Results 41 to 50 of about 429,644 (328)

A Security Pattern for Cloud service certification [PDF]

open access: yes, 2019
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier   +1 more
core  

Integration of Perovskite/Low‐Dimensional Material Heterostructures for Optoelectronics and Artificial Visual Systems

open access: yesAdvanced Functional Materials, EarlyView.
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du   +11 more
wiley   +1 more source

Managing the outsourcing of information security processes: the 'cloud' solution [PDF]

open access: yes, 2013
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core   +1 more source

Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu

open access: yesAdvanced Functional Materials, EarlyView.
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz   +10 more
wiley   +1 more source

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications

open access: yesProcedia Computer Science, 2016
AbstractThis paper presents a security-by-design methodology for the development of cloud applications, which relies on Security SLAs as a means to express their security requirements. The process followed to build such Security SLAs entails the application of a risk analysis procedure aimed at identifying the main vulnerabilities affecting a cloud ...
Valentina Casola   +3 more
openaire   +4 more sources

Experimentally Validated Design Principles of D‐Block Transition Metal Single‐Atom Non‐Dissociative Chemisorption Solid‐State Hydrogen Storage Materials

open access: yesAdvanced Functional Materials, EarlyView.
A novel descriptor and a bottom‐up design principle are established to enable the rational design of hydrogen storage materials based on d‐block transition metal single‐atom COFs. By modulating H₂ adsorption through d‐orbital tuning, this approach achieves both high storage capacity and fast kinetics, while revealing a volcano‐type relationship between
Qiuyan Yue   +24 more
wiley   +1 more source

Interstitial N‐Strengthened Copper‐Based Bioactive Conductive Dressings Combined with Electromagnetic Fields for Enhanced Wound Healing

open access: yesAdvanced Healthcare Materials, EarlyView.
This study developed a nitrogen‐strengthened copper‐iron‐zinc (N‐CuFeZn) alloy bioactive dressing integrated with electromagnetic stimulation. The coaxial dressing, made from 0.04 mm filaments with 1120 MPa tensile strength, showed that electromagnetic activation enhanced therapeutic outcomes by increasing VEGF expression, promoting angiogenesis (2.1 ...
Xiaohui Qiu   +9 more
wiley   +1 more source

Analysis and Practice of Cloud Computing Information Security

open access: yesDianxin kexue, 2013
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong   +3 more
doaj   +2 more sources

Integrating the Cloud into Security - or Security into the Cloud?

open access: yes, 2019
This paper was written in 2019 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20190516 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture.
openaire   +2 more sources

CYCLONE Unified Deployment and Management of Federated, Multi-Cloud Applications

open access: yes, 2016
Various Cloud layers have to work in concert in order to manage and deploy complex multi-cloud applications, executing sophisticated workflows for Cloud resource deployment, activation, adjustment, interaction, and monitoring.
Baranda, José Ignacio Aznar   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy