Results 11 to 20 of about 399,352 (90)
A Security Pattern for Cloud service certification [PDF]
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier+1 more
core
Managing the outsourcing of information security processes: the 'cloud' solution [PDF]
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core +1 more source
CYCLONE Unified Deployment and Management of Federated, Multi-Cloud Applications
Various Cloud layers have to work in concert in order to manage and deploy complex multi-cloud applications, executing sophisticated workflows for Cloud resource deployment, activation, adjustment, interaction, and monitoring.
Baranda, José Ignacio Aznar+7 more
core +1 more source
Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications [PDF]
Internet is changing from an information space to a dynamic computing space. Data distribution and remotely accessible software services, dynamism, and autonomy are prime attributes.
Muñoz, Antonio
core
Chinese Wall Security Policy [PDF]
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core +1 more source
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna+3 more
core +1 more source
Security Trust Zone in 5G Networks
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa+4 more
core +1 more source
Assessing database and network threats in traditional and cloud computing [PDF]
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread.
Lourida, Katerina+2 more
core
Security and Privacy Issues in Cloud Computing [PDF]
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009 ...
Ismail, H., Khan, M., Medvedev, M.
core
Survey on security issues in file management in cloud computing environment
Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks.
Gupta, Udit
core