Results 211 to 220 of about 23,723 (266)
Some of the next articles are maybe not open access.
Top Vulnerabilities in Cloud Computing
ECS Transactions, 2022Cloud computing is rising quickly and without uncertainty it is the new generation of technology where people will utilize whenever and wherever. In this web-based world, cloud computing is rising higher by giving everything to the necessary assets, applications, programming, equipment, registering capacity to figuring foundations, business procedure ...
Sarvesh Kumar +3 more
openaire +1 more source
Cloud Computing Vulnerabilities Analysis
Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things, 2019Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose certain vulnerabilities and work to improve the security of cloud computing technologies. We analyze
Alin Zamfiroiu, Ionut Petre, Radu Boncea
openaire +1 more source
Understanding Cloud Computing Vulnerabilities
IEEE Security & Privacy Magazine, 2011The current discourse about cloud computing security issues makes a well-founded assessment of cloud computing's security impact difficult for two primary reasons. First, as is true for many discussions about risk, basic vocabulary such as "risk," "threat," and "vulnerability" are often used as if they were interchangeable, without regard to their ...
Bernd Grobauer +2 more
openaire +1 more source
Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review, 1995The lack of a standard gauge for quantifying computer system vulnerability is a hindrance to communicating information about vulnerabilities, and is thus a hindrance to reducing those vulnerabilities. The inability to address this issue through uniform semantics often leads to uncoordinated efforts at combating exposure to common avenues ...
Jim Alves-Foss, Salvador Barbosa
openaire +1 more source
Vulnerability Assessment in Contemporary Computing
2023Vulnerability assessments are an important aspect of contemporary computing and cyber security. It is a process of distinguishing and assessing potential security weaknesses and vulnerabilities in a computing system or network. It involves using various tools and techniques to denote vulnerabilities and supply recommendations for mitigating them.
null Umamageswari, S. Deepa
openaire +1 more source
Communications of the ACM, 1995
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire +1 more source
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
openaire +1 more source
Computer network vulnerabilities and monitoring
2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE), 2015This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.
Adrian Badea +2 more
openaire +1 more source
Computer unreliability and social vulnerability
Futures, 1990Abstract Many have argued that industrial societies are becoming more technology-dependent and are thus more vulnerable to technology failures. Despite the pervasiveness of computer technology, little is known about computer failures, except perhaps that they are all too common.
Tom Forester, Perry Morrison
openaire +1 more source
Societal vulnerability to computer system failures
Computers & Security, 1986The world has become more dependent on computers which are active elements in bigger systems on which human lives depend - such as critical care units in hospitals, defense systems or air traffic control systems. Hence, the need to assure correct, reliable and safe operation has become more critical. With this need has come an increase in the attention
Lance J. Hoffman, Lucy M. Moran
openaire +1 more source

