Workflow specification and scheduling with security constraints in hybrid clouds
Daniel S. Marcon+9 more
openalex +2 more sources
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING [PDF]
Venkata N Inukollu+2 more
openalex +1 more source
A secured remote patient monitoring framework for IoMT ecosystems. [PDF]
Bhattacharya P+5 more
europepmc +1 more source
Essential work, invisible workers: The role of digital curation in COVID‐19 Open Science
Abstract In this paper, we examine the role digital curation practices and practitioners played in facilitating open science (OS) initiatives amid the COVID‐19 pandemic. In Summer 2023, we conducted a content analysis of available information regarding 50 OS initiatives that emerged—or substantially shifted their focus—between 2020 and 2022 to address ...
Irene V. Pasquetto+2 more
wiley +1 more source
Data Security and Privacy Concerns in Cloud Computing [PDF]
Masrat Yousuf Pandith
openalex +1 more source
A unified model integrating UTAUT-Behavioural intension and Object-Oriented approaches for sustainable adoption of Cloud-Based collaborative platforms in higher education. [PDF]
Feng K, Haridas D.
europepmc +1 more source
Abstract Provenance is the story of how something has come to be. In this paper, we provide a systematic literature review to categorize the various notions of provenance in Information Sciences. The goal of this review is to paint a broader picture of the multiple uses of provenance at play and to enhance our understanding of the importance of ...
Rhiannon Bettivia+2 more
wiley +1 more source
Administration Security Issues in Cloud Computing
Hamoud Alshammari, Christian Bach
openalex +1 more source
Recommendations and Best Practices for Cloud Enterprise Security [PDF]
Muthu Ramachandran, Victor Chang
openalex +1 more source
Monocular visual servo control of a quadcopter for crossing windows, doors, and corridors
Abstract This paper proposes a sequential visual servo control scheme for quadcopters, where the main goal is to drive a quadcopter to a desired pose while crossing windows, doors, or corridors using only visual feedback. This control scheme is composed of two stages that act in sequence: the approaching and pose regulation phases.
Carlos A. Toro‐Arcila+2 more
wiley +1 more source