GPGPU Computing for Cloud Auditing

Author(s):  
Virginia W. Ross ◽  
Miriam E. Leeser
2014 ◽  
Vol 9 (1) ◽  
pp. 1-8 ◽  
Author(s):  
Bala Dhandayuthapani Veerasamy ◽  
G.M. Nasira
Keyword(s):  

2012 ◽  
Author(s):  
Laura M. Monroe
Keyword(s):  

Author(s):  
Natasha Csicsmann ◽  
Victoria McIntyre ◽  
Patrick Shea ◽  
Syed S. Rizvi

Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.


2020 ◽  
Vol 512 ◽  
pp. 616-628 ◽  
Author(s):  
Yan Xu ◽  
Song Sun ◽  
Jie Cui ◽  
Hong Zhong
Keyword(s):  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 212888-212903
Author(s):  
Xiaodong Yang ◽  
Meiding Wang ◽  
Xiuxiu Wang ◽  
Guilan Chen ◽  
Caifen Wang

2019 ◽  
Vol 139 ◽  
pp. 49-56 ◽  
Author(s):  
Reyhaneh Rabaninejad ◽  
Mahmoud Ahmadian Attari ◽  
Maryam Rajabzadeh Asaar ◽  
Mohammad Reza Aref

2020 ◽  
Vol 106 ◽  
pp. 585-594
Author(s):  
Jindan Zhang ◽  
Baocang Wang ◽  
Xu An Wang ◽  
Han Wang ◽  
Shuai Xiao

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 130866-130877
Author(s):  
Xiaodong Yang ◽  
Meiding Wang ◽  
Ting Li ◽  
Rui Liu ◽  
Caifen Wang

2012 ◽  
Vol 2012.47 (0) ◽  
pp. 230-231
Author(s):  
Naoki Takeishi ◽  
Yohsuke IMAI ◽  
Keita NAKAAKI ◽  
Takuji ISHIKAWA ◽  
Takami YAMAGUCHI

Sign in / Sign up

Export Citation Format

Share Document