Results 301 to 310 of about 755,631 (334)
Some of the next articles are maybe not open access.

On Cloud Computing Security

2011
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire   +2 more sources

Secure Cloud Computing

2014
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee   +2 more
openaire   +2 more sources

Cloud Computing and Security

2014
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations
Shinde, Asharani   +3 more
openaire   +1 more source

Cloud Computing Security

2018
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire   +2 more sources

Security Issues for Cloud Computing

International Journal of Information Security and Privacy, 2010
In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud.
Bhavani Thuraisingham   +3 more
openaire   +2 more sources

Security issues in cloud computing

2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012
This paper presents a comprehensive study on the challenges and issues of security in cloud computing. We first look into the impacts of the distinctive characteristics of cloud computing, namely, multi-tenancy, elasticity and third party control, upon the security requirements.
openaire   +2 more sources

Security in Cloud Computing

2012
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of ...
Alpana M. Desai, Kenrick Mock
openaire   +1 more source

Cloud Security Research in Cloud Computing

Applied Mechanics and Materials, 2012
This paper first introduces the definition of cloud security, then analyzes security research status, finally puts forward to three-layer security solutions in Cloud Computing.
Jun Ting Wang, You Chan Zhu, Peng Liu
openaire   +2 more sources

Security for Cloud Computing

2015
This comprehensive resource presents a highly informative overview of cloud computing security issues. This book focuses on relevant approaches aimed at monitoring and protecting computation and data hosted on heterogeneous computing resources. The most critical security aspects are thoroughly discussed, highlighting the importance of reliable secure ...
Flavio Lombardi, Roberto Di Pietro
openaire   +2 more sources

Cloud Computing Technology and Security

2017
Cloud computing as a technology is difficult to define because it is evolving without a clear start point and no clear prediction of its future course. Even though this is the case, one can say that it is a continuous evolution of a computer network technology going beyond the client-server technology.
openaire   +2 more sources

Home - About - Disclaimer - Privacy