Results 61 to 70 of about 2,849,694 (325)
Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications [PDF]
Internet is changing from an information space to a dynamic computing space. Data distribution and remotely accessible software services, dynamism, and autonomy are prime attributes.
Muñoz, Antonio
core
Bright Monocompound Metal Halide Scintillator for Fast Neutron Radiography
Metal halide scintillator, tetraphenylphosphonium manganese bromide (TPP2MnBr4), provides a significant benefit for fast neutron imaging. A fourfold increase in efficiency over traditional zinc sulfide screens is achieved by efficiently utilizing neutron interactions within its homogeneous structure.
Aditya Bhardwaj +13 more
wiley +1 more source
Developing Secure Cloud Applications
Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud service provider prospective in order to securely integrate frameworks and Infrastructures as a Services in a Cloud datacenter.
Massimiliano Rak +4 more
openaire +6 more sources
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi +5 more
semanticscholar +1 more source
Design and Applications of Multi‐Frequency Programmable Metamaterials for Adaptive Stealth
This article provides a comprehensive overview of metamaterials, including their fundamental principles, properties, synthesis techniques, and applications in stealth, as well as their challenges and future prospects. It covers topics that are more advanced than those typically discussed in existing review articles, while still being closely connected ...
Jonathan Tersur Orasugh +4 more
wiley +1 more source
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
AbstractThis paper presents a security-by-design methodology for the development of cloud applications, which relies on Security SLAs as a means to express their security requirements. The process followed to build such Security SLAs entails the application of a risk analysis procedure aimed at identifying the main vulnerabilities affecting a cloud ...
Valentina Casola +3 more
openaire +4 more sources
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva +9 more
wiley +1 more source
Integrating the Cloud into Security - or Security into the Cloud?
This paper was written in 2019 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20190516 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture.
openaire +1 more source
ROS‐Scavenging Multifunctional Microneedle Patch Facilitating Wound Healing
A reactive oxygen species (ROS) scavenging and immunomodulatory microneedle patch based on hyaluronic acid methacrylate (HaMA) and Flightless I (Flii)‐siRNA‐laden arginine functionalized poly (β‐amino ester)/alginate particles is developed for chronic wound healing applications.
Mahshid Kharaziha +4 more
wiley +1 more source
Analysis and Practice of Cloud Computing Information Security
Cloud computing security issue is one of the most important and difficult problems encountered in today’s cloud computing technology to promote 1anding.From the cloud computing security in the information security section,the basic content of information
Detian Tong +3 more
doaj +2 more sources

