1491 | -- | 1492 | Yang Xiang, Ivan Stojmenovic, Peter Mueller. Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems |
1493 | -- | 1503 | Hua Wang, Lili Sun, Elisa Bertino. Building access control policy model for privacy preserving and testing policy conflicting problems |
1504 | -- | 1517 | Ahmed Sallam, Kenli Li, Aijia Ouyang, Zhiyong Li 0001. Proactive workload management in dynamic virtualized environments |
1518 | -- | 1533 | Lan Zhou, Vijay Varadharajan, Michael Hitchens. Secure administration of cryptographic role-based access control for large-scale cloud storage systems |
1534 | -- | 1548 | Zhide Chen, Cheng Qiao, Yihui Qiu, Li Xu, Wei Wu. Dynamics stability in wireless sensor networks active defense model |
1549 | -- | 1562 | Guiyi Wei, Rongxing Lu, Jun Shao. EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption |
1563 | -- | 1583 | Chi Yang, Xuyun Zhang, Changmin Zhong, Chang Liu, Jian Pei, Kotagiri Ramamohanarao, Jinjun Chen. A spatiotemporal compression based approach for efficient big data processing on Cloud |
1584 | -- | 1596 | Younchan Jung, Enrique Festijo. One-time packet key exchange scheme for secure real-time multimedia applications |
1597 | -- | 1614 | Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez. De-anonymization attack on geolocated data |