Results 31 to 40 of about 464,365 (270)
Integrating Multi-Cloud to Establish Cloud Security for Secured Cloud Transaction
Nowadays every possible transaction is occurring online so for all these transactions required security must be provided. It is not easy to produce such security since there will be a huge amount of data involved here as well as stored data must be kept confidential so to achieve these things we need to perform transactions through the cloud.
null Dr. Samydurai A +3 more
openaire +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
A Security-Driven Approach for Energy-Aware Cloud Resource Pricing and Allocation
Auctions are often recommended as effective cloud resource pricing and allocation mechanism. If adequately set, auctions provide incentives for cloud users’ truthful bidding and support cloud provider’s revenue maximization.
MIKAVICA, B., KOSTIC-LJUBISAVLJEVIC, A.
doaj +1 more source
A Security Pattern for Cloud service certification [PDF]
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier +1 more
core
Security Trust Zone in 5G Networks
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa +4 more
core +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Recommendations and best practices for cloud enterprise security [PDF]
© 2014 IEEE. Enterprise security is essential to achieve global information security in business and organizations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured.
Chang, V, Ramachandran, M
core +1 more source
Single‐Atom Photocatalyst as Floatable Artificial Leaf for Upcycling Oceanic Plastic Waste
To resolve the catastrophic disaster of oceanic plastic pollution, the novel Ru single atom loaded ZnIn2S4 photocatalysts, in the forms of powder or floatable artificial leaf, were prepared for direct conversion of raw polypropylene plastic into valuable chemicals. The optimized catalyst exhibits exceptional performance, with a total formic/acetic acid
Amin Talebian‐Kiakalaieh +6 more
wiley +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source

