Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,†Future Generation Computer Systems, vol. 25, no. 6, pp. 599–616, 2009. [2] T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance. O‟ReillyMedia, Incorporated, 2009. [3] H.-L. Truong and S. Dustdar, “Composable cost estimation and monitoring for computational applications in cloud computing environments,†Procedia Computer Science, vol. 1, no. 1, pp. 2175 – 2184, 2010, iCCS 2010. [4] E. Deelman, G. Singh, M. Livny, B. Berriman, and J. Good, “The cost of doing science on the cloud: the montage example,†in Proc.2008 ACM/IEEE Conf. Supercomputing, ser. SC ‟08. Piscataway, NJ,USA: IEEE Press, 2008, pp. 50:1–50:12. [5] H. Hacig¨um¨us¸, B. Iyer, and S. Mehrotra, “Providing database as a service,†in Proc. 18th IEEE Int‟l Conf. Data Engineering, Feb. 2002. [6] G. Wang, Q. Liu, and J. Wu, “Hierarchical attributebased encryption for fine-grained access control in cloud storage services,†inProc. 17th ACM Conf. Computer and communications security. ACM,2010, pp. 735–737. [7] H. Hacig¨um¨us¸, B. Iyer, C. Li, and S. Mehrotra, “Executing sql over encrypted data in the databaseservice-provider model,†in Proc.ACM SIGMOD Int‟l Conf. Management of data, June 2002. [8] L. Ferretti, M. Colajanni, and M. Marchetti, “Distributed, concurrent, and independent access to encrypted cloud databases,†IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 2, Feb. 2014. [9] R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: protecting confidentiality with encrypted query processing,†in Proc. 23rd ACM Symp. Operating Systems Principles,Oct. 2011. [10] C. Gentry, “Fully homomorphic encryption using ideal lattices,â€in Proc. 41st ACM Symp. Theory of computing, May 2009. [11] Boldyreva, N. Chenette, and A. O‟Neill, “Orderpreserving encryption revisited: Improved security analysis and alternative solutions,†in Proc. Advances in Cryptology – CRYPTO 2011.Springer, Aug. 2011. [12] P. Paillier, “Public-key cryptosystems based on composite degreeresiduosity classes,†in Proc.
![]() | V2I63.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|