• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 49
Next 10 →

An Approach for Data Integrity Checking and Data Recovery in Cloud Data Storage

by Charmee V. Desai, Prof Gordhan, B. Jethava
"... Abstract-Cloud Data Storage is an attractive mean for storing and managing the outsourced data. As data are remotely stored, user is not aware of any security threat. Data modification can done by the untrusted server, unauthorized user or by some malicious activity. So user needs to be ensured that ..."
Abstract - Add to MetaCart
the metadata of constant size. It stores the metadata as the metadata of file adversary cannot access it. As file size of uploaded file is same as the original file results less communication overhead. Keywords- Cloud Data Storage, integrity checking,Network Coding, Data Recovery

TO CODE OR NOT TO CODE

by Présentée À La, Faculté Informatique, Et Communications, Section Des, Systèmes De Communication, Du Grade, De Docteur, Ès Sciences, Prof M. Vetterli, Prof B. Rimoldi, Prof R. Gallager, Prof A. Lapidoth, Prof J. Massey, Prof E. Telatar, Prof S. Verdú, Michael Gastpar, Amos Lapidoth, Jim Ma , 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract - Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:

PolyUnpack: Automating the Hidden-Code Extraction of

by Unpack-executing Malware, Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee
"... Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obfuscation technique poses obstacles to researchers who want to understand the malicious behavior of new or unknown malware ..."
Abstract - Add to MetaCart
malware instance can be made self-identifying when its runtime execution is checked against its static code model. In deriving our technique, we formally define the unpack-executing behavior that such malware exhibits and devise an algorithm for identifying and extracting its hidden-code. We also provide

A Graph Pattern Matching Approach to Software Architecture Recovery £

by unknown authors
"... This paper presents a technique for recovering the high level design of legacy software systems based on pattern matching and user defined architectural patterns. Architectural patterns are represented using a description language that is mapped to an attributed relational graph and allows to specif ..."
Abstract - Add to MetaCart
to specify the legacy system components and their data and control flow interactions. Such pattern descriptions are viewed as queries that are applied against an entity-relation graph that represents information extracted from the source code of the software system. A multi-phase branch and bound search

A Graph Pattern Matching Approach to Software Architecture Recovery

by unknown authors
"... This paper presents a technique for recovering the high level design of legacy software systems based on pattern matching and user defined architectural patterns. Architectural patterns are represented using a description language that is mapped to an attributed relational graph and allows to specif ..."
Abstract - Add to MetaCart
to specify the legacy system components and their data and control flow interactions. Such pattern descriptions are viewed as queries that are applied against an entity-relation graph that represents information extracted from the source code of the software system. A multi-phase branch and bound search

Enabling Data Reliability Security in Regenerating- Coding-based Cloud Storage

by V. Divya Bharathi, Pg Scholar, Pg Scholar
"... To protect outsourced information in cloud storage con to corruptions, adding defect acceptance to cloud storage, along side well-organized information responsibleness read-through and recovery procedures, becomes crucial. Make codes offer defect acceptance by marking information across multiple ser ..."
Abstract - Add to MetaCart
servers, whereas mistreatment less restore transfer than established removal codes throughout failure recovery. Therefore, we tend to study the matter of remotely checking the responsibleness of regenerating-coded information con to corruptions underneath a real-life cloud storage setting. we tend

Survey on Efficient Data Integrity Techniques for Distributed Cloud Storage

by Mr. Divyesh K Joshi, Prof Miss, Devangini Dave, Prof Kishori Shekoka
"... Recent advances have given rise to the popularityand success of cloud computing. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. It moves the application software and databa ..."
Abstract - Add to MetaCart
, and efficient recovery for cloud storage becomes critical. Therefore, we study the problem of remotely checking the integrity of regenerating-coded data against corruptions under a real-life cloud storage setting. In this paper surveys the various protocols to check cloud data integrity and compares them based

Scalability Services in Cloud Computing Using Eyeos

by Deivendran P., E. R. Naganathan, Manonmaniam Sundaranar
"... Abstract: Cloud storage enables users to remotely store their data and benefit of the demand high quality cloud applications without the difficulty of local hardware and software management. Though the benefits are clear, such a service is also reliable to the users ’ physical possession of their ou ..."
Abstract - Add to MetaCart
of their outsourced data, which inevitably poses new security risks towards the recovery of the data in cloud. In order to address this new problem and further achieve a secure and useful cloud storage service, we propose in this study a flexible distributed storage integrity mechanism, utilizing the homomorphic

unknown title

by Copyright John Wiley
"... Sensor network software update management: a survey By Chih-Chieh Han, Ram Kumar, Roy Shea and Mani Srivastava*,† Software management is a critical task in the system administration of enterprise-scale networks. Enterprise-scale networks that have traditionally comprised of large clusters of worksta ..."
Abstract - Add to MetaCart
conceptual model for the software update tools in WSNs. Three components of this model that we study are the execution environment at the sensor nodes, the software distribution protocol in the network and optimization of transmitted updates. We present the design space of each component and discuss in

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Next 10 →
Results 1 - 10 of 49
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University