Results 41 to 50 of about 487,200 (366)

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Data security in cloud computing [PDF]

open access: yes2016 Fifth International Conference on Future Generation Communication Technologies (FGCT), 2016
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats.
Albugmi, Ahmed, Nammas   +3 more
openaire   +2 more sources

Security challenges and solutions using healthcare cloud computing

open access: yesJournal of Medicine and Life, 2021
Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions.
M. Mehrtak   +12 more
semanticscholar   +1 more source

Traditional security risk assessment methods in cloud computing environment: usability analysis [PDF]

open access: yes, 2014
The term "Cloud Computing" has become very common in our daily life. Cloud computing has emerged with promises to decrease the cost of computing implementation and deliver the computing as service, where the clients pay only for what he needed and used ...
Ahmed, Azuan   +4 more
core   +2 more sources

Cloud Computing Security Challenges in Higher Educational Institutions - A Survey

open access: yes, 2017
Cloud computing brings for higher educational institution a wide range of benefits with new capabilities to incorporate in the educational process. However, the cloud services are vulnerable to a variety of security challenges.
K. Al-Shqeerat   +3 more
semanticscholar   +1 more source

High‐Performance Low‐Emissivity Paints Enabled by N‐Doped Poly(benzodifurandione) (n‐PBDF) for Energy‐Efficient Buildings

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a scalable and colored low‐emissivity (low‐e) paint achieved by spraying an ultrathin n‐doped poly(benzodifurandione) (n‐PBDF) coating onto various colored substrates. The low‐e paint enhances thermal regulation by reducing mid‐infrared thermal emissivity to 0.19, thereby stabilizing indoor temperatures across diverse climates ...
Xiaojie Liu   +13 more
wiley   +1 more source

基于层次分析—模糊评价的云计算安全评估与对策

open access: yesTongxin xuebao, 2016
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG   +3 more
doaj   +2 more sources

Security Architecture for Cloud-Based Command and Control System in IoT Environment

open access: yesApplied Sciences, 2020
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo   +3 more
doaj   +1 more source

Security risk factors that influence cloud computing adoption in Saudi Arabia government agencies [PDF]

open access: yes, 2016
Cloud computing technologies play a substantial role in public organizations and private sector companies since it reduces the cost of using information technology services and allows users to access the service anytime and everywhere, whilst only paying
Alassafi, Madini, Obad   +3 more
core   +1 more source

Integration of Perovskite/Low‐Dimensional Material Heterostructures for Optoelectronics and Artificial Visual Systems

open access: yesAdvanced Functional Materials, EarlyView.
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy