Results 11 to 20 of about 202,881 (332)

Security Threats on Cloud Computing Vulnerabilities

open access: bronzeInternational Journal of Computer Science and Information Technology, 2013
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment.
Te‐Shun Chou
openalex   +2 more sources

Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method [PDF]

open access: yesJournal of Universal Computer Science, 2019
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex.
Xiaoling Tao   +4 more
doaj   +3 more sources

A survey of fault tolerance in cloud computing

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Cloud computing has brought about a transformation in the delivery model of information technology from a product to a service. It has enabled the availability of various software, platforms and infrastructural resources as scalable services on demand ...
Priti Kumari, Parmeet Kaur
doaj   +1 more source

A security architecture for personal networks [PDF]

open access: yes, 2006
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.   +1 more
core   +2 more sources

UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION [PDF]

open access: yesISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed.
H. Sheikhian, M. R. Delavar, A. Stein
doaj   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]

open access: yes, 2015
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli   +4 more
core   +2 more sources

ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing

open access: yesFuture Internet, 2019
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized.
Masky Mackita   +2 more
doaj   +1 more source

A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment

open access: yesDigital Communications and Networks, 2022
As a newly emerging computing paradigm, edge computing shows great capability in supporting and boosting 5G and Internet-of-Things (IoT) oriented applications, e.g., scientific workflows with low-latency, elastic, and on-demand provisioning of ...
Tingyan Long   +8 more
doaj   +1 more source

Pathways to Coastal Resiliency: the Adaptive Gradients Framework [PDF]

open access: yes, 2021
Current and future climate-related coastal impacts such as catastrophic and repetitive flooding, hurricane intensity, and sea level rise necessitate a new approach to developing and managing coastal infrastructure.
Hamin, Elisabeth M., Judge, Pamela K.
core   +1 more source

Home - About - Disclaimer - Privacy