2015
DOI: 10.1007/s11036-015-0591-6
|View full text |Cite
|
Sign up to set email alerts
|

Controlling Cloud Data Access Based on Reputation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…Here, µ and σ 2 are the mean and variance of normalized data; γ and β are learning parameters. The operation of convolution layer 3, 4, and 5 is similar to that of the first two layers, and the output is as follows (4) - (6). After the convolution is completed, the maximum pooling is used to reduce the parameters.…”
Section: B Data Pre-classification Using Convolutional Neural Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, µ and σ 2 are the mean and variance of normalized data; γ and β are learning parameters. The operation of convolution layer 3, 4, and 5 is similar to that of the first two layers, and the output is as follows (4) - (6). After the convolution is completed, the maximum pooling is used to reduce the parameters.…”
Section: B Data Pre-classification Using Convolutional Neural Networkmentioning
confidence: 99%
“…A wide range of deployed sensors is used to continuously perceive environmental information. And short-distance communication and machine learning technique are used to transmit and process perceptual data [4]- [6]. Existing wearable equipment related work mainly focuses on the design and implementation of new mobile applications, information collection, product form and humanized user interface [7].…”
Section: Introductionmentioning
confidence: 99%
“…Our previous work explored using trust and reputation to control cloud data access in a flexible way based on CP-ABE [11,26]. But we have not yet investigated its real performance in implementation and the practicability of system deployment [11,26,27].…”
Section: Access Control On Cloud Datamentioning
confidence: 99%
“…Although MCC has attracted significant research and development efforts, there are salient open issues and challenges in the area of security and trust in MCC, which is an essential factor for the success of the burgeoning MCC paradigm [1,26,27,31,32].…”
Section: Introductionmentioning
confidence: 99%
“…MCC enables the large-scale collection and processing of personal private data such as individuals' locations and electronic medical records [5,6,26,32]. The processing of this information using big data analytics has become a hot topic in MCC.…”
Section: Introductionmentioning
confidence: 99%