Results 21 to 30 of about 2,849,694 (325)
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to ...
Muhammad Dawood+5 more
semanticscholar +1 more source
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha+16 more
core +3 more sources
On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems
In this paper, the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) communication system that consists of a source (S), a relay (R), a destination (D), and an eavesdropper (E), is studied.
Xiaojun Pan+4 more
doaj +1 more source
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core +2 more sources
Secure Cloud-Edge Deployments, with Trust [PDF]
Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for
Brogi, Antonio+2 more
core +2 more sources
Trust Management Model for Cloud Computing Environment [PDF]
Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud and offers Information Technology services dynamically as "on-demand" basis over the internet.
Changder, Suvamoy+2 more
core +2 more sources
Introduction: Lung cancer is currently among the most prevalent and lethal cancers in the world in terms of incidence and fatality rates. In clinical practice, identifying the specific subtypes of lung cancer is essential in diagnosing and treating lung ...
Zhaoliang Zheng+19 more
doaj +1 more source
A Survey of Security in Cloud, Edge, and Fog Computing
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures ...
A. Ometov+3 more
semanticscholar +1 more source
CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely unable ...
Kennedy A. Torkura+3 more
doaj +1 more source
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek+8 more
core +2 more sources