关注
Gansen ZHAO
Gansen ZHAO
在 scnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
L Yan, C Rong, G Zhao
IEEE International Conference on Cloud Computing, 167-177, 2009
2432009
Trusted data sharing over untrusted cloud storage providers
G Zhao, C Rong, J Li, F Zhang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
184*2010
PERMIS: a modular authorization infrastructure
D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen
Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008
1312008
Fine-grained data access control systems with user accountability in cloud computing
J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
1202010
Proc. IAU Symp. 298, Setting the scene for Gaia and LAMOST
XW Liu, S Feltzing, G Zhao, NA Walton, P Whitelock
Cambridge Univ. Press, Cambridge, 2014
1122014
Fast algorithms to evaluate collaborative filtering recommender systems
F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu
Knowledge-Based Systems 96, 96-103, 2016
982016
Schema conversion model of SQL database to NoSQL
G Zhao, Q Lin, L Li, Z Li
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014
922014
Designing cloud-based electronic health record system with attribute-based encryption
F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong
Multimedia tools and applications 74 (10), 3441-3458, 2015
862015
Modeling MongoDB with relational model
G Zhao, W Huang, S Liang, Y Tang
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
752013
Cloud computing: A statistics aspect of users
G Zhao, J Liu, Y Tang, W Sun, F Zhang, X Ye, N Tang
IEEE International Conference on Cloud Computing, 347-358, 2009
632009
Deployment models: Towards eliminating security concerns from cloud computing
G Zhao, C Rong, MG Jaatun, FE Sandnes
2010 International Conference on High Performance Computing & Simulation …, 2010
592010
ContractGuard: Defend ethereum smart contracts with embedded intrusion detection
X Wang, J He, Z Xie, G Zhao, SC Cheung
IEEE Transactions on Services Computing 13 (2), 314-328, 2019
432019
Reference deployment models for eliminating user concerns on cloud security
G Zhao, C Rong, MG Jaatun, FE Sandnes
The Journal of Supercomputing 61 (2), 337-352, 2012
382012
Obligations for role based access control
G Zhao, D Chadwick, S Otenko
21st International Conference on Advanced Information Networking and …, 2007
372007
Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings
MG Jaatun, G Zhao, C Rong
Springer, 2009
362009
Multiple nested schema of HBase for migration from SQL
G Zhao, L Li, Z Li, Q Lin
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014
272014
On the modeling of bell-lapadula security policies using RBAC
G Zhao, DW Chadwick
2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for …, 2008
272008
MDP-based quantitative analysis framework for proof of authority
X Liu, G Zhao, X Wang, Y Lin, Z Zhou, H Tang, B Chen
2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019
262019
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
MG Jaatun, G Zhao, AV Vasilakos, ÅA Nyre, S Alapnes, Y Tang
Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 1-19, 2012
242012
Cir-net: Automatic classification of human chromosome based on inception-resnet architecture
C Lin, G Zhao, Z Yang, A Yin, X Wang, L Guo, H Chen, Z Ma, L Zhao, ...
IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2020
232020
系统目前无法执行此操作,请稍后再试。
文章 1–20