• Nenhum resultado encontrado

[PDF] Top 20 Secure authentication mechanisms for the management interface in cloud computing environments

Has 10000 "Secure authentication mechanisms for the management interface in cloud computing environments" found on our website. Below are the top 20 most common "Secure authentication mechanisms for the management interface in cloud computing environments".

Secure authentication mechanisms for the management interface in cloud computing environments

Secure authentication mechanisms for the management interface in cloud computing environments

... of the three main ser- vice delivery models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service ...are the building blocks for unfolding Anything-as-a-Ser- vice ... See full document

125

Implementing and Managing framework for PaaS in Cloud Computing

Implementing and Managing framework for PaaS in Cloud Computing

... reducing the IT cost is especially important. For example, in the traditional school lab, because of software license and hardware constraints, many useful application software and platforms are not ... See full document

6

Research, Implementations and Issues on Cloud Computing

Research, Implementations and Issues on Cloud Computing

... “Virtual Computing Laboratory (VCL)- ...a secure production-level on-demand utility computing and services oriented technology or wide-area accessto solutions based on virtualized resources, ... See full document

7

Review of Access Control Models for Cloud Computing

Review of Access Control Models for Cloud Computing

... identify the following future research directions for access control models in cloud computing environments: (1) Develop attribute-driven role-based access control models such that ... See full document

9

Cloud security risk and readiness

Cloud security risk and readiness

... Within the “Information Era”, the world has become increasingly dependent on information exchanged through digital media and it is clear that the paradigm of traditional IT solutions is evolving ... See full document

86

PUBLIC LINEAR PROGRAMMING SOLUTION FOR  THE DESIGN OF SECURE AND EFFICIENT  COMPUTING IN CLOUD

PUBLIC LINEAR PROGRAMMING SOLUTION FOR THE DESIGN OF SECURE AND EFFICIENT COMPUTING IN CLOUD

... engineering computing and optimization tasks, in this paper, we study practically efficient mechanisms for secure outsourcing of linear programming (LP) ...captures the first order ... See full document

12

Extending Access Management to maintain audit logs in cloud computing

Extending Access Management to maintain audit logs in cloud computing

... access mechanisms are not sufficient for maintaining fine grained access control policies in today’s collaborative environments including ...(ABAC). The model consists of two aspects i) a ... See full document

4

The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria

The Adoption of a National Cloud Framework for Healthcare Delivery in Nigeria

... coined in the latter part of the twentieth century, can already be found in around6,000,000 Web ...pages. In the latter part of the nineteenth and early part of the ... See full document

8

Cloud Computing and Agricultural Development of China: Theory and Practice

Cloud Computing and Agricultural Development of China: Theory and Practice

... be the main force to promote the use of cloud computing technology in the agriculture field, and is also a direct participant in public cloud ...of the ... See full document

6

PRIVACY IN CLOUD COMPUTING: A SURVEY

PRIVACY IN CLOUD COMPUTING: A SURVEY

... Cloud computing has some attributes that are shared, standard service, solution‐packaged, self‐service, elastic scaling and usage‐based ...pricing. Cloud has three different service ...purchasing ... See full document

10

Authentication of Secure Data Transmission In Wireless Routing

Authentication of Secure Data Transmission In Wireless Routing

... on the destination addresses of incoming packets, and on path computations performed locally at the ...node. In shortest-path routing, the path computations performed locally at each node are ... See full document

4

CLOUD COMPUTING SECURITY

CLOUD COMPUTING SECURITY

... of cloud computing are software as a service, platform as a service and infrastructure as a ...application in their own data centre and makes it available to multiple tenants and users over ... See full document

6

Cloud Computing for Managing Apparel and Garment Supply Chains - an Empirical study of Implementation Frame Work

Cloud Computing for Managing Apparel and Garment Supply Chains - an Empirical study of Implementation Frame Work

... of the apparel and manufacturing supply chain need to look at strategies other than reducing labor costs to improve ...margins. The key area is collaboration with supply chain ...costs in the ... See full document

12

Encrypted IT Auditing and Log Management on Cloud Computing

Encrypted IT Auditing and Log Management on Cloud Computing

... Cloud computing gives benefit of provisioning resources and application of services to ...of computing services software and desktop services. In the cloud computing is ... See full document

4

Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)

Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)

... Cloud Computing tem por base conceitos antigos da área das tecnologias o que pode levar a uma difícil perceção da mudança que ocorrerá na área das TI devido ao aparecimento desta plataforma (Armbrust, ... See full document

68

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES

... Hybrid cloud is a combination of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefi ts of multiple deployment ...“hybrid cloud” ... See full document

8

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... - Cloud computing techniques are used to share ...transfers the application software and databases to the centralized large data ...with cloud storage providers comes with serious ... See full document

5

Simulating ubiquitous computing environments

Simulating ubiquitous computing environments

... of the papers are related to the rapid development and evaluation of ubiquitous systems in the early stages of the development life ...25], the work of O’Neill et al. [26], ... See full document

116

A adopção da Cloud Computing e sua utilização no Ensino Superior

A adopção da Cloud Computing e sua utilização no Ensino Superior

... a cloud computing como “TI de desenvolvimento, implantação e entrega emergente, que permite entrega de produtos, serviços e soluções em tempo real através da Internet" [Fowle e Worthen, 2009, ...a ... See full document

14

Secure Model for  Virtualization Layer in Cloud Infrastructure

Secure Model for Virtualization Layer in Cloud Infrastructure

... though cloud computing has numerous benefits, since it is still a new technology there are vulnerabilities that need to be ...addressed. Cloud consumers and providers are investigating on ... See full document

9

Show all 10000 documents...