Gansen ZHAO
Gansen ZHAO
Geverifieerd e-mailadres voor
Geciteerd door
Geciteerd door
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
L Yan, C Rong, G Zhao
IEEE International Conference on Cloud Computing, 167-177, 2009
Trusted data sharing over untrusted cloud storage providers
G Zhao, C Rong, J Li, F Zhang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
PERMIS: a modular authorization infrastructure
D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen
Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008
Fine-grained data access control systems with user accountability in cloud computing
J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
Proc. IAU Symp. 298, Setting the scene for Gaia and LAMOST
XW Liu, S Feltzing, G Zhao, NA Walton, P Whitelock
Cambridge Univ. Press, Cambridge, 2014
Fast algorithms to evaluate collaborative filtering recommender systems
F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu
Knowledge-Based Systems 96, 96-103, 2016
Schema conversion model of SQL database to NoSQL
G Zhao, Q Lin, L Li, Z Li
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014
Designing cloud-based electronic health record system with attribute-based encryption
F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong
Multimedia Tools and Applications 74 (10), 3441-3458, 2015
Modeling MongoDB with relational model
G Zhao, W Huang, S Liang, Y Tang
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
Cloudwf: A computational workflow system for clouds based on hadoop
C Zhang, H De Sterck
IEEE International Conference on Cloud Computing, 393-404, 2009
Cloud computing: A statistics aspect of users
G Zhao, J Liu, Y Tang, W Sun, F Zhang, X Ye, N Tang
IEEE International Conference on Cloud Computing, 347-358, 2009
The construction industry in Communist China
K Chao
Journal of the American Oriental Society 88 (2), 1968
Deployment models: Towards eliminating security concerns from cloud computing
G Zhao, C Rong, MG Jaatun, FE Sandnes
2010 International Conference on High Performance Computing & Simulation …, 2010
Effect of electrolyte type upon the high-temperature resilience of lithium-ion cells
MC Smart, BV Ratnakumar, JF Whitacre, LD Whitcanack, KB Chin, ...
Journal of the Electrochemical Society 152 (6), A1096, 2005
Reference deployment models for eliminating user concerns on cloud security
G Zhao, C Rong, MG Jaatun, FE Sandnes
The Journal of Supercomputing 61 (2), 337-352, 2012
Synergistic effect of the combination of nanoparticulate Fe3O4 and Au with daunomycin on K562/A02 cells
BA Chen, YY Dai, XM Wang, RY Zhang, WL Xu, HL Shen, F Gao, Q Sun, ...
International journal of nanomedicine 3 (3), 343, 2008
Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings
MG Jaatun, G Zhao, C Rong
Springer, 2009
Obligations for role based access control
G Zhao, D Chadwick, S Otenko
21st International Conference on Advanced Information Networking and …, 2007
Highly nonlinear property and threshold voltage of Sc2O3 doped ZnO-Bi2O3-based varistor ceramics
XU Dong, W Jieting, J Lei, XU Hongxing, P ZHANG, YU Renhong, ...
Journal of Rare Earths 31 (2), 158-163, 2013
Biflavanoids and derivatives thereof as antiviral agents
YM Lin, DE Zembower, MT Flavin, R Schure, G Zhao
US Patent 6,399,654, 2002
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20