Results 91 to 100 of about 502,338 (367)
A cloud computing separation model based on information flow
Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users.
Ma Wei, Li Huanqin, Witarsyah Deden
doaj +1 more source
A New BRB Model for Cloud Security-State Prediction Based on the Large-Scale Monitoring Data
Considering the reliability of the cloud computing system, this paper aims to predict the security state with multiple large-scale attributes in cloud computing system.
Hang Wei+6 more
doaj +1 more source
Cloud Computing Security and Privacy [PDF]
The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this paper we present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment ...
openaire +2 more sources
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
Mucosa‐Interfacing Capsule for In Situ Sensing the Elasticity of Biological Tissues
A fundamental mechanism of palpating soft materials is reported to sense deep tissue elasticity in situ with minimal invasion using the interaction between the robot palpation unit and soft tissues. Both the robot locomotion and elasticity sensing functions are remotely controlled by external magnetic fields, while the sensing data are wirelessly ...
Kiyoung Kim+10 more
wiley +1 more source
Security and Privacy in Fog Computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of
Mithun Mukherjee+6 more
doaj +1 more source
Chinese Wall Security Policy [PDF]
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core +1 more source
Ultrasound‐Powered, Battery‐Free Implants via Triboelectric Energy Harvesting
Ultrasound‐driven triboelectric nanogenerators (US‐TENGs) present a promising approach to battery‐free implants by combining body‐safe ultrasound with the material and structural versatility of TENGs. This review categorizes current US‐TENG research into long‐term and transient short‐term applications and discusses key challenges in materials, device ...
Youngwook Chung+5 more
wiley +1 more source
Network Security Threats and Countermeasures on Cloud Computing
Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud ...
Ping Yao, Hong Li
doaj +2 more sources
Proposal for a Security Management in Cloud Computing for Health Care
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in ...
Knut Haufe, Srdan Dzombeta, Knud Brandis
doaj +1 more source