead to a re- assessment of the benefit/risk ratio of the clinical trial or the investigational medicinal product

Protected

N/A

6
0
0
2022
Security and Trust in Mobile Cloud Computing

To enhance the security level, we used fuzzy logic combining with ant colony system to assess the trust and reputation for securing another mobile cloud computing model based on

Protected

N/A

225
0
0
2021
Characterization of an optimized model manufactured by rapid prototyping

We present a case study to apply our search results to a specific model. We have chosen to optimize an insert for plastic injection mould. One of the issues that we are

Protected

N/A

7
0
0
2021
OCCIware - A Formal and Tooled Framework for Managing Everything as a Service

Lever- aging the Open Cloud Computing Interface (OCCI) and its core model, the OCCIware toolchain applies a model-driven engineering approach based on a formal model of cloud

Protected

N/A

10
0
0
2021
OCCIware - A Formal and Tooled Framework for Managing Everything as a Service

Lever- aging the Open Cloud Computing Interface (OCCI) and its core model, the OCCIware toolchain applies a model-driven engineering approach based on a formal model of cloud

Protected

N/A

9
0
0
2022
PDF

Lever- aging the Open Cloud Computing Interface (OCCI) and its core model, the OCCIware toolchain applies a model-driven engineering approach based on a formal model of cloud

Protected

N/A

67
0
0
2022
Quality of service and privacy in internet of things dedicated to healthcare

The architecture is popularized as integrated Cloud-Fog based architecture in the case that the IoT architecture is jointly fog-computing and cloud-computing based. Cloud-Fog

Protected

N/A

149
0
0
2021
Estimation de l'ordre d'une chaîne de Markov cachée à émissions de la famille exponentielle

Nous nous int´eressons `a deux tels estimateurs pour k : Finesso (1991) et Kieffer (1993) proposent un estimateur de maximum de vraisemblance p´enalis´e, alors que Liu et Narayan

Protected

N/A

6
0
0
2021
Applying Digital Rights Management to Corporate Information Systems

Moreover, Cloud Computing based implementation provide a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

Protected

N/A

311
0
0
2021
Utilisation du BDE pour la maintenance des fichiers DBF de l'application TopoCad:

GEOREF_A = champ de 30 caractères qui renferme une valeur flottante au format ASCII GEOREF_B = champ de 30 caractères qui renferme une valeur flottante au format ASCII GEOREF_C =

Protected

N/A

6
0
0
2022
Are Spaces of Digital Fabrication and Experimentation Third Places? An Analysis of the Case of Fab labs in Rennes and Toulouse

Cependant, ces travaux laissent précisément dans l’ombre la nature et les formes de certaines de ces intersections ou hybridation d’Internet avec le territoire : aux lieux

Protected

N/A

22
0
0
2021
Regards croisés sur la régulation du processus éducatif en EPS

Comité scientifique : Dominique Guy Brassart (Université d’Artois), Jean Bréhon (Université d’Artois), Ghislain Carlier (Université Catholique de Louvain), Olivier Chovaux

Protected

N/A

2
0
0
2022
Cloud Computing-Based Message Dissemination Protocol for Vehicular Ad Hoc Networks

In this study, we have proposed a new message dissemination protocol for ve- hicular ad-hoc networks based on cloud computing infrastructure, called Cloud computing-based

Protected

N/A

15
0
0
2021
Comparative Analysis of Cloud and Grid Computing Paradigms

This paper strives to compare and contrast Cloud Computing with Grid Computing from various angles (architecture, security model, business model, programming

Protected

N/A

24
0
0
2022
ANALYSE DU COMPLEXE DE CHLORURE D'HEXAAMMINE NICKEL II [N i (NH

Peser très précisément environ 120 mg du complexe (pilulier à votre dispo- sition), les dissoudre dans 15 mL d'acide chlorhydrique 0,1 M et rajouter si besoin quelques gouttes

Protected

N/A

2
0
0
2022
Frictions and friendships

As part of a larger research project, set up by the RKD – Netherlands Institute for Art History, the exhibition generated so much response that ESNA, in collaboration with the RKD

Protected

N/A

2
0
0
2022
[ Brevet des collèges Amérique du Nord juin 2009 \ L’utilisation d’une calculatrice est autorisée. A

Pour quelle valeur de x, l’aire du rec- tangle ABCD est-elle égale à l’aire du triangle DCF..

Protected

N/A

4
0
0
2022

Télécharger plus de documents et télécharger des études de documentation immédiatement !