Efficient time based scheduler for implementing reservation plan in cloud
Publisher:
Year
: 2014DOI: 10.1109/ICMCS.2014.6911264
Keyword(s): authorisation,n cloud computing,n data privacy,n outsourcing,n SSO,n authentication process,n cloud computing,n cloud services,n cloud user,n critical applications,n data misuse,n enterprises,n illegal access,n illegal users,n inflexible access control,n infrastructure outsourcing,n limited monitoring,n malicious activities,n multitenancy nature,n organizations,n privacy problems,n security problems,n security threats-attacks
Collections
:
-
Statistics
Efficient time based scheduler for implementing reservation plan in cloud
Show full item record
contributor author | Soosai, Michael Rini | |
contributor author | Jagdale, B.N. | |
date accessioned | 2020-03-12T22:56:23Z | |
date available | 2020-03-12T22:56:23Z | |
date issued | 2014 | |
identifier other | 7030871.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1099788?locale-attribute=en | |
format | general | |
language | English | |
publisher | IEEE | |
title | Efficient time based scheduler for implementing reservation plan in cloud | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8241562 | |
subject keywords | authorisation | |
subject keywords | n cloud computing | |
subject keywords | n data privacy | |
subject keywords | n outsourcing | |
subject keywords | n SSO | |
subject keywords | n authentication process | |
subject keywords | n cloud computing | |
subject keywords | n cloud services | |
subject keywords | n cloud user | |
subject keywords | n critical applications | |
subject keywords | n data misuse | |
subject keywords | n enterprises | |
subject keywords | n illegal access | |
subject keywords | n illegal users | |
subject keywords | n inflexible access control | |
subject keywords | n infrastructure outsourcing | |
subject keywords | n limited monitoring | |
subject keywords | n malicious activities | |
subject keywords | n multitenancy nature | |
subject keywords | n organizations | |
subject keywords | n privacy problems | |
subject keywords | n security problems | |
subject keywords | n security threats-attacks | |
identifier doi | 10.1109/ICMCS.2014.6911264 | |
journal title | ireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on | |
filesize | 924294 | |
citations | 0 |