International Research Journal of Commerce , Arts and Science

 ( Online- ISSN 2319 - 9202 )     New DOI : 10.32804/CASIRJ

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 69    Submit Your Rating     Cite This   Download        Certificate

CLOUD COMPUTING: WHAT IT IS AND WHERE TO START

    1 Author(s):  MISA STEPHAN

Vol -  4, Issue- 1 ,         Page(s) : 64 - 68  (2013 ) DOI : https://doi.org/10.32804/CASIRJ

Abstract

You know how traditional desktop computing works. The software programs you use are stored on each computer you own. The documents you create are stored on the computer on which they were created. And, although documents can be accessed from other computers on a network, they can't be accessed by computers outside the network.

order buy online prescription
order online

  1. Ward, J, O’Sulllivan, M., Shahoumian, T., and Wilkes, J. 2002. “Appia: Aut omatic storage area net work fabric design. In P roceedings of the Conference on File and St orage Technologies” (FAST 2002) . T he USENIX Associat ion, Mont erey, CA.
  2. Hakan Hacigümüs, Bijit Hore, Balakrishna R. Iyer, Sharad Mehrotra: Search on Encrypted Data. Secure Dat a Management in Decent ralized Syst ems 2007:383 -425
  3. G. Aggarwal, M. Bawa, P . Ganesan, H. Garcia-Molina, K. Kenthap adi, R. Motwani, U. Srivastava, D. Thomas, and Y. Xu. T wo can keep a secret: a dist ributed architecture for secure database services. In P roc. of the Second Biennial Conference on Innovat ive Dat a Syst ems Research (CIDR 2005), Asilomar, CA, USA, January 200 5.
  4. Valent ina Ciriani, Sabrina De Capit ani di Vimercati, Sara Forest i, Sushil Jajodia, St efano P araboschi, Pierangela Samarat i: Keep a Few: Out sourcing Dat a While Maint aining Confident ialit y. ESORICS 2009:440 -455
  5. Valent ina Ciriani, Sabrina De Capit ani di Vimercati, Sara Forest i, Sushil Jajodia, St efano P araboschi, Pierangela Samarat i: Combining fragmentation and encryption t o protect privacy in dat a st orage. ACM T rans. Inf. Syst . Secur. (T ISSEC) 13(3) (2010) 

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details