Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/7119
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDalima Parwani-
dc.contributor.authorAmit Dutta-
dc.date.accessioned2024-02-27T06:05:54Z-
dc.date.available2024-02-27T06:05:54Z-
dc.date.issued2016-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/7119-
dc.description.abstractTechnology is changing to embrace the cloud. Cloud Computing is simply sharing computing resources that are available through a service provider. Those resources can be storage space, use of software applications or servers. You buy more if you need more resources: you g ive back resources that you no longer need. Cloud computing infrastructure enables companies to cut costs; by outsourcing computations on-demand. However, clients of cloud computing services currently have no means of verifying the confidentiality & integrity of their data and computation. The paper tableaux a Publish-Subscribe model to balance the real and perceived risks with the value of adopting a cloud solution that improves the security of data over the cloud.-
dc.publisherAnusandhan: AlSECT University Journal-
dc.titleInterconnected Hybrid Clouds Using Scheduling Techniques-
dc.volVol V-
dc.issuedNo X-
Appears in Collections:Articles to be qced

Files in This Item:
File SizeFormat 
Interconnected Hybrid Clouds Using Scheduling Techniques.pdf
  Restricted Access
1.81 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.