Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Jedidiah Yanez‐Sierra"'
Autor:
Mariano Vargas-Santiago, Diana Assaely Leon-Velasco, Christian E. Maldonado-Sifuentes, Jedidiah Yanez-Sierra
Publikováno v:
IEEE Access, Vol 11, Pp 123194-123208 (2023)
In recent times, there has been a growing interest in the domain of computationally challenging problem solving within both scientific and organizational contexts. This study is primarily concerned with the extraction and comprehension of the methodo
Externí odkaz:
https://doaj.org/article/614c5e8cd6844090b25f9e8101a720b3
Publikováno v:
Entropy, Vol 23, Iss 9, p 1216 (2021)
One of the main problems in graph analysis is the correct identification of relevant nodes for spreading processes. Spreaders are crucial for accelerating/hindering information diffusion, increasing product exposure, controlling diseases, rumors, and
Externí odkaz:
https://doaj.org/article/e834571a4f784d5ebda1a5e3e3fa9c93
Publikováno v:
Machine Learning Techniques and Analytics for Cloud Security. :379-415
Publikováno v:
Entropy
Volume 23
Issue 9
Entropy, Vol 23, Iss 1216, p 1216 (2021)
Volume 23
Issue 9
Entropy, Vol 23, Iss 1216, p 1216 (2021)
One of the main problems in graph analysis is the correct identification of relevant nodes for spreading processes. Spreaders are crucial for accelerating/hindering information diffusion, increasing product exposure, controlling diseases, rumors, and
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
Access control policies are mandatory for organizations whose operation involves sharing resources that must be kept private. In this paper, we address the problem of evaluating the accuracy of access control policies distributed in an interaction ne
Autor:
Jedidiah Yanez-Sierra, J.L. Gonzalez-Compean, Victor J. Sosa-Sosa, Jesus Carretero, Arturo Diaz-Perez
Publikováno v:
Journal of Systems and Software. 135:143-156
End-to-end solutions enable users to protect their data, before sending them to the cloud, from confidentiality violations, service outages and vendor lock-in incidents. These solutions however require the integration and orchestration of multiple ap
Publikováno v:
CSCloud
A major concern of users of cloud storage services is the lost of control over security, availability and privacy of their files. That is partially addressed by end-to-end encryption techniques. However, most of the solutions currently available offe
Publikováno v:
2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT).
Data assurance is one of the biggest concerns in adopting Cloud Computing. In Cloud Storage environment organizations outsource the storage and management of their documents for great flexibility and economic savings. However, contracting data storag