Results 81 to 90 of about 487,200 (366)

A New BRB Model for Cloud Security-State Prediction Based on the Large-Scale Monitoring Data

open access: yesIEEE Access, 2018
Considering the reliability of the cloud computing system, this paper aims to predict the security state with multiple large-scale attributes in cloud computing system.
Hang Wei   +6 more
doaj   +1 more source

Assessing database and network threats in traditional and cloud computing [PDF]

open access: yes, 2013
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread.
Lourida, Katerina   +2 more
core  

Triboelectric Nanogenerators Enable Multifunctional Ice Accretion, Melting, and Interfacial Fracture Detection

open access: yesAdvanced Materials, EarlyView.
Water impacting, freezing, melting, and being mechanically removed from the designed dielectric surfaces generates a triboeletric signal that can be used to detect various icing and de‐icing scenarios. The charge transferred directly scales with the interfacial fracture mechanism, further validating triboelectricity as an excellent ice‐detection ...
Kamran Alasvand Zarasvand   +12 more
wiley   +1 more source

Mechanism‐Guided Thermoelectric Strategies for Smart Fire Prevention

open access: yesAdvanced Materials, EarlyView.
This review highlights recent advances in thermoelectric materials for smart fire prevention and early warning. Mechanism‐guided strategies—such as structural design, energy filtering, ion doping, and ionic thermoelectric effects—are systematically discussed, offering insights into the development of self‐powered, high‐sensitivity fire warning systems ...
Boyou Hou   +11 more
wiley   +1 more source

A cloud computing separation model based on information flow

open access: yesOpen Physics, 2019
Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users.
Ma Wei, Li Huanqin, Witarsyah Deden
doaj   +1 more source

Stenographic Approaches for Enhancing Data Security in Cloud Computing [PDF]

open access: yesE3S Web of Conferences
Steganography has become a well-known method for concealing data so that unauthorized users cannot identify it among other data. With the growing popularity of cloud computing, security of cloud databases has become a major problem, and the necessity to ...
Rajguru Sankalp Sudarsan   +3 more
doaj   +1 more source

Mucosa‐Interfacing Capsule for In Situ Sensing the Elasticity of Biological Tissues

open access: yesAdvanced Materials Technologies, Volume 10, Issue 6, March 18, 2025.
A fundamental mechanism of palpating soft materials is reported to sense deep tissue elasticity in situ with minimal invasion using the interaction between the robot palpation unit and soft tissues. Both the robot locomotion and elasticity sensing functions are remotely controlled by external magnetic fields, while the sensing data are wirelessly ...
Kiyoung Kim   +10 more
wiley   +1 more source

Security and Privacy in Fog Computing: Challenges

open access: yesIEEE Access, 2017
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of
Mithun Mukherjee   +6 more
doaj   +1 more source

Cloud Computing and Security

open access: yes, 2014
This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations
Shinde, Asharani   +3 more
openaire   +1 more source

Cloud Computing Security and Privacy [PDF]

open access: yesComputer Science and Information Technology, 2014
The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this paper we present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy