Results 301 to 310 of about 755,631 (334)
Some of the next articles are maybe not open access.
2011
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire +2 more sources
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire +2 more sources
2014
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee+2 more
openaire +2 more sources
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee+2 more
openaire +2 more sources
2014
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations
Shinde, Asharani+3 more
openaire +1 more source
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations
Shinde, Asharani+3 more
openaire +1 more source
2018
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire +2 more sources
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire +2 more sources
Security Issues for Cloud Computing
International Journal of Information Security and Privacy, 2010In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud.
Bhavani Thuraisingham+3 more
openaire +2 more sources
Security issues in cloud computing
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements.
openaire +2 more sources
2012
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of ...
Alpana M. Desai, Kenrick Mock
openaire +1 more source
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of ...
Alpana M. Desai, Kenrick Mock
openaire +1 more source
Cloud Security Research in Cloud Computing
Applied Mechanics and Materials, 2012This paper first introduces the definition of cloud security, then analyzes security research status, finally puts forward to three-layer security solutions in Cloud Computing.
Jun Ting Wang, You Chan Zhu, Peng Liu
openaire +2 more sources
2015
This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure ...
Flavio Lombardi, Roberto Di Pietro
openaire +2 more sources
This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure ...
Flavio Lombardi, Roberto Di Pietro
openaire +2 more sources
Cloud Computing Technology and Security
2017Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology going beyond the client-server technology.
openaire +2 more sources