Search
Now showing items 3021-3030 of 3039
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Distributed Framework via Block-chain Smart Contracts for Smart Grid Systems against Cyber-Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this century, the demand for energy is increasing daily, and the need for energy resources has become urgent and inevitable. New ways of generating energy, such as renewable resources that depend on many sources, including ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
Economic study on the production of dimethyl ether using wind-based electrolytic of hydrogen and carbon dioxide
(
American Institute of Physics Inc.
, 2023 , Conference Paper)
The world currently relies heavily on non-renewable energy, which is unable to sustain the needs of 7 billion people in the next 50 years. This paper discusses the use of an alternative fuel, Dimethyl ether (DME), which ...
Application of Artificial Neural Network Approach for the Kinetic Parameters Determination of Pyrolysis Aseptic Waste Packages
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
The thermal degradation behavior for the pyrolysis of aseptic packages was studied using thermogravimetric analyzer under nitrogen atmosphere at the temperature range of 50–900°C with five different heating rates (10, 20, ...
Development of novel blend poly (Ethylene Glycol) / Poly(Ethersulfone) polymeric membrane using N-Methyl-2-Pyrollidone and dimethylformamide solvents for facilitating CO2/N2gas separation
(
Elsevier
, 2020 , Conference Paper)
Carbon dioxide (CO2) emissions have been the main cause for anthropogenic climate change. To meet the growing demand for CO2 removal, membrane separation technology using blend membranes is a promising and attractive ...
Integration of Captivate and JOOMLA: Online demonstration and assessment elearning resources
(
Institute of Electrical and Electronics Engineers Inc. (IEEE)
, 2010 , Conference Paper)
The system uses Adobe Captivate [1] to create and generate the learning and assessments materials in PDF format to allow students to access the learning materials and to do the assessment interactively. Each assessment is ...