Results 71 to 80 of about 502,338 (367)

Job Security in the Cloud Computing [PDF]

open access: yesInternational Journal of Future Computer and Communication, 2015
 Abstract—Cloud computing is a burgeoning Internet computing paradigm. The convenient, cheap and elastic resources in the cloud are attracting the users to migrate their assets (data, computing and software, etc.) into it. However, cloud also caused the serious worry about the security of those assets, since the resources are not under the control of ...
Tuo Yupeng   +3 more
openaire   +2 more sources

Body Biofluids for Minimally‐Invasive Diagnostics: Insights, Challenges, Emerging Technologies, and Clinical Potential

open access: yesAdvanced Healthcare Materials, EarlyView.
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao   +2 more
wiley   +1 more source

MDA: message digest-based authentication for mobile cloud computing

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2016
The emerging area of mobile cloud computing will influence the future of varied applications, such as electronic commerce and health informatics. It is expected to rise in popularity over other models in cloud computing.
Saurabh Dey, Srinivas Sampalli, Qiang Ye
doaj   +1 more source

Security Concerns in Cloud Computing [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
Cloud computing is a revolutionary way of storing and accessing data with five essential characteristics, three service models, and four deployment models. Businesses have realized the tremendous potentiality and benefits of cloud computing and have accepted the technology, but still a small amount of scepticism hovers around.
Gopal K. Shyam, Mir Abdul Samim Ansari
openaire   +1 more source

Progressive Insights into 3D Bioprinting for Corneal Tissue Restoration

open access: yesAdvanced Healthcare Materials, EarlyView.
This review explores the potential of 3D bioprinting to replicate the complex structure and function of the human cornea. It highlights key advances in bioink development, printing modalities, and in vivo performance, while addressing current challenges and emerging strategies. The review emphasizes bioprinting's promise to overcome donor shortages and
Ilayda Namli   +6 more
wiley   +1 more source

Research on Security of Virtualization on Cloud Computing

open access: yesDianxin kexue, 2015
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang   +4 more
doaj   +2 more sources

A Security Architecture Research Based on Roles

open access: yesMATEC Web of Conferences, 2017
Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, there ...
Tao Linbo   +3 more
doaj   +1 more source

Robust Full‐Surface Bonding of Substrate and Electrode for Ultra‐Flexible Sensor Integration

open access: yesAdvanced Materials, EarlyView.
A direct hybrid bonding method that enables both gold and parylene bonding without adhesives is developed. This technique achieves full‐surface direct bonding of electrodes and substrates in flexible electronic connections. The method offers high flexibility, stable mechanical durability, and high‐resolution interconnections, accommodating varying ...
Masahito Takakuwa   +9 more
wiley   +1 more source

Security Algorithms for Cloud Computing

open access: yesProcedia Computer Science, 2016
AbstractWith growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms which should be used for Cloud based ...
G. V. B. Subrahmanyam   +3 more
openaire   +2 more sources

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy