Results 21 to 30 of about 464,365 (270)

Trust Management Model for Cloud Computing Environment [PDF]

open access: yes, 2013
Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud and offers Information Technology services dynamically as "on-demand" basis over the internet.
Changder, Suvamoy   +2 more
core   +2 more sources

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

open access: yesIEEE Access, 2020
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely unable ...
Kennedy A. Torkura   +3 more
doaj   +1 more source

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Quantitative Analysis of Opacity in Cloud Computing Systems [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Federated cloud systems increase the reliability and reduce the cost of the computational support.
Maciej, Koutny, Wen, Zeng
core   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]

open access: yes, 2011
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core   +2 more sources

Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

open access: yesIEEE Access
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt   +4 more
doaj   +1 more source

Practice on edge cloud security of telecom operators

open access: yesDianxin kexue, 2023
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj   +2 more sources

Directed Acyclic Graph-Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software
Directed acyclic graph (DAG)-based blockchain is a promising paradigm of a blockchain system. During DAG-based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks.
Ruilin Lai   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy