•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Efficient time based scheduler for implementing reservation plan in cloud

Author:
Soosai, Michael Rini
,
Jagdale, B.N.
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/ICMCS.2014.6911264
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/1099788
Keyword(s): authorisation,n cloud computing,n data privacy,n outsourcing,n SSO,n authentication process,n cloud computing,n cloud services,n cloud user,n critical applications,n data misuse,n enterprises,n illegal access,n illegal users,n inflexible access control,n infrastructure outsourcing,n limited monitoring,n malicious activities,n multitenancy nature,n organizations,n privacy problems,n security problems,n security threats-attacks
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Efficient time based scheduler for implementing reservation plan in cloud

Show full item record

contributor authorSoosai, Michael Rini
contributor authorJagdale, B.N.
date accessioned2020-03-12T22:56:23Z
date available2020-03-12T22:56:23Z
date issued2014
identifier other7030871.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1099788?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleEfficient time based scheduler for implementing reservation plan in cloud
typeConference Paper
contenttypeMetadata Only
identifier padid8241562
subject keywordsauthorisation
subject keywordsn cloud computing
subject keywordsn data privacy
subject keywordsn outsourcing
subject keywordsn SSO
subject keywordsn authentication process
subject keywordsn cloud computing
subject keywordsn cloud services
subject keywordsn cloud user
subject keywordsn critical applications
subject keywordsn data misuse
subject keywordsn enterprises
subject keywordsn illegal access
subject keywordsn illegal users
subject keywordsn inflexible access control
subject keywordsn infrastructure outsourcing
subject keywordsn limited monitoring
subject keywordsn malicious activities
subject keywordsn multitenancy nature
subject keywordsn organizations
subject keywordsn privacy problems
subject keywordsn security problems
subject keywordsn security threats-attacks
identifier doi10.1109/ICMCS.2014.6911264
journal titleireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on
filesize924294
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace