• Nenhum resultado encontrado

Top PDF Secure authentication mechanisms for the management interface in cloud computing environments

Secure authentication mechanisms for the management interface in cloud computing environments

Secure authentication mechanisms for the management interface in cloud computing environments

... of the three main ser- vice delivery models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service ...are the building blocks for unfolding Anything-as-a-Ser- vice ...

125

Implementing and Managing framework for PaaS in Cloud Computing

Implementing and Managing framework for PaaS in Cloud Computing

... reducing the IT cost is especially important. For example, in the traditional school lab, because of software license and hardware constraints, many useful application software and platforms are not ...

6

Research, Implementations and Issues on Cloud Computing

Research, Implementations and Issues on Cloud Computing

... “Virtual Computing Laboratory (VCL)- ...a secure production-level on-demand utility computing and services oriented technology or wide-area accessto solutions based on virtualized resources, ...

7

Review of Access Control Models for Cloud Computing

Review of Access Control Models for Cloud Computing

... identify the following future research directions for access control models in cloud computing environments: (1) Develop attribute-driven role-based access control models such that ...

9

Cloud security risk and readiness

Cloud security risk and readiness

... Within the “Information Era”, the world has become increasingly dependent on information exchanged through digital media and it is clear that the paradigm of traditional IT solutions is evolving ...

86

PUBLIC LINEAR PROGRAMMING SOLUTION FOR  THE DESIGN OF SECURE AND EFFICIENT  COMPUTING IN CLOUD

PUBLIC LINEAR PROGRAMMING SOLUTION FOR THE DESIGN OF SECURE AND EFFICIENT COMPUTING IN CLOUD

... engineering computing and optimization tasks, in this paper, we study practically efficient mechanisms for secure outsourcing of linear programming (LP) ...captures the first order ...

12

Extending Access Management to maintain audit logs in cloud computing

Extending Access Management to maintain audit logs in cloud computing

... access mechanisms are not sufficient for maintaining fine grained access control policies in today’s collaborative environments including ...(ABAC). The model consists of two aspects i) a ...

4

The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria

The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria

... coined in the latter part of the twentieth century, can already be found in around6,000,000 Web ...pages. In the latter part of the nineteenth and early part of the ...

8

Cloud Computing and Agricultural Development of China: Theory and Practice

Cloud Computing and Agricultural Development of China: Theory and Practice

... be the main force to promote the use of cloud computing technology in the agriculture field, and is also a direct participant in public cloud ...of the ...

6

PRIVACY IN CLOUD COMPUTING: A SURVEY

PRIVACY IN CLOUD COMPUTING: A SURVEY

... Cloud computing has some attributes that are shared, standard service, solution‐packaged, self‐service, elastic scaling and usage‐based ...pricing. Cloud has three different service ...purchasing ...

10

Authentication of Secure Data Transmission In Wireless Routing

Authentication of Secure Data Transmission In Wireless Routing

... on the destination addresses of incoming packets, and on path computations performed locally at the ...node. In shortest-path routing, the path computations performed locally at each node are ...

4

CLOUD COMPUTING SECURITY

CLOUD COMPUTING SECURITY

... of cloud computing are software as a service, platform as a service and infrastructure as a ...application in their own data centre and makes it available to multiple tenants and users over ...

6

Cloud Computing for Managing Apparel and Garment Supply Chains - an Empirical study of Implementation Frame Work

Cloud Computing for Managing Apparel and Garment Supply Chains - an Empirical study of Implementation Frame Work

... of the apparel and manufacturing supply chain need to look at strategies other than reducing labor costs to improve ...margins. The key area is collaboration with supply chain ...costs in the ...

12

Encrypted IT Auditing and Log Management on Cloud Computing

Encrypted IT Auditing and Log Management on Cloud Computing

... Cloud computing gives benefit of provisioning resources and application of services to ...of computing services software and desktop services. In the cloud computing is ...

4

Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)

Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)

... Cloud Computing tem por base conceitos antigos da área das tecnologias o que pode levar a uma difícil perceção da mudança que ocorrerá na área das TI devido ao aparecimento desta plataforma (Armbrust, ...

68

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES

... Hybrid cloud is a combination of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefi ts of multiple deployment ...“hybrid cloud” ...

8

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... - Cloud computing techniques are used to share ...transfers the application software and databases to the centralized large data ...with cloud storage providers comes with serious ...

5

Simulating ubiquitous computing environments

Simulating ubiquitous computing environments

... of the papers are related to the rapid development and evaluation of ubiquitous systems in the early stages of the development life ...25], the work of O’Neill et al. [26], ...

116

A adopção da Cloud Computing e sua utilização no Ensino Superior

A adopção da Cloud Computing e sua utilização no Ensino Superior

... a cloud computing como “TI de desenvolvimento, implantação e entrega emergente, que permite entrega de produtos, serviços e soluções em tempo real através da Internet" [Fowle e Worthen, 2009, ...a ...

14

Secure Model for  Virtualization Layer in Cloud Infrastructure

Secure Model for Virtualization Layer in Cloud Infrastructure

... though cloud computing has numerous benefits, since it is still a new technology there are vulnerabilities that need to be ...addressed. Cloud consumers and providers are investigating on ...

9

Show all 10000 documents...