Mining frequent itemsets from secondary memory

G Grahne, J Zhu - … Conference on Data Mining (ICDM'04), 2004 - ieeexplore.ieee.org
Mining frequent itemsets is at the core of mining association rules, and is by now quite well
understood algorithmically for main memory databases. In this paper, we investigate …

The CloudGrid approach: Security analysis and performance evaluation

V Casola, A Cuomo, M Rak, U Villano - Future Generation Computer …, 2013 - Elsevier
Both cloud and grid are computing paradigms that manage large sets of distributed
resources, and the scientific community would benefit from their convergence. This paper …

Geolocation-based trust for vanet's privacy

J Serna, J Luna, M Medina - 2008 The Fourth International …, 2008 - ieeexplore.ieee.org
Research in vehicular ad hoc networks (VANETs) has evolved considerably over the last
years. Security and privacy in VANETs have recently appealed special interest in the …

Efficient security for Desktop Data Grid using cryptographic protocol

R Vaishnavi, J Anand… - … Conference on Control …, 2009 - ieeexplore.ieee.org
Security is the condition that prevents unauthorized persons from having access to official
information that is safeguarded in the interests of some particular purpose. Data security …

Identity federation in cloud computing

V Casola, M Rak, U Villano - 2010 Sixth International …, 2010 - ieeexplore.ieee.org
Both cloud and GRID are computing paradigms for the large-scale management of
distributed resources. Even if the first is usually oriented to transaction-based applications …

Providing security to the desktop data grid

J Luna, M Flouris, M Marazakis… - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
Volunteer computing is becoming a new paradigm not only for the computational grid, but
also for institutions using production-level data grids because of the enormous storage …

Interoperable grid pkis among untrusted domains: an architectural proposal

V Casola, J Luna, O Manso, N Mazzocca… - Advances in Grid and …, 2007 - Springer
In the last years several Grid Virtual Organizations-VOs-have been proliferating, each one
usually installing its own Certification Authority and thus giving birth to a large set of different …

A novel protocol for secure data storage in Data Grid environment

R Vadivel, A Ramesh, G Vasanth - Trendz in Information …, 2010 - ieeexplore.ieee.org
The number of Internet connected PCs is projected to reach 1 billion by 2015, which means
several PetaFLOPS of computing power and a storage capacity around one Exabyte able to …

A novel protocol for secure data storage in Data Grid

TS Muthu, R Masillamani - 2010 First International Conference …, 2010 - ieeexplore.ieee.org
Data Grid depends on a set of widely distributed and un-trusted storage nodes in Grid
environment. Securing a Grid environment presents a distinctive set of challenges. These …

[PDF][PDF] Data privacy considerations in intensive care grids

J Luna, MD Dikaiakos, T Kyprianou, A Bilas… - Studies in Health …, 2008 - Citeseer
Novel eHealth systems are being designed to provide a citizen-centered health system,
however the even demanding need for computing and data resources has required the …