• No results found

Authentication of Data Storage Using Decentralized Access Control in Clouds

N/A
N/A
Protected

Academic year: 2020

Share "Authentication of Data Storage Using Decentralized Access Control in Clouds"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig 1: Cloud Architecture

References

Related documents

Based on it, the essential technology - augmented reality is studied for unmanned fully mechanized longwall face automation production, through the virtual-real combination,

The instruments used in the study included the Hepatitis B Knowledge Questionnaire, Health Beliefs Regarding Hepatitis B Virus Infection Questionnaire, and Self-Efficacy

This paper deals with the performance analysis of different adders like Ripple Carry Adder, Carry Look Ahead Adder, Carry Select Adder, Carry Save Adder, Kogge Stone Adder and

Identity provider (IP): IP is defined in the claim definition. It possesses knowledge about the subject and transforms it in the form of claims. It will be able to

We present a machine-learning approach using freely available software for analysing imperfect reconstructions to be used in place of the more traditional thresholding based

The contribution to the work is using convolutional neural network as a classification method along with the local binary pattern for feature extraction to detect the

unit is represented by a dc voltage source, which is interfaced to the microgrid through a VSC, an inductive filter, and a step-up transformer (with the same power rating as the

Histopathological examination of hematoxylin and eosin stained soft tissue sections revealed an unen- capsulated tissue mass showed diffuse proliferation of neoplastic