Results 51 to 60 of about 487,200 (366)
Cloud Computing Security: Foundations and Challenges
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues.
John R. Vacca
semanticscholar +1 more source
Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz+10 more
wiley +1 more source
On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems
In this paper, we evaluate the secrecy performance in terms of secrecy outage probability (SOP) for Internet of things (IoT) enabled multi-relaying non-orthogonal multiple access (NOMA) networks with energy harvesting over Nakagami-m fading channels ...
Mengdie Han, Jiliang Zhang
doaj
State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian+2 more
core +3 more sources
A systematic literature review of cloud computing in eHealth
Cloud computing in eHealth is an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers.
Bai, Guohua, Hu, Yan
core +2 more sources
A Review on Cloud Computing Security
Cloud computing is a technology that maintain the data and application by using the central remote server with the internet connection. By utilizing cloud computing, user can reduce their costs as they no need to purchase their own hardware and software.
Teo, Marry+6 more
openaire +3 more sources
A novel descriptor and a bottom‐up design principle are established to enable the rational design of hydrogen storage materials based on d‐block transition metal single‐atom COFs. By modulating H₂ adsorption through d‐orbital tuning, this approach achieves both high storage capacity and fast kinetics, while revealing a volcano‐type relationship between
Qiuyan Yue+24 more
wiley +1 more source
Managing the outsourcing of information security processes: the 'cloud' solution [PDF]
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core +1 more source
This study developed a nitrogen‐strengthened copper‐iron‐zinc (N‐CuFeZn) alloy bioactive dressing integrated with electromagnetic stimulation. The coaxial dressing, made from 0.04 mm filaments with 1120 MPa tensile strength, showed that electromagnetic activation enhanced therapeutic outcomes by increasing VEGF expression, promoting angiogenesis (2.1 ...
Xiaohui Qiu+9 more
wiley +1 more source
A Security Pattern for Cloud service certification [PDF]
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier+1 more
core