University College of Dublin

Displaying 1-5 of 5 results

  • White Papers // May 2013

    Optimization of Cost in Cloud Computing Using OCRP Algorithm

    In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. Reservation plan is cheaper than that provisioned by on-demand plan, since cloud consumer has to pay to provider in advance. By using reservation plan, the consumer can reduce the total...

    Provided By University College of Dublin

  • White Papers // Mar 2013

    Protection of Data from Cipher-Text Only Attack Using Key Based Interval Splitting

    Modifications of Arithmetic Coding (AC) is to improve the security in two methods are: RAC (Randomized Arithmetic Coding) and KSAC (AC with Key-based interval Splitting). For the security, encryption uses AC that is based on the inability of the opponent to distinguish between the encryption of one plaintext from the...

    Provided By University College of Dublin

  • White Papers // Aug 2012

    A Metadata Verification Scheme for Data Auditing in Cloud Environment

    Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is...

    Provided By University College of Dublin

  • White Papers // Jun 2012

    Crypto System Based Authentication Using CSTA in Grid

    Grid computing, as a distributed computing model, stands for the new kind of systems that pools heterogeneous computational resources, such as computers, storage space, sensors, application software, and experiment data. When a user wants to request some computing and data resources, the grid can seamlessly, transparently and dynamically supply them....

    Provided By University College of Dublin

  • White Papers // Jun 2008

    A Smart Card Based Remote User Authentication Scheme

    Computer security has become an important issue as more and more systems in a networked environment have added control to the access process through authentication to avoid illegitimate user's access. Password based authentication schemes are commonly used to authenticate remote users. Many schemes have been proposed both with and without...

    Provided By University College of Dublin

  • White Papers // Jun 2012

    Crypto System Based Authentication Using CSTA in Grid

    Grid computing, as a distributed computing model, stands for the new kind of systems that pools heterogeneous computational resources, such as computers, storage space, sensors, application software, and experiment data. When a user wants to request some computing and data resources, the grid can seamlessly, transparently and dynamically supply them....

    Provided By University College of Dublin

  • White Papers // Aug 2012

    A Metadata Verification Scheme for Data Auditing in Cloud Environment

    Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is...

    Provided By University College of Dublin

  • White Papers // May 2013

    Optimization of Cost in Cloud Computing Using OCRP Algorithm

    In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. Reservation plan is cheaper than that provisioned by on-demand plan, since cloud consumer has to pay to provider in advance. By using reservation plan, the consumer can reduce the total...

    Provided By University College of Dublin

  • White Papers // Mar 2013

    Protection of Data from Cipher-Text Only Attack Using Key Based Interval Splitting

    Modifications of Arithmetic Coding (AC) is to improve the security in two methods are: RAC (Randomized Arithmetic Coding) and KSAC (AC with Key-based interval Splitting). For the security, encryption uses AC that is based on the inability of the opponent to distinguish between the encryption of one plaintext from the...

    Provided By University College of Dublin

  • White Papers // Jun 2008

    A Smart Card Based Remote User Authentication Scheme

    Computer security has become an important issue as more and more systems in a networked environment have added control to the access process through authentication to avoid illegitimate user's access. Password based authentication schemes are commonly used to authenticate remote users. Many schemes have been proposed both with and without...

    Provided By University College of Dublin