Auswahl der wissenschaftlichen Literatur zum Thema „Client-side storage“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Client-side storage" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Client-side storage"

1

Kim, Cheiyol, Sangmin Lee, Youngkyun Kim und Daewha Seo. „Adaptation of Distributed File System to VDI Storage by Client-Side CacheAdaptation of Distributed File System to VDI Storage by Client-Side Cache“. Journal of Computers 11, Nr. 1 (Januar 2016): 10–17. http://dx.doi.org/10.17706/jcp.11.1.10-17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hatzieleftheriou, Andromachi, und Stergios V. Anastasiadis. „Client-Side Journaling for Durable Shared Storage“. ACM Transactions on Storage 13, Nr. 4 (15.12.2017): 1–34. http://dx.doi.org/10.1145/3149372.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Song, Gyuwon, Suhyun Kim und Dongmahn Seo. „Saveme: client-side aggregation of cloud storage“. IEEE Transactions on Consumer Electronics 61, Nr. 3 (August 2015): 302–10. http://dx.doi.org/10.1109/tce.2015.7298089.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Janik, Arkadiusz, und Szymon Kiebzak. „Client-side Storage. Offline Availability of Data“. Journal of Automation, Mobile Robotics and Intelligent Systems 8, Nr. 4 (20.12.2014): 3–10. http://dx.doi.org/10.14313/jamris_4-2014/30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hariyadi, Dedy, Imam Puji Santoso und Ramadhana Saputra. „IMPLEMENTASI PROTEKSI CLIENT-SIDE PADA PRIVATE CLOUD STORAGE NEXTCLOUD“. Jurnal Manajemen Informatika dan Sistem Informasi 2, Nr. 1 (31.01.2019): 16. http://dx.doi.org/10.36595/misi.v2i1.65.

Der volle Inhalt der Quelle
Annotation:
Saat ini hampir setiap perangkat terhubung dengan teknologi komputasi awan. Teknologi komputasi awan yang menawarkan layanan menarik adalah Cloud Storage seperti Google Drive, Dropbox, One Drive, Mega, dan lain-lain. Teknologi Cloud Storage semacam itu dapat diterapkan di lingkungan private atau on-premise. Peranti lunak Cloud Storage yang dapat diinstall di lingkungan private diantaranya, OwnCloud, Nextcloud, SeaFile, dan lain-lain. Implementasi Cloud Storage perlu diwaspadai karena memiliki celah keamanan saat transmisi data dari client ke server atau sebaliknya dan tidak terproteksinya berkas yang tersimpan pada Cloud Storage server. Pada penelitian ini menunjukkan hasil pengujian kerentanan menyimpan berkas dan direktori di penyedia Cloud Storage berserta memberikan solusi mengatasi keamanan tersebut.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Park, Kyungsu, Ji Eun Eom, Jeongsu Park und Dong Hoon Lee. „Secure and Efficient Client-side Deduplication for Cloud Storage“. Journal of the Korea Institute of Information Security and Cryptology 25, Nr. 1 (28.02.2015): 83–94. http://dx.doi.org/10.13089/jkiisc.2015.25.1.83.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Youn, Taek-Young, Nam-Su Jho, Kyung Hyune Rhee und Sang Uk Shin. „Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage“. Wireless Communications and Mobile Computing 2019 (15.05.2019): 1–11. http://dx.doi.org/10.1155/2019/7840917.

Der volle Inhalt der Quelle
Annotation:
Since deduplication inevitably implies data sharing, control over access permissions in an encrypted deduplication storage is more important than a traditional encrypted storage. Therefore, in terms of flexibility, data deduplication should be combined with data access control techniques. In this paper, we propose an authorized deduplication scheme using CP-ABE to solve this problem. The proposed scheme provides client-side deduplication while providing confidentiality through client-side encryption to prevent exposure of users’ sensitive data on untrusted cloud servers. Also, unlike existing convergent encryption schemes, it provides authorized convergent encryption by using CP-ABE to allow only authorized users to access critical data. The proposed authorized deduplication scheme provides an adequate trade-off between storage space efficiency and security in cloud environment and is very suitable for the hybrid cloud model considering both the data security and the storage efficiency in a business environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Seo, Dongmahn, Suhyun Kim und Gyuwon Song. „Mutual exclusion method in client-side aggregation of cloud storage“. IEEE Transactions on Consumer Electronics 63, Nr. 2 (Mai 2017): 185–90. http://dx.doi.org/10.1109/tce.2017.014838.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shin, Youngjoo, und Kwangjo Kim. „Differentially private client-side data deduplication protocol for cloud storage services“. Security and Communication Networks 8, Nr. 12 (30.10.2014): 2114–23. http://dx.doi.org/10.1002/sec.1159.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Braeken, An. „Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak“. Sensors 20, Nr. 8 (11.04.2020): 2160. http://dx.doi.org/10.3390/s20082160.

Der volle Inhalt der Quelle
Annotation:
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Client-side storage"

1

Regin, Måns, und Gunnarsson Emil. „Refactoring Existing Database Layers for Improved Performance, Readability and Simplicity“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105277.

Der volle Inhalt der Quelle
Annotation:
Since the late 90s, support and services at SAAB have produced and maintained a product called ELDIS. ELDIS is an application used by Swedish armed forces at air bases in Sweden and flight technicians at air bases. It displays electrical information, wire diagrams, and detailed information for cables, electrical equipment, and other electrical devices. The main problem for ELDIS is that when drawing wire diagrams in the application, it takes too long of a time when the stored procedures are retrieving information from the database. There are two significant areas in this project, analyzing and optimizing stored procedures and implementing a client-side solution. This project aims to guide SAAB to choose the right approach for solving the performance issue of the application and display some of the problems that can exist with slow stored procedures for companies in general. This project has optimized the most used stored procedure at SAAB and compared it to a client-side solution and the original application. The result of this project is that both the optimized stored procedure implementation and the client-side implementation is a faster option than the original implementation. It also highlights that when trying to optimize the stored procedures, indexing on the database should be considered for increasing the performance of a stored procedure.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Henziger, Eric. „The Cost of Confidentiality in Cloud Storage“. Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148907.

Der volle Inhalt der Quelle
Annotation:
Cloud storage services allow users to store and access data in a secure and flexible manner. In recent years, cloud storage services have seen rapid growth in popularity as well as in technological progress and hundreds of millions of users use these services to store thousands of petabytes of data. Additionally, the synchronization of data that is essential for these types of services stands for a significant amount of the total internet traffic. In this thesis, seven cloud storage applications were tested under controlled experiments during the synchronization process to determine feature support and measure performance metrics. Special focus was put on comparing applications that perform client side encryption of user data to applicationsthat do not. The results show a great variation in feature support and performance between the different applications and that client side encryption introduces some limitations to other features but that it does not necessarily impact performance negatively. The results provide insights and enhances the understanding of the advantages and disadvantages that come with certain design choices of cloud storage applications. These insights will help future technological development of cloud storage services.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Qin, Dai. „Reliable Writeback for Client-side Flash Caches“. Thesis, 2014. http://hdl.handle.net/1807/65598.

Der volle Inhalt der Quelle
Annotation:
Modern data centers are increasingly using shared storage solutions for ease of management. Data is cached on the client side on inexpensive and high-capacity flash devices, helping improve performance and reduce contention on the storage side. Currently, write-through caching is used because it ensures consistency and durability under client failures, but it offers poor performance for write-heavy workloads. In this work, we propose two write-back based caching policies, called write-back flush and write-back persist, that provide strong reliability guarantees, under two different client failure models. These policies rely on storage applications such as file systems and databases issuing write barriers to persist their data, because these barriers are the only reliable method for storing data durably on storage media. Our evaluation shows that these policies achieve performance close to write-back caching, while providing stronger guarantees than vanilla write-though caching.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Client-side storage"

1

Riché, Stéphanie, Gavin Brebner und Mickey Gittler. „Client—Side Profile Storage“. In Lecture Notes in Computer Science, 127–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45745-3_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zakas, Nicholas C. „Offline Applications and Client-Side Storage“. In Professional Javascript® for Web Developers, 765–800. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722176.ch23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

da Rocha, Marciano, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgonio, Rodrigo Tomaz Pagno und Newton Carlos Will. „Trusted Client-Side Encryption for Cloud Storage“. In Communications in Computer and Information Science, 1–24. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72369-9_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Apers, Chris, und Daniel Paterson. „A Better Handling of Client-Side Data Storage“. In Beginning iPhone and iPad Web Apps, 431–66. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3046-5_15.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Price, Geraint. „Client v. Server Side Protocols, Interfaces and Storage“. In Security Protocols, 63–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Price, Geraint. „Client v. Server Side Protocols, Interfaces and Storage“. In Security Protocols, 74–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Tachikawa, Akihiro, und Akira Kanaoka. „Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions“. In HCI for Cybersecurity, Privacy and Trust, 652–70. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_44.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ranjani, R. Siva, D. Lalitha Bhaskari und P. S. Avadhani. „Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography“. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 473–80. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_52.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Mishra, Shivansh, und Surjit Singh. „Secure Data Deduplication on Cloud Storage“. In Advances in Wireless Technologies and Telecommunication, 23–40. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch002.

Der volle Inhalt der Quelle
Annotation:
Deduplication is the process of removing duplicate data by storing only one copy of the original data and replacing the others simply as a reference to the original. When data is stored on cloud storage, client-side deduplication helps in reducing storage and communications overheads both from the client as well as the server perspective. Secure deduplication is the practice by which the data stored on the cloud is secured from external influences such that the clients maintain the privacy of their data, and the server also gets to take advantage of deduplication. This is done by encrypting the data using different schemes into ciphertext, which makes sense only to the original client. The schemes created for secure deduplication on cloud storage provide a solution to the problem of duplication detection in encrypted ciphertext. This chapter provides a brief overview of secure deduplication used on cloud storage along with the issues encountered during its implementation. The chapter also includes a literature review and comparison of some deduplication techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Herbster, R., Hyggo Almeida, Angelo Perkusich und Marcos Morais. „Enabling Multimedia Applications in Memory-Limited Mobile Devices“. In Multimedia Technologies, 472–77. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-953-3.ch034.

Der volle Inhalt der Quelle
Annotation:
In this article we propose a layered architecture that makes possible the visualization of large videos, and even other multimedia documents, in memory/processing limited devices. Storage of videos is performed at the server side, and the client plays the video without worrying about storage space in the device. Data available in the server is divided into small pieces of readable data for mobile devices, generally JPEG files. For example, when the client requests videos from the server, the videos are sent as JPEG files and shown at an ideal rate for users. The video frames are sent through a wireless connection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Client-side storage"

1

Kaaniche, Nesrine, und Maryline Laurent. „A Secure Client Side Deduplication Scheme in Cloud Storage Environments“. In 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2014. http://dx.doi.org/10.1109/ntms.2014.6814002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

G, Kranthi Kiran G., und V. Naresh Kumar. „Managing Deduplicate Data at Client Side in Public Cloud Storage Environment“. In National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics. AI Publications, 2016. http://dx.doi.org/10.22161/ijaers/si.1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Jemel, Mayssa, und Ahmed Serhrouchni. „Toward user's devices collaboration to distribute securely the client side storage“. In 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS). IEEE, 2015. http://dx.doi.org/10.1109/notere.2015.7293479.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Henziger, Eric, und Niklas Carlsson. „Delta Encoding Overhead Analysis of Cloud Storage Systems Using Client-Side Encryption“. In 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2019. http://dx.doi.org/10.1109/cloudcom.2019.00036.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Xu, Jia, Ee-Chien Chang und Jianying Zhou. „Weak leakage-resilient client-side deduplication of encrypted data in cloud storage“. In the 8th ACM SIGSAC symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484313.2484340.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

da Rocha, Marciano, Dalton Valadares, Angelo Perkusich, Kyller Gorgonio, Rodrigo Pagno und Newton Will. „Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment“. In 10th International Conference on Cloud Computing and Services Science. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009130600310043.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Henziger, Eric, und Niklas Carlsson. „The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems“. In UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3344341.3368808.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Islam, Tariqul, Hassan Mistareehi und D. Manivannan. „SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-Side Data Deduplication“. In GLOBECOM 2019 - 2019 IEEE Global Communications Conference. IEEE, 2019. http://dx.doi.org/10.1109/globecom38437.2019.9013469.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yanong He, Rulong Chen und Yuelong Zhao. „Research on the client-side cache technology of the intelligent network disk storage system“. In 2011 Second International Conference on Mechanic Automation and Control Engineering (MACE). IEEE, 2011. http://dx.doi.org/10.1109/mace.2011.5987969.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Djoko, Judicael B., Jack Lange und Adam J. Lee. „NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX“. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2019. http://dx.doi.org/10.1109/dsn.2019.00049.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie