Academic literature on the topic 'Secure computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure computing"

1

Ogiela, Marek R., Ilsun You, Fang-Yie Leu, and Yu-Chee Tseng. "Secure ubiquitous computing." Pervasive and Mobile Computing 24 (December 2015): 1–3. http://dx.doi.org/10.1016/j.pmcj.2015.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schiller, Jeffrey I. "Secure Distributed Computing." Scientific American 271, no. 5 (1994): 72–76. http://dx.doi.org/10.1038/scientificamerican1194-72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

HAMLEN, KEVIN W., and BHAVANI THURAISINGHAM. "SECURE SEMANTIC COMPUTING." International Journal of Semantic Computing 05, no. 02 (2011): 121–31. http://dx.doi.org/10.1142/s1793351x11001201.

Full text
Abstract:
This paper explores the integration of semantic computing technologies with security technologies. Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and programming language-based approaches to mobile code certification and data confidentiality enforcement are discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Miguel, Rodel Felipe, Sivaraman Sundaram, and K. M. M. Aung. "Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing." Journal of Computers 11, no. 3 (2016): 189–94. http://dx.doi.org/10.17706/jcp.11.3.189-194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Simranjeet. "Enhancing the Techniques to Secure Grid Computing." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (2017): 460–63. http://dx.doi.org/10.31142/ijtsrd2531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

R, Yogesh Rajkumar, and Kaliyamurthie K.P. "Secure Cloud Data Computing Using Different Algorithms." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 111–16. http://dx.doi.org/10.5373/jardcs/v11i12/20193219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Munir, Kashif, and Sellapan Palaniappan. "Framework for Secure Cloud Computing." International Journal on Cloud Computing: Services and Architecture 3, no. 2 (2013): 21–35. http://dx.doi.org/10.5121/ijccsa.2013.3202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Szweda, Roy. "Secure Computing unveils NT firewall." Network Security 1997, no. 8 (1997): 7. http://dx.doi.org/10.1016/s1353-4858(97)83237-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lombardi, Flavio, and Roberto Di Pietro. "Secure virtualization for cloud computing." Journal of Network and Computer Applications 34, no. 4 (2011): 1113–22. http://dx.doi.org/10.1016/j.jnca.2010.06.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Ping, and Bruce Christianson. "Is your computing environment secure?" ACM SIGOPS Operating Systems Review 29, no. 4 (1995): 87–96. http://dx.doi.org/10.1145/219282.219300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure computing"

1

Wouters, Erik Henricus. "Secure Intermittent Computing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254588.

Full text
Abstract:
Low-power embedded systems exist in many forms. Using batteries for these devices generally imposes high maintenance costs and there are many applications where a grid connection is not feasible [1]. A solution for powering this class of embedded systems is energy harvesting. This can mean the use of energy from ambient RF-signals to power the device, or another form of ambient energy [2].These batteryless devices are generally unable to harvest enough power for continuous operation and therefore employ some sort of checkpointing mechanism to copy (parts of) the main memory to non-volatile sto
APA, Harvard, Vancouver, ISO, and other styles
2

Paladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing." Thesis, Security Lab, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.

Full text
Abstract:
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider an
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Changqing. "Towards Secure Big Data Computing." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1529929603348119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Szefer, Jakub M. "Architectures for secure cloud computing servers." Thesis, Princeton University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3597568.

Full text
Abstract:
<p> Cloud computing, enabled by virtualization technologies, has become an important computing paradigm. However, by choosing the cloud computing model the customers give up control, e.g. over the system software, of servers where their code executes and where their data is stored. In this dissertation, we propose to leverage server hardware to provide protections for the code and data inside a customer's virtual machines on the remote cloud servers. In particular, this dissertation explores a threat that has not been addressed by researchers before -- that of the virtualization (system) sof
APA, Harvard, Vancouver, ISO, and other styles
5

NATH, PANDEY ARUNENDRA. "Secure IDMS for Cloud Computing Environment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121175.

Full text
Abstract:
Current practices includes the integration of IDMS system and OpenStack for easy, better, balanced provisioning, identity management and user management for different types of users in order to securely access the service on cloud platform. These solutions will provide the basic building block structure which provides the motivation to enterprises to come in, out, around the cloud services. Based the research artifacts, design challenges and some current constraints, we have built these cure IDMS for cloud environment under architecture of “CryptoNET™ Security Providers”. Secure IDMS is design
APA, Harvard, Vancouver, ISO, and other styles
6

Suslowicz, Charles Eugene. "Secure Intermittent Computing: Precomputation and Implementation." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83376.

Full text
Abstract:
This thesis explores the security of intermittent devices, embedded systems designed to retain their state across periods of power loss, for cases both when the device has an excess of available energy and when power loss is unavoidable. Existing work with intermittent systems has focused on the problems inherent to the intermittent paradigm and ignored the security implications of persistent state across periods of power loss. The security of these devices is closely linked to their unique operational characteristics and are addressed here in two studies. First, the presence of an energy harv
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.

Full text
Abstract:
Cloud computing which provides computation and storage resources in a pay-per-usage manner has emerged as the most popular computation model nowadays. Under the new paradigm, users are able to request computation resources dynamically in real-time to accommodate their workload requirements. The flexible resource allocation feature endows cloud computing services with the capability to offer affordable and efficient computation services. However, moving data and applications into the cloud exposes a privacy leakage risk of the user data. As the growing awareness of data privacy, more and more u
APA, Harvard, Vancouver, ISO, and other styles
8

Kopal, Nils [Verfasser]. "Secure Volunteer Computing for Distributed Cryptanalysis / Nils Kopal." Kassel : Kassel University Press, 2018. http://d-nb.info/1150305061/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.

Full text
Abstract:
"The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. It is a clear trend that cloud data outsourcing is becoming a pervasive service. Along with the widespread enthusiasm on cloud computing, however, concerns on data security with cl
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Godwin Dogara Ayenajeh. "A framework for secure mobile computing in healthcare." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/618.

Full text
Abstract:
Mobile computing is rapidly becoming part of healthcare’s electronic landscape, helping to provide better quality of care and reduced cost. While the technology provides numerous advantages to the healthcare industry, it is not without risk. The size and portable nature of mobile computing devices present a highly vulnerable environment, which threaten the privacy and security of health information. Since these devices continually access possibly sensitive healthcare information, it is imperative that these devices are considered for security in order to meet regulatory compliance. In fact, th
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secure computing"

1

Jajodia, Sushil, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang, eds. Secure Cloud Computing. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9278-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Mohiuddin, and Paul Haskell-Dowland. Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. Ethical and Secure Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Summers, Rita C. Secure computing: Threats and safeguards. McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chang, Chip-Hong, and Miodrag Potkonjak, eds. Secure System Design and Trustable Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-14971-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Case studies in secure computing: Achievements and trends. CRC Press/Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Acharjya, D. P., and B. K. Tripathy. Advances in secure computing, internet services, and applications. Information Science Reference, an imprint of IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Park, James J., Javier Lopez, Sang-Soo Yeo, Taeshik Shon, and David Taniar, eds. Secure and Trust Computing, Data Management and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22339-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Changhoon, Jean-Marc Seigneur, James J. Park, and Roland R. Wagner, eds. Secure and Trust Computing, Data Management, and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22365-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weber, Stefan G. Multilaterally secure pervasive cooperation: Privacy protection, accountability and secure communication for the age of pervasive computing. IOS Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secure computing"

1

Halang, Wolfgang A., Maytiyanin Komkhao, and Sunantha Sodsee. "Secure Cloud Computing." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06538-0_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Varadharajan, Vijay. "Secure Networked Computing." In Information Assurance in Computer Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Agrawal, Dharma P., Hongmei Deng, Rajani Poosarla, and Sugata Sanyal. "Secure Mobile Computing." In Distributed Computing - IWDC 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-24604-6_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eken, Mehmet Ali, and Pelin Angin. "Vehicular Edge Computing Security." In Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Szefer, Jakub, and Ruby B. Lee. "Hardware-Enhanced Security for Cloud Computing." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hasan, A. B. M. Mehedi, Md Shamsur Rahim, Sabbir Ahmed, and Andrew Levula. "Usage of Blockchain for Edge Computing." In Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Glance, David G., and Rachel Cardell-Oliver. "Privacy of Edge Computing and IoT." In Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kontaxis, Georgios, Michalis Polychronakis, and Angelos D. Keromytis. "Computational Decoys for Cloud Security." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhou, Wenchao. "Towards a Data-Centric Approach to Attribution in the Cloud." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Dinghao, Peng Liu, Qiang Zeng, and Donghai Tian. "Software Cruising: A New Technology for Building Concurrent Software Monitor." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure computing"

1

Tyagi, Himanshu, Prakash Narayan, and Piyush Gupta. "Secure computing." In 2010 IEEE International Symposium on Information Theory - ISIT. IEEE, 2010. http://dx.doi.org/10.1109/isit.2010.5513720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yamaguchi, Hiroshi, Ryo Fujita, and Shigeo Tsujii. "Secure Semantic Computing." In 2016 IEEE Second International Conference on Multimedia Big Data (BigMM). IEEE, 2016. http://dx.doi.org/10.1109/bigmm.2016.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bose, Pradip. "Energy-secure computing." In the 2012 ACM/IEEE international symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2333660.2333662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Madden, Greg, and John B. Tyndall. "Unrestricted Secure Computing." In the 2014 ACM SIGUCCS Annual Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2661172.2661190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mukherjee, Kuntal, and G. Sahoo. "A Secure Cloud Computing." In 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010). IEEE, 2010. http://dx.doi.org/10.1109/itc.2010.95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Witten, Brian. "Engineering Sufficiently Secure Computing." In 2006 22nd Annual Computer Security Applications Conference (ACSAC'06). IEEE, 2006. http://dx.doi.org/10.1109/acsac.2006.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Data, Deepesh, and Vinod M. Prabhakaran. "On coding for secure computing." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tyagi, Himanshu, and Shun Watanabe. "Impossibility bounds for secure computing." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Narayan, Prakash, Himanshu Tyagi, and Shun Watanabe. "Common randomness for secure computing." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhao, Ruimin, Jin Wang, Kejie Lu, et al. "Weakly Secure Coded Distributed Computing." In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2018. http://dx.doi.org/10.1109/smartworld.2018.00124.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure computing"

1

Parashar, Manish. Secure, Robust and Flexible Computing Platform. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada555208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hadley, Mark D., and Samuel L. Clements. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder). Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/989452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aderholdt, Ferrol, Blake A. Caldwell, Susan Elaine Hicks, et al. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1341562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Silverberg, Alice. Making Computing on Encrypted Data Secure and Practical. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada586876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanushevsky, A. Peer-to-Peer Computing for Secure High Performance Data Cop. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/826702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hanushevsky, Andrew B. Peer-to-Peer Computing for Secure High Performance Data Copying. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/799054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Hsien-Hsin S. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1068692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Froscher, J. N., M. Kang, J. McDermott, O. Costich, and C. E. Landwehr. A Practical Approach to High Assurance Multilevel Secure Computing Service. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada465588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Allende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
10

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Full text
Abstract:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&amp;D), academies of science, ministries of science and technology, policies, rec
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!