Results 21 to 30 of about 468,074 (268)

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

Safer in the Clouds (Extended Abstract) [PDF]

open access: yes, 2010
We outline the design of a framework for modelling cloud computing systems.The approach is based on a declarative programming model which takes the form of a lambda-calculus enriched with suitable mechanisms to express and enforce application-level ...
A. Banerjee   +19 more
core   +2 more sources

CloudStrike: Chaos Engineering for Security and Resiliency in Cloud Infrastructure

open access: yesIEEE Access, 2020
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating these issues, however existing cloud security models are largely unable ...
Kennedy A. Torkura   +3 more
doaj   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture

open access: yesIEEE Access
In the rapidly evolving realm of the Industrial Internet of Things (IIoT), securing shop floor operations, especially in audit processes, is of critical importance.
Fatemeh Stodt   +4 more
doaj   +1 more source

CYCLONE Unified Deployment and Management of Federated, Multi-Cloud Applications

open access: yes, 2016
Various Cloud layers have to work in concert in order to manage and deploy complex multi-cloud applications, executing sophisticated workflows for Cloud resource deployment, activation, adjustment, interaction, and monitoring.
Baranda, José Ignacio Aznar   +7 more
core   +1 more source

Practice on edge cloud security of telecom operators

open access: yesDianxin kexue, 2023
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks ...
Le ZHANG, Hongyuan MA
doaj   +2 more sources

Directed Acyclic Graph-Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software
Directed acyclic graph (DAG)-based blockchain is a promising paradigm of a blockchain system. During DAG-based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks.
Ruilin Lai   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy