Results 171 to 180 of about 46,459 (209)
Some of the next articles are maybe not open access.
Secure virtualization for cloud computing
Journal of Network and Computer Applications, 2011Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire +4 more sources
Federated Cloud Security Architecture for Secure and Agile Clouds
2013Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development.
Weiliang Luo+4 more
openaire +2 more sources
On the Adoption of Security SLAs in the Cloud [PDF]
Can security be provided as-a-Service? Is it possible to cover a security service by a proper Service Level Agreement? This paper tries to reply to these questions by presenting some ongoing research activities from standardization bodies and academia, trying to cope with the open issues in the management of Security Service Level Agreement in its ...
Valentina Casola+2 more
openaire +2 more sources
2017
This chapter presents an overview of the architecture and security challenges of cloud and mobile edge computing in the context of 5G and future networks. It first established the need for both technologies in meeting the performance demands of future computing and networking. It then went on to present the architectural framework and deployment models
Ahmed Bux Abro+4 more
openaire +3 more sources
This chapter presents an overview of the architecture and security challenges of cloud and mobile edge computing in the context of 5G and future networks. It first established the need for both technologies in meeting the performance demands of future computing and networking. It then went on to present the architectural framework and deployment models
Ahmed Bux Abro+4 more
openaire +3 more sources
Enhancing Security of Cloud Platform with Cloud Access Security Broker
2021More companies are moving sensitive data to the cloud, thereby increasing the need for enhanced security of that data. With cloud technology becoming a larger and more important part of running a digital business, cloud computing (CC) platforms are rapidly limiting the effectiveness of the traditional security model.
Shahnawaz Ahmad+2 more
openaire +2 more sources
Intelligent security on the edge of the cloud
2017 International Conference on Engineering, Technology and Innovation (ICE/ITMC), 2017Edge or Fog computing is a relatively new architectural deployment model, ideally fit for the unique requirements of the Internet of Things. This paper presents a novel solution, which leverages the architectural characteristics of edge computing for security reasons.
openaire +2 more sources
Infosecurity, 2009
Carbon footprint be damned, the number of travellers taking to the skies each year is colossal, and evolving biometric technology at airports is helping to cut down on paperwork. However, as escalating amounts of personal data are gathered and stored, Stephen Pritchard looks into how these gateways to the skies can keep security firmly on the ...
openaire +2 more sources
Carbon footprint be damned, the number of travellers taking to the skies each year is colossal, and evolving biometric technology at airports is helping to cut down on paperwork. However, as escalating amounts of personal data are gathered and stored, Stephen Pritchard looks into how these gateways to the skies can keep security firmly on the ...
openaire +2 more sources
Cloud Computing: Cloud Security to Trusted Cloud
Advanced Materials Research, 2011Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions
Jian Lin Zhang+3 more
openaire +2 more sources
A secured cloud storage technique to improve security in cloud infrastructure
2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013Security in cloud computing is considered to be the most challenging research domain where most of the solutions remain vulnerable. Availability of data in cloud to every other components of cloud made it difficult to protect it from external sources. The risk of malicious insiders in cloud and failing of cloud services have received a strong attention
M. Senthil Kumar, Meena Kumar
openaire +2 more sources
Network security for Hybrid Cloud
2014 Euro Med Telco Conference (EMTC), 2014Cloud computing has enabled elastic and transparent access to distributed services, without investing in new infrastructures. In the last few years, Cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry.
DONADIO, PASQUALE+3 more
openaire +3 more sources