Results 41 to 50 of about 429,644 (328)
A Security Pattern for Cloud service certification [PDF]
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier+1 more
core
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du+11 more
wiley +1 more source
Managing the outsourcing of information security processes: the 'cloud' solution [PDF]
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core +1 more source
Experimental and Theoretical Confirmation of Covalent Bonding in α‐Pu
From a combination of Reverse Monte Carlo dynamic rigid body fitting to the pair distribution functional and novel density functional approaches, the existence of covalent bonding is confirmed in α‐plutonium alongside other bonding types (i.e. mixed bonding schemes).
Alexander R. Muñoz+10 more
wiley +1 more source
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
AbstractThis paper presents a security-by-design methodology for the development of cloud applications, which relies on Security SLAs as a means to express their security requirements. The process followed to build such Security SLAs entails the application of a risk analysis procedure aimed at identifying the main vulnerabilities affecting a cloud ...
Valentina Casola+3 more
openaire +4 more sources
A novel descriptor and a bottom‐up design principle are established to enable the rational design of hydrogen storage materials based on d‐block transition metal single‐atom COFs. By modulating H₂ adsorption through d‐orbital tuning, this approach achieves both high storage capacity and fast kinetics, while revealing a volcano‐type relationship between
Qiuyan Yue+24 more
wiley +1 more source
This study developed a nitrogen‐strengthened copper‐iron‐zinc (N‐CuFeZn) alloy bioactive dressing integrated with electromagnetic stimulation. The coaxial dressing, made from 0.04 mm filaments with 1120 MPa tensile strength, showed that electromagnetic activation enhanced therapeutic outcomes by increasing VEGF expression, promoting angiogenesis (2.1 ...
Xiaohui Qiu+9 more
wiley +1 more source
Analysis and Practice of Cloud Computing Information Security
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong+3 more
doaj +2 more sources
Integrating the Cloud into Security - or Security into the Cloud?
This paper was written in 2019 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20190516 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture.
openaire +2 more sources
CYCLONE Unified Deployment and Management of Federated, Multi-Cloud Applications
Various Cloud layers have to work in concert in order to manage and deploy complex multi-cloud applications, executing sophisticated workflows for Cloud resource deployment, activation, adjustment, interaction, and monitoring.
Baranda, José Ignacio Aznar+7 more
core +1 more source