Results 21 to 30 of about 429,644 (328)
User-Centric Security and Dependability in the Clouds-of-Clouds [PDF]
A promising vision of distributed cloud computing is a unified world of multiple clouds, with business benefits at hand. In practice, lack of interoperability among clouds and management complexity raise many security and dependability concerns. The authors propose secure Supercloud computing as a new paradigm for security and dependability management ...
Lacoste, Marc+9 more
openaire +3 more sources
Secure Cloud-Edge Deployments, with Trust [PDF]
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio+2 more
core +2 more sources
An insider user authentication method based on improved temporal convolutional network
With the rapid development of information technology, information system security and insider threat detection have become important topics for organizational management.
Xiaoling Tao+4 more
doaj
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime+4 more
doaj +1 more source
Data security and privacy in the cloud [PDF]
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati+3 more
openaire +1 more source
Cyber resilience and cyber security issues of intelligent cloud computing systems
It is necessary to provide the cyber security of cloud computing according to the components that constitute its structure. The first step in advancing the cyber security of this technology is to accurately identify its threats.
Fargana Abdullayeva
doaj
Secure Secret Sharing in the Cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An
Chang, Ching-Chun, Li, Chang-Tsun
openaire +2 more sources
Practice on edge cloud security of telecom operators
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj +2 more sources
Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt+4 more
doaj +1 more source