Results 291 to 300 of about 755,631 (334)

A NLP analysis of digital demand for healthcare jobs in China. [PDF]

open access: yesSci Rep
Chen Y   +5 more
europepmc   +1 more source

Cloud Computing Security [PDF]

open access: possibleInternational Journal of Ambient Computing and Intelligence, 2011
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire   +1 more source

Security in Cloud Computing [PDF]

open access: possible2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018
From the past few years Cloud Computing has become the IT industry's landscape for both the individuals and companies from the way to access which stores and also shares the information to how we communicate, collaborate and process the data. In companies, many clients worry about their resources whether it is outside the firewall.
Rishitha, T. R. Reshmi
openaire   +1 more source

Secure virtualization for cloud computing

Journal of Network and Computer Applications, 2011
Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire   +4 more sources

Security in cloud computing

2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017
Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not.
Mohammed Abdul Qadeer   +3 more
openaire   +2 more sources

A Secure Cloud Computing

2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc ...
Gadadhar Sahoo, Kuntal Mukherjee
openaire   +2 more sources

Cloud Computing Security

SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES, 2017
Cloud computing is a computing framework and software model for empowering ubiquitous access to shared pools of configurable assets i.e. Server, networks, services and storage applications which can be quickly provisioned least managements activities often over the web. Cloud computing is a moderately new innovation that will only become widespread and
Samina Rajper, S. Shoro, B. Baloch
openaire   +2 more sources

Cloud Computing Security

2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA), 2019
The aim of this paper was to analyze the issue of the Cloud security solutions as well as to design a secure access for a demonstrative cloud application. Several security items have been chosen for a secure access to the Cloud; moreover, the application has been implemented to Heroku, from Sales force company, with the use of the existing cloud ...
openaire   +2 more sources

Securing Cloud Computing

SSRN Electronic Journal, 2011
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive
openaire   +2 more sources

Home - About - Disclaimer - Privacy