• No results found

Securing clouds using cryptography and traffic classification

N/A
N/A
Protected

Academic year: 2019

Share "Securing clouds using cryptography and traffic classification"

Copied!
309
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1.1 Connections between chapters
Figure 2.1 Security and privacy taxonomy for eHealth clouds
Figure 6.4 Privacy-Preserving approach
Figure 7.2 Captured packets and TCP flags (normal)
+7

References

Related documents

Results: The results showed a significant difference between students with type D personality and non-type D personality in regard to general health, and in regard to

Spiritual change (being more connected spiritually) and (v) A Deeper appreciation of life. Some factors have been put forward to be related to PTG, Personality characteristics and

This paper describes a dual voltage source inverter (DVSI) scheme, in which the power generated by the microgrid is injected as real power by the main voltage

Their usefulness as a biocontrol agent in Australia at least has been questioned, as there are already a large number of indigenous and introduced mite species that attack

1 M.Sc of Health, Safety and Environment Management, Department of Health, Safety and Environment Management, Faculty of Health, Kashan University of Medical Sciences, Kashan, Iran•

Finally, experiments and analyses show that: ① the expected behavior trace of software constructed by training after clustering is more accurate than without clustering; and ②

In addition, sera from 30 individuals who tested negative for syphilis infection and 35 patients with other spirochetal infections that have no reactivity against TpF1