Results 311 to 320 of about 487,200 (366)
Some of the next articles are maybe not open access.
Cloud computing security: challenges and future trends
International journal of computer application and technology, 2017Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy clients' requirements for computing resources such as services, applications, networks, storage and servers.
Tarek Radwan+2 more
semanticscholar +1 more source
2017 7th International Conference on Communication Systems and Network Technologies (CSNT), 2017
Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not.
Mohammed Abdul Qadeer+3 more
openaire +2 more sources
Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not.
Mohammed Abdul Qadeer+3 more
openaire +2 more sources
2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc ...
Gadadhar Sahoo, Kuntal Mukherjee
openaire +2 more sources
If we minutely analyze our day to day life then we shall find that it consists of utilization of some resources that are needed for our survival. Cloud computing plays a major role in this orientation by providing different resources in the form of web services like tax calculation web service, stock information web service, e-banking web service etc ...
Gadadhar Sahoo, Kuntal Mukherjee
openaire +2 more sources
2011
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire +2 more sources
Could computing is the latest development of the modern computing technology. It is the next stage of the Internet evolution. Cloud computing provides the organizations with the infrastructure management, various software services and the datacenter maintenance.
Sean Policarpio, Yun Bai
openaire +2 more sources
2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA), 2019
The aim of this paper was to analyze the issue of the Cloud security solutions as well as to design a secure access for a demonstrative cloud application. Several security items have been chosen for a secure access to the Cloud; moreover, the application has been implemented to Heroku, from Sales force company, with the use of the existing cloud ...
openaire +2 more sources
The aim of this paper was to analyze the issue of the Cloud security solutions as well as to design a secure access for a demonstrative cloud application. Several security items have been chosen for a secure access to the Cloud; moreover, the application has been implemented to Heroku, from Sales force company, with the use of the existing cloud ...
openaire +2 more sources
SSRN Electronic Journal, 2011
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive
openaire +2 more sources
Cloud computing is the latest buzz words in computing. There is significant excitement about Cloud computing and this has been building up over the past few years. Cloud computing offers several great benefits which include cost savings and easy access to state of the art resources, however when considering deploying critical applications and sensitive
openaire +2 more sources
2014
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee+2 more
openaire +2 more sources
The security risks of cloud computing include loss of control over data and programs stored in the cloud, spying out these data and unnoticed changing of user software by the cloud provider, malware intrusion into the server, eavesdropping during data transmission as well as sabotage by attackers able to fake authorised users. It will be shown here how
Sunantha Sodsee+2 more
openaire +2 more sources
Cloud computing: Security model comprising governance, risk management and compliance
2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), 2014Cloud security is a broad topic and any combination of policies, technologies, and controls to protect data, infrastructure and services from possible attacks.
Fawaz S. Al-Anzi, S. Yadav, J. Soni
semanticscholar +1 more source
2018
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire +2 more sources
The reconstruction of CS is a time-consuming process, which is unfavorable for resources-limited terminals in application. Cloud computing resources are abundant and can be used for being responsible for the reconstruction. However, privacy-preserved outsourcing mechanism needs to be elaborately decorated since the cloud is often not fully trusted.
Leo Yu Zhang, Yushu Zhang, Yong Xiang
openaire +2 more sources
A Review on Cloud Computing Security Issues
, 2014Cloud computing has different meaning to different people, the privacy and security issues also differ between a consumer using a public cloud application, a medium-sized Company using a customized Design of business on a cloud platform, and Some ...
Amarbeer Kaur, Nitin Bhagat
semanticscholar +1 more source