Showing 1 - 10 of 2,888
generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve …
Persistent link: https://www.econbiz.de/10012043359
-based risk analysis system (ARAS) which gathers identified threats events, probe them and correlates those using ontologies. It … threats based on an existing designed security ontology. To validate the feasibility of the approach a case study on e …
Persistent link: https://www.econbiz.de/10012048074
Persistent link: https://www.econbiz.de/10011529768
Persistent link: https://www.econbiz.de/10011981122
This article organizes knowledge on cloud computing presenting the classification of deployment models, characteristics and service models. The author, looking at the problem from the entrepreneur’s perspective, draws attention to the differences in the benefits depending on the cloud...
Persistent link: https://www.econbiz.de/10011855219
Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter....
Persistent link: https://www.econbiz.de/10011315700
Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter....
Persistent link: https://www.econbiz.de/10011374954
Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT...
Persistent link: https://www.econbiz.de/10012046086
This article organizes knowledge on cloud computing presenting the classification of deployment models, characteristics and service models. The author, looking at the problem from the entrepreneur's perspective, draws attention to the differences in the benefits depending on the cloud computing...
Persistent link: https://www.econbiz.de/10011923093
Trust is the common factor of any network security. In cloud, trust is the major factor as this trust develops a relation between the user and resource of the service provider. To develop a strong trust there has to be a strong trust path between two entities. The model proposed builds a strong...
Persistent link: https://www.econbiz.de/10012043358