Results 21 to 30 of about 2,849,694 (325)

Cyberattacks and Security of Cloud Computing: A Complete Guideline

open access: yesSymmetry, 2023
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to ...
Muhammad Dawood   +5 more
semanticscholar   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems

open access: yesIEEE Access, 2019
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan   +4 more
doaj   +1 more source

Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]

open access: yes, 2014
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core   +2 more sources

Secure Cloud-Edge Deployments, with Trust [PDF]

open access: yes, 2019
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio   +2 more
core   +2 more sources

Trust Management Model for Cloud Computing Environment [PDF]

open access: yes, 2013
Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud and offers Information Technology services dynamically as "on-demand" basis over the internet.
Changder, Suvamoy   +2 more
core   +2 more sources

KD_ConvNeXt: knowledge distillation-based image classification of lung tumor surgical specimen sections

open access: yesFrontiers in Genetics, 2023
Introduction: Lung cancer is currently among the most prevalent and lethal cancers in the world in terms of incidence and fatality rates. In clinical practice, identifying the specific subtypes of lung cancer is essential in diagnosing and treating lung ...
Zhaoliang Zheng   +19 more
doaj   +1 more source

A Survey of Security in Cloud, Edge, and Fog Computing

open access: yesItalian National Conference on Sensors, 2022
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures ...
A. Ometov   +3 more
semanticscholar   +1 more source

CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

open access: yesIEEE Access, 2020
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely unable ...
Kennedy A. Torkura   +3 more
doaj   +1 more source

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Home - About - Disclaimer - Privacy