Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Shirin Dabbaghi"'
Publikováno v:
IEEE Access, Vol 11, Pp 61660-61679 (2023)
Access control management in a heterogeneous cloud environment, where the number of users is growing, is a daunting task for service providers. Efficiency is heavily reliant on shared resources in a modern cloud computing culture. Although data or se
Externí odkaz:
https://doaj.org/article/47bec5f39a924cd788c6efe05d005427
FEVEROUS is a benchmark and research initiative focused on fact extraction and verification tasks involving unstructured text and structured tabular data. In FEVEROUS, existing works often rely on extensive preprocessing and utilize rule-based transf
Externí odkaz:
http://arxiv.org/abs/2403.17361
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
COINS
User identity linkage (UIL) refers to linking users’ assets and identities across social networks. With the rapid growth of social media in our day-to-day life, UIL’s importance has gone beyond being just a research topic, and it has become a nec
Publikováno v:
FiCloud
User management systems face several security issues in access control while dealing with different user account types. Providing distinct users with required access rights demands more control and supervision. The majority of the proposed works focu
Publikováno v:
FiCloud
Because of its irreplaceable facilities, Cloud computing is a widely-accepted technology in both industry and academy. On-demand services, flexible provisioning, a broad range of functionalities are some of the advantages of this trend. Being able to
Autor:
Shirin Dabbaghi Varnosfaderani, Faraz Fatemi Moghaddam, Philipp Wieder, Tayyebe Emadinia, Ramin Yahyapour
Publikováno v:
FiCloud
Cloud computing is getting universally in production and hence, comprising more valuable information resources. Therefore, providing a secure infrastructure to exchange information is more vital and inevitable. Attackers are looking for a way to pene
Publikováno v:
CSCloud/EdgeCom
Generally, methods of authentication and identification utilized in asserting users' credentials directly affect security of offered services. In a federated environment, service owners must trust external credentials and make access control decision
Autor:
Soroush Mobedi, Reza Khaleghparast, Shirin Dabbaghi Varnosfaderani, Iman Ghavam, Faraz Fatemi Moghaddam
Publikováno v:
2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE).
Cloud computing is a new paradigm and emerged technology for hosting and delivering resources over a network such as internet by using concepts of virtualization, processing power and storage. However, many challenging issues are still unclear in clo
Autor:
Sohrab Rouzbeh, Sagheb Kohpayeh Araghi, Faraz Fatemi Moghaddam, Shiva Gerayeli Moghaddam, Nima Morad Alibeigi, Shirin Dabbaghi Varnosfaderani
Publikováno v:
2014 IEEE REGION 10 SYMPOSIUM.
Cloud computing is an emerging technology that is still unclear to many security problems and user authentication, access control, and ensuring the security of stored data in cloud servers are the most challenging issues in cloud-based environment. A