Security and reliability in big data
Pages 581 - 582
Abstract
No abstract available.
References
[1]
Hwang G-H, Huang W- S, Peng J-Z, Lin Y-W. Fulfilling mutual nonrepudiation for cloud storage, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.583-559.
[2]
Wang H, Yi X, Bertino E, Sun L. Protecting outsourced data in cloud computing through access management, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.600-615.
[3]
Han C, Li Z, Xie G, Uhlig S, Wu Y, Li L, Ge J, Liu Y. Insights into the issue in IPv6 adoption: a view from the Chinese IPv6 application mix, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.616-630.
[4]
Zhou W, Xu Y, Wang G. Decentralized group key management for hierarchical access control using multilinear forms, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.631-645.
[5]
Liu C, Beaugeard N, Yang C, Zhang X, Chen J. HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.646-660.
[6]
Zhang J, Huang ML. Density approach: a new model for bigdata analysis and visualizaiton, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.661-673.
[7]
MaoY, Zhu P, Wei G, Hassan MM, Hossain MA. A game-based incentive model for service cooperation in VANETs, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.674-687.
[8]
Muhlbauer A, Zelinsky T, Kanhere SS. Platform zero: a step closer to ubiquitous computing, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.688-706.
[9]
Thulasiram RK, Thulasiraman P, Prasain H, Jha GK. Nature-inspired soft computing for financial option pricing using high-performance analytics, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.707-728.
[10]
Zhou W, Han J, Gao Y, Xu Z. An efficient graph data processing system for large-scale SNS applications, Concurrency and Computation: Practice and Experience2016; Volume 28 Issue 3: pp.729-747.
- Security and reliability in big data
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
John Wiley and Sons Ltd.
United Kingdom
Publication History
Published: 10 March 2016
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in