Processing Data in Cloud Environments without the Need for Decryption
Distributed computing is a widely utilized approach for rapidly enhancing an organization’s information technology capabilities while minimizing additional resource requirements. It can efficiently and effectively broaden an organization’s existing IT competencies. In recent years, distributed comp...
| Main Authors: | Jaber, Aws Naser, Mazlina, Abdul Majid, Kamal Z., Zamli, Mohamad Fadli, Zolkipli |
|---|---|
| Format: | Article |
| Language: | English |
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/7312/ http://umpir.ump.edu.my/id/eprint/7312/1/ICIT_2015_%282%29.pdf |
Similar Items
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al.
by: Jaber, Aws Naser, et al.
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Big Data Analysis and Storage
by: Khalid Adam, Ismail Hammad, et al.
Published: (2015)
by: Khalid Adam, Ismail Hammad, et al.
Published: (2015)
A Conceptual Model Using The Elliptic Curve Diffie–Hellman With An Artificial Neural Network Over Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Present Status and Challenges in Cloud Monitoring Framework: A Survey
by: Jaber, Aws Naser, et al.
Published: (2016)
by: Jaber, Aws Naser, et al.
Published: (2016)
Influence of Sample Preparation and Extraction Time on Chemical Composition of Steam Distillation Derived Patchouli Oil
by: Asdarina, Yahya, et al.
Published: (2013)
by: Asdarina, Yahya, et al.
Published: (2013)
Dusun Eco 1
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Dusun Eco 2
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
dusun eco 3
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Dusun Eco 4
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Dusun Eco 5
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Gambar Audit 5S
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
RFID 3 Trial - Book Conveyor
by: Amelia, Hasan
by: Amelia, Hasan
Gambar Perabot Perpustakaan UTEM
by: Library, UMP
Published: (2010)
by: Library, UMP
Published: (2010)
Book Conveyor Testing Document
by: Amelia, Hasan
by: Amelia, Hasan
Detail design of waste plastic bottles rescue boat
by: Law, Xue Ni
Published: (2012)
by: Law, Xue Ni
Published: (2012)
RFID Conveyor (check 1st trial)
by: Amelia, Hasan
Published: (2014)
by: Amelia, Hasan
Published: (2014)
RFID Conveyor (check 2nd trial).
by: Amelia, Hasan
Published: (2014)
by: Amelia, Hasan
Published: (2014)
RFID Conveyor (Check Bin)
by: Amelia, Hasan
Published: (2014)
by: Amelia, Hasan
Published: (2014)
RFID Conveyor (Check pada Virtua)
by: Amelia, Hasan
by: Amelia, Hasan
A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer
by: Alsewari, Abdul Rahman Ahmed, et al.
Published: (2019)
by: Alsewari, Abdul Rahman Ahmed, et al.
Published: (2019)
Intermetallic Growth and Shear Strength of SAC305/EN-Boron
by: Hardinnawirda, Kahar, et al.
Published: (2016)
by: Hardinnawirda, Kahar, et al.
Published: (2016)
A Review: Lead Free Solder and Its Wettability Properties
by: Ervina Efzan, Ervina Efzan, et al.
Published: (2016)
by: Ervina Efzan, Ervina Efzan, et al.
Published: (2016)
Di Sebalik Penubuhan Eyes of UMP
by: Pejabat, Naib Canselor UMP
Published: (2014)
by: Pejabat, Naib Canselor UMP
Published: (2014)
Strategi Lautan Biru UMP Bersama ECERDC Dalam Membangunkan Masyarakat Luar Bandar
by: Zainal, Bahari
Published: (2014)
by: Zainal, Bahari
Published: (2014)
Zikir Terapi Ajaib Ubat Kegersangan Hati
by: Shahrul Nizam, Md. Ahir
Published: (2014)
by: Shahrul Nizam, Md. Ahir
Published: (2014)
Bakat Kepimpinan Bentuk Pasukan Berprestasi Tinggi
by: Mohd Raizalhilmy, Mohd Rais
Published: (2014)
by: Mohd Raizalhilmy, Mohd Rais
Published: (2014)
Similar Items
-
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al. -
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015) -
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013) -
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)