Results 11 to 20 of about 399,352 (90)

A Security Pattern for Cloud service certification [PDF]

open access: yes, 2019
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier   +1 more
core  

Managing the outsourcing of information security processes: the 'cloud' solution [PDF]

open access: yes, 2013
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core   +1 more source

CYCLONE Unified Deployment and Management of Federated, Multi-Cloud Applications

open access: yes, 2016
Various Cloud layers have to work in concert in order to manage and deploy complex multi-cloud applications, executing sophisticated workflows for Cloud resource deployment, activation, adjustment, interaction, and monitoring.
Baranda, José Ignacio Aznar   +7 more
core   +1 more source

Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications [PDF]

open access: yes, 2018
Internet is changing from an information space to a dynamic computing space. Data distribution and remotely accessible software services, dynamism, and autonomy are prime attributes.
Muñoz, Antonio
core  

Chinese Wall Security Policy [PDF]

open access: yes, 2009
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core   +1 more source

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

open access: yes, 2017
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna   +3 more
core   +1 more source

Security Trust Zone in 5G Networks

open access: yes, 2017
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa   +4 more
core   +1 more source

Assessing database and network threats in traditional and cloud computing [PDF]

open access: yes, 2013
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread.
Lourida, Katerina   +2 more
core  

Security and Privacy Issues in Cloud Computing [PDF]

open access: yes, 2016
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009 ...
Ismail, H., Khan, M., Medvedev, M.
core  

Survey on security issues in file management in cloud computing environment

open access: yes, 2015
Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks.
Gupta, Udit
core  

Home - About - Disclaimer - Privacy