About
10
Publications
4,663
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
221
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (10)
Blockchain can be successfully utilised in diverse areas, including the financial sector and the Information and Communication Technology environments, such as computational clouds (CC). While cloud computing optimises the use of resources, it does not (yet) provide an effective solution for the secure hosting scheduling and execution of large comp...
Although a lot of work has been done in the domain, tasks scheduling and resource allocation in cloud computing remain the challenging problems for both industry and academia. Security in scheduling in highly distributed computing environments is one of the most important criteria in the era of personalization of the cloud services. Blockchain beca...
Data integration and fast effective data processing are the primary challenges in today’s high-performance computing systems used for Big Data processing and analysis in practical scenarios. Blockchain (BC) is a hot, modern technology that ensures high security of data processes
stored in highly distributed networks and ICT infrastructures. BC enab...
The main research challenge in the ICT support of the financial markets is the development of a next generation financial technology for a secure use of electronic currencies and a secure network technology for system user communication, as well as data processing and storage without the involvement of third parties. To deal with the security aspec...
In this chapter, the k-anonymity algorithm is used for anonymization of sensitive data sending via network and analyzed by experts. Anonymization is a technique used to generalize sensitive data to block the possibility of assigning them to specific individuals or entities. In our proposed model, we have developed a layer that enables virtualizatio...
In this paper, the Stackelberg game models are used for supporting the decisions on task scheduling and resource utilization in computational clouds. Stackelberg games are asymmetric games, where a specific group of players' acts first as leaders, and the rest of the players follow the lead-ers' decisions and make their decisions based on the leade...
Stackelberg games are non-symmetric games where one player or specified group of players have the privilege position and make decision before the other players. Such games are used in telecommunication and computational systems for supporting administrative decisions. Recently Stackleberg games became useful also in the systems where security issue...
Over the years evacuation simulation has become increasingly important in the research on the wide class of problems related to the public security in emergency situations. In this paper we develop simulation platform fully integrated with the cloud systemwith using the MapReduce programing model and Hadoop framework.The environment illustrating ev...
The problem of efficient use of computer resources is the actual challenge for many years. Huge progress in the hardware development has left behind the development of software techniques. One of the most popular solutions for this problem is the idea of virtualization, which a natural continuation is cloud computing. Cloud computing is an innovati...