• Nenhum resultado encontrado

[PDF] Top 20 Managing User Access to Cloud Services by Company Administrators

Has 10000 "Managing User Access to Cloud Services by Company Administrators" found on our website. Below are the top 20 most common "Managing User Access to Cloud Services by Company Administrators".

Managing User Access to Cloud Services by Company Administrators

Managing User Access to Cloud Services by Company Administrators

... administrator services has been growing lately. In order to perform their job, administrators acquire rights to access user data such as names, addresses, occupations, passwords ... See full document

5

Extending Access Management to maintain audit logs in cloud computing

Extending Access Management to maintain audit logs in cloud computing

... auditors to ascertain whether the employees’ CTC and other costs are at par with their roles and tasks done for the ...provided to the employees are properly utilized and are not used for vested purposes as ... See full document

4

Implementing and Managing framework for PaaS in Cloud Computing

Implementing and Managing framework for PaaS in Cloud Computing

... and Cloud computing, there are more and more network ...in Cloud computing. Platform as a Service (PaaS) is one of the key services in Cloud ...available cloud computing platforms are ... See full document

6

Protecting user privacy in the Cloud: an analysis of terms of service

Protecting user privacy in the Cloud: an analysis of terms of service

... commit to adequate physical and digital security of user data: Considering the line of business cloud services are in, it is surprising that the majority of the companies at issue does not ... See full document

12

PRIVACY IN CLOUD COMPUTING: A SURVEY

PRIVACY IN CLOUD COMPUTING: A SURVEY

... Various cloud computing models are used to increase the profit of an ...organization. Cloud provides a convenient environment and more advantages to business organizations to run their ... See full document

10

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT

... Day by day huge service request and maximized resource consumption are coming as a wider range of service access to the web clients in cloud ...of services and resources are handled ... See full document

6

Cloud Computing: A study of cloud architecture and its patterns

Cloud Computing: A study of cloud architecture and its patterns

... the cloud IDM can be considered as a superset of all the corresponding issues from these paradigms and many ...in cloud has to manage — control points, dynamic composite/decommissioned machines, ... See full document

6

Review of Access Control Models for Cloud Computing

Review of Access Control Models for Cloud Computing

... need to be static and stay enabled all the time, while it is only the users and permissions that are dynamically ...said to be activated if at least one user assumes that ...allowed to a ... See full document

9

The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors

The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors

... 2007 by industry giants like Google and Amazon, Cloud Computing technology and resources are based in centralized data centers, dynamically adjusted and tuned to achieve optimum efficiency, providing ... See full document

11

Web application for the analysis of assessment tests

Web application for the analysis of assessment tests

... defined by the International Association for Computerized Adaptive Testing (CAT) 1 aiming at “the redesign of psychological and educational measuring instruments for delivery by interactive ...is to ... See full document

11

The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors

The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors

... using Cloud Computing, such as opportunities to test new software, evaluate third party applications, increase resources on demand to satisfy seasonal or temporary demand and offer software to ... See full document

11

A Fuzzy Mathematical Model for Peformance Testing in Cloud Computing Using User Defined Parameters

A Fuzzy Mathematical Model for Peformance Testing in Cloud Computing Using User Defined Parameters

... Performance issues in cloud computing mainly depends on the overall traffic patterns and peaks in the system[25]. Network traffic plays major role in performance of cloud computing. When network traffic in ... See full document

13

REALIZING THE NEED FOR SIMILARITY BASED REASONING OF CLOUD SERVICE DISCOVERY

REALIZING THE NEED FOR SIMILARITY BASED REASONING OF CLOUD SERVICE DISCOVERY

... domain. Cloud ontology provides a set of concepts, individuals and relationships among them [Jaeyong ...In cloud service discovery, cloud ontology is developed for semantic matching and retrieval of ... See full document

11

Towards finding unreliability in cloud systems: real facts and calculations

Towards finding unreliability in cloud systems: real facts and calculations

... system to provide acceptable/correct/accurate service delivered within an acceptable ...(attributable to the service provider) and request failures (attributable to the user or user ... See full document

3

A business model for an entertainment solution to the in-vehicle infotainment industry

A business model for an entertainment solution to the in-vehicle infotainment industry

... according to its preferences, synchronizing it with apps as Spotify, Pandora or Flipboard, and sharing its favorite songs, news and podcasts on social networks, just as it is done outside ...the company has ... See full document

27

Diogo Alfaro Cardoso da Gama Barata

Diogo Alfaro Cardoso da Gama Barata

... software services, and QoS (Quality of Service) guaranteed service ...of Cloud Computing is to provide on-demand computing services with the following main characteristics: high reliability, ... See full document

83

Gest. Prod.  vol.7 número3

Gest. Prod. vol.7 número3

... what to enter into each cell formalises the steps of the total system design in a way that is consistent with a concurrent engineering ...actions to take, it will be difficult to define the cell ... See full document

27

A Survey on Cloud Storage Systems and Encryption Schemes

A Survey on Cloud Storage Systems and Encryption Schemes

... suggested to provide fine grained data access control ...issue. To increase the level of security, some cryptographic methods are applied to reveal the data decryption keys to the ... See full document

5

DISSERTAÇÃO PARA A OBTENÇÃO DO GRAU DE MESTRE EM SAÚDE E DESENVOLVIMENTO, ESPECIALIDADE EM SAÚDE E POBREZA O UTUBRO , 2011

DISSERTAÇÃO PARA A OBTENÇÃO DO GRAU DE MESTRE EM SAÚDE E DESENVOLVIMENTO, ESPECIALIDADE EM SAÚDE E POBREZA O UTUBRO , 2011

... strategy to reduce maternal ...led to controversies and to a policy shift towards promoting skilled attendance ...support to women during pregnancy and childbirth (74, ...transition to ... See full document

150

Architecture Design & Network Application of Cloud Computing

Architecture Design & Network Application of Cloud Computing

... According to the Cloud Security Alliance, the top three threats in the cloud are Insecure Interfaces and API's, Data Loss & Leakage, and Hardware Failure which accounted for 29%, 25% and 10% of ... See full document

8

Show all 10000 documents...